期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
浅谈事业单位对于可移动储存介质的信息安全管理 被引量:1
1
作者 刘显栋 《网络安全技术与应用》 2023年第5期98-100,共3页
在目前的事业单位工作背景下,多会存在部分涉密信息,或者是涉密公文的流转,或者是业务工作中的数据信息,最常用的储存方式其中就包括可移动介质储存,在当前的复杂的背景形势下,极容易成为被攻破的突破口。本文将简要分析可移动储存介质... 在目前的事业单位工作背景下,多会存在部分涉密信息,或者是涉密公文的流转,或者是业务工作中的数据信息,最常用的储存方式其中就包括可移动介质储存,在当前的复杂的背景形势下,极容易成为被攻破的突破口。本文将简要分析可移动储存介质中常见的问题,和实际工作中应如何避免问题出现。通过原因和对策的提出,保障我们的日常工作平稳开展。 展开更多
关键词 移动储存介质 事业单位工作 网络信息安全 涉密工作 保密信息
原文传递
移动储存的新生利器—Lomega新品面世
2
《计算机信息》 2000年第3期12-13,共2页
关键词 移动储存 Lomega 磁盘 光盘 刻录机
原文传递
可移动小型民用爆炸物品储存库防雷设施探索
3
作者 胡葵 张勇 《中国设备工程》 2023年第20期258-260,共3页
本文针对可移动的小型民用爆炸物品储存库的特点,辨识与分析其存在的各种安全条件,计算其遭受雷击的风险系数,另外,对照国内外对大型储罐防直击雷设施的设置要求,探索可移动的小型民用爆炸物品储存库防雷设施设置的改变,并针对改变该类... 本文针对可移动的小型民用爆炸物品储存库的特点,辨识与分析其存在的各种安全条件,计算其遭受雷击的风险系数,另外,对照国内外对大型储罐防直击雷设施的设置要求,探索可移动的小型民用爆炸物品储存库防雷设施设置的改变,并针对改变该类型的仓库雷电防护设施提出注意事项,为今后的相关安全标准和规范的修订提供参考建议。 展开更多
关键词 防雷设施 移动小型民用爆炸物品储存 储存库设计
在线阅读 下载PDF
电网移动存储介质管理探讨
4
作者 王皓然 《贵州电力技术》 2014年第8期57-59,共3页
根据贵州电网在基于移动存储介质管理项目中的实践、成果和经验,阐述移动存储介质管理在电力信息化中构建方案及建设情况。
关键词 安全管理 安全体系 移动储存介质管理
在线阅读 下载PDF
大肚容天下移动硬盘导购
5
作者 姜一 《网友世界》 2007年第11期72-73,共2页
作为当前综合性能最好的大容量数据移动储存方案,移动硬盘一直受到各界用户的广泛关注。然而移动硬盘关键部位(硬盘、主控芯片)都是从上游厂商直接采购,研发生产技术含量不高。使得各路小厂蜂拥而上,造成市场产品良莠不齐。
关键词 移动硬盘 导购 大容量数据 移动储存 综合性能 主控芯片 技术含量
在线阅读 下载PDF
试析移动云存储安全保护方案的实现
6
作者 张俊林 《无线互联科技》 2017年第1期29-30,共2页
随互联网技术的发展,网络大数据时代已经来临,分布式存储系统和移动云存储系统得到广泛应用,越来越多的个人和企业将自己的数据存储在云端。文章对移动云存储技术展开了研究,发现移动云存储技术的安全保护方案至关重要。文章通过研究移... 随互联网技术的发展,网络大数据时代已经来临,分布式存储系统和移动云存储系统得到广泛应用,越来越多的个人和企业将自己的数据存储在云端。文章对移动云存储技术展开了研究,发现移动云存储技术的安全保护方案至关重要。文章通过研究移动云储存的安全并提出保护方案来提升云数据安全、保护用户利益。 展开更多
关键词 数据时代 移动储存 安全保护
在线阅读 下载PDF
桌面管理系统在医院信息化中的应用 被引量:3
7
作者 魏智 《中国医学教育技术》 2011年第2期193-195,共3页
介绍当前桌面安全管理中所遇到的问题,阐述了医院在信息建设过程中为解决这些问题及隐患,实施桌面安全管理系统的一些做法及效果。
关键词 桌面管理 移动储存 软件分发 远程控制
在线阅读 下载PDF
桌面安全管理系统在医院信息安全管理中应用 被引量:2
8
作者 陈礼团 《福建电脑》 2016年第12期156-157,共2页
保证业务系统正常运行是信息安全的重要因素。部署桌面安全管理系统,实现电源管理、补丁管理、外设控制、资产管理、软件分发和远程支持等服务功能,达到对终端工作站的行为监控、审计和管理,解决存在安全隐患,提升信息安全管理水平和工... 保证业务系统正常运行是信息安全的重要因素。部署桌面安全管理系统,实现电源管理、补丁管理、外设控制、资产管理、软件分发和远程支持等服务功能,达到对终端工作站的行为监控、审计和管理,解决存在安全隐患,提升信息安全管理水平和工作效率。 展开更多
关键词 桌面管理 移动储存 软件分发 远程控制
在线阅读 下载PDF
移动式引流液计量储存筒的制作与应用
9
作者 潘丽华 曹宴宾 《中华现代护理杂志》 2014年第15期1868-1868,共1页
临床护士在进行倾倒引流液操作时需要计量。传统计量量杯为玻璃杯,易碎,容易对操作者带来伤害;护士在倾倒引流液时先用单个量杯测量引流液后再倾倒入储存筒,且不同患者之间需要反复开关储存筒盖子,过程繁琐;储存筒多为塑料桶,刻... 临床护士在进行倾倒引流液操作时需要计量。传统计量量杯为玻璃杯,易碎,容易对操作者带来伤害;护士在倾倒引流液时先用单个量杯测量引流液后再倾倒入储存筒,且不同患者之间需要反复开关储存筒盖子,过程繁琐;储存筒多为塑料桶,刻度为自行刻画,准确度不高,且影响后期引流液的消毒;工作结束后,需要耗费较多时间处置引流液、量杯及储存筒,工作量大。为此,笔者设计并制作了一种移动式引流液计量储存筒,临床应用效果较好,现介绍如下。 展开更多
关键词 技术革新 移动式引流液计量储存 应用
原文传递
网络时代数据存储新趋势
10
《计算机》 2002年第24期16-16,共1页
网络时代的基本元素是信息,在如今这场“E”革命大潮中,存储产品和技术的发展及未来趋势,成为各界关注的目标。传统的1.44MB磁盘的容量有限,早已不敷应用,它正在被更为先进的新兴高容量存储设备,如磁带、Zip(驱动器、可读写光盘。
关键词 网络 数据存储 数据备份 IOMEGA QuikSync 移动储存 移动数据管理 存储模式
在线阅读 下载PDF
自建秘密文件夹 资料隐藏无人发现
11
《网友世界》 2010年第7期7-7,共1页
日常的重要数据,为了存取方便,许多用户习惯保存在硬盘中。然而,面对黑客软件以及木马,如何更好的保护数据呢?WinMend Folder Hidden为用户带来了一中更加安全的双重保护工具。程序能够在添加加密保护的同时,进行文件的隐藏,除... 日常的重要数据,为了存取方便,许多用户习惯保存在硬盘中。然而,面对黑客软件以及木马,如何更好的保护数据呢?WinMend Folder Hidden为用户带来了一中更加安全的双重保护工具。程序能够在添加加密保护的同时,进行文件的隐藏,除了支持本机硬盘之外,移动储存设别的文件与文件夹也能够进行隐藏,非常实用。 展开更多
关键词 文件夹 隐藏 人发 FOLDER 保护工具 黑客软件 加密保护 移动储存
在线阅读 下载PDF
数码冲印
12
作者 周涛 《青苹果》 2003年第11期37-37,共1页
如果说几年前能拥有一张属于自己的数码照片还是一个梦想的话,那么在进入21世纪以后的今天,当人们还在习惯于拿着胶卷去拍照和冲洗的时候,数码冲印已经悄然走进我们的生活之中。
关键词 数码冲印 移动储存介质 JEPG格式 冲印设备
在线阅读 下载PDF
A New Architecture of Twiddle Factor Generator for Radix-2 1024-Point FFT
13
作者 李金城 杨华中 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2004年第4期377-382,共6页
A new ROMless twiddle factor generator for radix-2 1024-point FFT is proposed.It consists of several simple logic units and each of them synthesizes some data,which will be used to compose the twiddle factors.The powe... A new ROMless twiddle factor generator for radix-2 1024-point FFT is proposed.It consists of several simple logic units and each of them synthesizes some data,which will be used to compose the twiddle factors.The power analysis with Synopsys Power Compiler shows that it consumes about 2mW with TSMC 0.25μm CMOS process at 50MHz.This twiddle factor generator is designed for the low power applications,especially for the mobile communications and other portable devices... 展开更多
关键词 FFT twiddle factor low power ROMless mobile communications
在线阅读 下载PDF
A Mobile GIS Application to Heavily Resource-Constrained Devices 被引量:6
14
作者 Robert P.Biuk-Aghai 《Geo-Spatial Information Science》 2004年第1期50-57,共8页
GIS applications to mobile devices are becoming i nc reasingly popular, utilizing a di-verserange of devices. Many of these devices suffer from serious constraints in three main areas: processor speed, memory space an... GIS applications to mobile devices are becoming i nc reasingly popular, utilizing a di-verserange of devices. Many of these devices suffer from serious constraints in three main areas: processor speed, memory space and screen size. This paper presents a GIS application, called "MacaoMap", that is intended for heavily resource-co nstrained handheld devices. MacaoMap is a tourism-oriented map application of t he Macao territory for PalmOS and Pocket PC personal digital assistants. It was designed to perform satisfactorily on devices with as little as 16 MHz processor speed, and requires only 500 KB available memory for the GIS application and al l GIS data. Memory requirements are kept low through a specially designed data f ormat. The main challenge of satisfactory map drawing speed is addressed through a variety of techniques that were developed for this application. The paper des cribes the application’s data format, outlines the map drawing techniques, and points out the areas for future development. 展开更多
关键词 personal digital assistant mobile GIS map drawing GPS
在线阅读 下载PDF
Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing
15
作者 刘晓 蒋睿 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期392-397,共6页
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the cod... The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme (COS) and the encryption-based scheme (EnS) have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol (SShP), the secure coding-based protocol (SCoP) and the secure encryption- based protocol (SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased. 展开更多
关键词 mobile cloud computing cloud storage security protocols
在线阅读 下载PDF
PROXY-BASED PATCHING STREAM TRANSMISSION STRATEGY IN MOBILE STREAMING MEDIA SYSTEM
16
作者 Liao Jianxin Lei Zhengxiong Ma Xutao Zhu Xiaomin 《Journal of Electronics(China)》 2006年第4期515-519,共5页
A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strat-egy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA... A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strat-egy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server. 展开更多
关键词 Mobile streaming media system Proxy-based Mobile Patching (PMPatching) transmission strategy Patching stream Batching
在线阅读 下载PDF
A Novel Provable Data Possession Scheme Based on Geographic Location Attribute
17
作者 Yaxing Zha Shoushan Luo +1 位作者 Jianchao Bian Wei Li 《China Communications》 SCIE CSCD 2016年第9期139-150,共12页
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve... Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient. 展开更多
关键词 cloud storage security provable data possession geographic location security boundary CDH assumption
在线阅读 下载PDF
手机的储存器与功能键
18
作者 郭武备 《家用电器》 1998年第4期33-34,共2页
1.设定存储电话号码首先输入电话号码,按存储键,再输入二位存储器号01至99。这样,输入的电话号码即可寄存在该存储器对应的号码下。2.
关键词 手机 移动通信储存 功能键
原文传递
Removal of toxic metal ions using chitosan coated carbon nanotube composites for supercapacitors 被引量:2
19
作者 Pin Hao Xiaoye Ma +6 位作者 Junfeng Xie Fengcai Lei Liyi Li Wenqian Zhu Xin Cheng Guanwei Cui Bo Tang 《Science China Chemistry》 SCIE EI CAS CSCD 2018年第7期797-805,共9页
Environmental pollution and energy crisis are two major global challenges to human beings.Recovering energy from wastewater is considered to be one of the effective approaches to address these two issues synchronously... Environmental pollution and energy crisis are two major global challenges to human beings.Recovering energy from wastewater is considered to be one of the effective approaches to address these two issues synchronously.As the main pollutants in wastewater,toxic heavy metal ions are the potential candidates for energy storage devices with pseudocapacitive behaviors.In this study,toxic metal ions of Cr(VI)and Cu(II)are removed efficiently by chitosan coated oxygen-containing functional carbon nanotubes,and the corresponding equilibrium adsorption capacity is 142.1 and 123.7 mg g^(-1).Followed by carbonization of metal ions-adsorbed adsorbents,Cu-and Cr N-loaded carbon composites can be obtained.Electrochemical measurements show that the supercapacitor electrodes based on Cu-and Cr N-loaded carbon composites have specific capacitance of 144.9 and 114.9 F g^(-1)at2 m V s^(-1),with superior electrochemical properties to pure chitosan coated carbon nanotubes after carbonization.This work demonstrates a new strategy for the resource-utilization of other heavy metal ions for energy devices,and also provides a new way to turn environmental pollutants into clean energy. 展开更多
关键词 heavy metal ions adsorption chitosan coated carbon nanotube supercapacitor
原文传递
In situ electron holography of the dynamic magnetic field emanating from a hard-disk drive writer
20
作者 Joshua F. Einsle Christophe Gatel +5 位作者 Aurelien Masseboeuf Robin Cours Muhammad A. Bashir Mark Gubbins Robert M. Bowman Etienne Snoeck 《Nano Research》 SCIE EI CAS CSCD 2015年第4期1241-1249,共9页
The proliferation of mobile devices in society accessing data via the "cloud" is imposing a dramatic increase in the amount of information to be stored on hard disk drives (HDD) used in servers. Forecasts are that... The proliferation of mobile devices in society accessing data via the "cloud" is imposing a dramatic increase in the amount of information to be stored on hard disk drives (HDD) used in servers. Forecasts are that areal densities will need to increase by as much as 35% compound per annum and by 2,020 cloud storage capacity will be around 7 zettabytes corresponding to areal densities of 2 Tb/in^2. This requires increased performance from the magnetic pole of the electromag- netic writer in the read/write head in the HDD. Current state-of-art writing is undertaken by morphologically complex magnetic pole of sub 100 nm dimensions, in an environment of engineered magnetic shields and it needs to deliver strong directional magnetic field to areas on the recording media around 50 nm × 13 nm. This points to the need for a method to perform direct quantitative measurements of the magnetic field generated by the write pole at the nanometer scale. Here we report on the complete in situ quantitative mapping of the magnetic field generated by a functioning write pole in operation using electron holography. The results point the way towards a new nanoscale magnetic field source to further develop in situ transmission electron microscopy. 展开更多
关键词 electron transmissionmicroscopy off-axis electronholography in situ magnetic field magnetic recording hard disk write pole
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部