首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 515 毫秒
1.
Passenger prescreening is a critical component of aviation security systems. This paper introduces the Multilevel Allocation Problem (MAP), which models the screening of passengers and baggage in a multilevel aviation security system. A passenger is screened by one of several classes, each of which corresponds to a set of procedures using security screening devices, where passengers are differentiated by their perceived risk levels. Each class is defined in terms of its fixed cost (the overhead costs), its marginal cost (the additional cost to screen a passenger), and its security level. The objective of MAP is to assign each passenger to a class such that the total security is maximized subject to passenger assignments and budget constraints. This paper shows that MAP is NP‐hard and introduces a Greedy heuristic that obtains approximate solutions to MAP that use no more than two classes. Examples are constructed using data extracted from the Official Airline Guide. Analysis of the examples suggests that fewer security classes for passenger screening may be more effective and that using passenger risk information can lead to more effective security screening strategies. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   

2.
随着公安边防检查站信息化建设的不断推进,基层边防检查站暴露出了大量信息安全隐患,并发生了多起信息安全事故。针对边防检查站信息安全建设中普遍存在的问题,提出了提高官兵信息安全意识、构建信息安全技术人才保障体系、健全信息安全管理机构等措施,以期为边防检查站信息安全建设提供借鉴。  相似文献   

3.
利用民航力量由多个机场向一个目标机场实施航空战略投送时,由于各民航机场都具有运力限制约束,不可能无限制地快速投送兵力,因此,考虑了在多个出发机场存在运力限制约束的情况下,构建了"投送时间最短,动员机场最少"多目标决策模型,并给出了优化算法和算例.  相似文献   

4.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   

5.
麒麟操作系统层次式内核设计技术   总被引:1,自引:0,他引:1  
麒麟操作系统是高性能、高安全的国产服务器操作系统,自主设计了层次式内核结构,由基本内核层和系统服务层组成.基本内核层负责硬件初始化,并提供基本的存储管理和任务管理,系统服务层基于FreeBSD改进,提供UFS2文件系统和BSD的网络协议.详细阐述了麒麟操作系统层次式内核的结构,然后采用标准的Benchmark对麒麟操作系统进行了基本性能测试,测试结果表明层次式内核结构的麒麟操作系统与宏内核结构的UNIX类操作系统性能相当,最后探讨了麒麟操作系统层次式内核结构的特点和下一步发展思路.  相似文献   

6.
直升机野战油料保障模拟优化研究   总被引:1,自引:0,他引:1  
野战条件下,场站通常在前沿阵地开设野战直升机场实施伴随保障,其中油料保障主要采取飞机加油车先对直升机实施加油,后到野战机场油库领取油料这一方式进行。若将野战直升机场油料保障作为一个系统来研究,要实现适时、适量的油料保障,确定合适的飞机加油车及野战机场油库发油鹤位数量是一个关键问题。利用GPSSW语言对这一问题进行模拟,得出模拟结果并进行统计分析,经反复模拟和参数比较得到适合的参数,为部队保障提供依据。  相似文献   

7.
面对现代空战时域、空域广阔,发生时机不确定性强,航空军械装备战损消耗大的局面,为达到海军航空军械器材保障"快速反应"和"精确保障"目的,必须进一步加强海军航空军械器材信息化建设的研究。首先从总体上规划了海军航空军械器材信息管理系统功能;然后研究了信息化管理的主要技术;最后,提出推行海军航空军械器材"全资可视化"管理,为海军航空军械器材信息化保障提供了一种建设思路和技术指导。  相似文献   

8.
计算机网络攻击效果评估技术研究   总被引:32,自引:0,他引:32       下载免费PDF全文
计算机网络攻击效果评估技术是信息系统安全评估中一个重要而具有挑战性的课题。目前 ,相关的理论尚不成熟 ,有关的研究报道较少。简要总结了当前已经存在的主要信息安全的评估方法 ,在此基础上 ,从便于实际度量和计算的角度出发 ,提出了基于网络信息熵的评估技术、基于系统安全层次分析的安全评估框架和基于指标分析的网络攻击效果综合评估技术等三种评估模型 ,并分析了各自在使用中应注意的问题  相似文献   

9.
伴随着3G时代的到来,3G手机逐渐走进武警警营。然而它在给官兵带来视频通话、网络冲浪、导航定位、彩信即拍即发等方便与快捷享受的同时,也给安全保密工作敲响了警钟。通过对3G手机的概念及主要功能的分析,指出它对安全保密工作的影响,探讨解决问题的对策,能够为部队管理者有效消除3G手机给部队安全保密工作带来的不利影响提供参考。  相似文献   

10.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   

11.
在深入调研公安边防部队各级指挥中心业务开展的基础上,分析了当前公安边防部队指挥系统存在的问题,提出了利用地理信息平台建立适应当前边防部队业务需要的综合指挥系统的可行性及具体思路。  相似文献   

12.
提出了一种安全私有云解决方案,是通过研究云计算安全体系模型,结合私有云架构特点设计的一种安全架构。与其他私有云解决方案相比,该架构安全系数较高,具有多层次、可扩展和强安全的特点。能够保证云用户安全快速登录云系统,使用透明加解密来保证用数据的可用性和安全性,实现了云数据的密文访问控制功能,增强了云存储数据的机密性,为私有云解决方案提供安全技术保障。  相似文献   

13.
飞机再次出动保障活动所需时间长短对提升飞机的作战效能至关重要,针对当前在飞机保障资源有限约束条件下,再次出动保障活动工期最短难以实现的难题,提出了基于分支切割法的再次出动保障活动时间优化方法。该方法以飞机再次出动保障活动所需时间最短为目标,以有限的保障人员和保障作业间逻辑关系为约束条件,可计算出时间最短的飞机再次出动保障活动具体流程,并用VB6.0编制成计算机程序,开发了飞机再次出动保障活动分析系统。最后,对某型飞机真实保障活动进行了实例分析,结果表明,使用该方法计算得到的结果准确、可靠,与实际保障情况相符,可为飞机再次出动保障与决策提供指导,提升保障活动的自动化水平,具有很好的工程应用价值。  相似文献   

14.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   

15.
组织如何制定优化的信息安全技术方案以降低脆弱性对其信息系统的威胁,是信息安全管理领域的关键问题。在描述信息系统安全技术方案决策模型的基础上,提出了一种求解信息系统安全技术方案优化问题的自适应遗传算法,使得组织能以最少的方案实施费用最大限度地处置脆弱性,并以实例说明了该算法的有效性。  相似文献   

16.
针对基于马氏距离的重要性测度存在的问题,提出了基于谱分解加权摩尔彭罗斯马氏距离的重要性测度指标,通过构造多输出协方差阵的广义逆矩阵以及谱分解的策略,有效解决了协方差阵求逆奇异情况以及由于未能充分考虑多输出之间的相互关系而导致的错误识别重要变量的问题,克服了基于马氏距离指标的局限性。数值算例与工程算例结果表明:所提重要性测度可以更加准确地获得输入变量对结构系统多输出性能随机取值特征贡献的排序,从而为可靠性设计提供充分的信息。  相似文献   

17.
提出在IBM虚拟机器的架构上,使用错误围堵策略建立可生存的网络安全设备内核的思想。建立有效的资源管理器,分割、调度机器资源,把物理资源提供给虚拟机器,平衡错误围堵与其它的性能要求。利用软件和硬件错误围堵技术制约对系统攻击引起的错误,防止一个错误引起整个系统的崩溃。用以上策略建立了内核模型,给它加上大负荷,正常和异常的工作。实验结果显示:即使在系统中某些部分出错的情况下,依然不影响系统的整体性能,并且错误围堵的开销几乎可以忽略不计。  相似文献   

18.
随着军用航空装备复杂性、安全性的提升,对广大机务维修人员安全知识结构提出了更高的要求。以某机务部队现状为依据,研究航空机务维修人员安全知识结构评价问题。利用工作分析法对航空机务维修人员的工作进行了深入分析,建立了航空机务维修人员安全知识结构指标体系,通过构建基于熵权的改进BP神经网络模型对建立的知识体系结构进行评价。以某单位实际调研数据为基础,利用MATLAB仿真实现了模型的训练和测试,对机务维修人员的安全知识结构进行量化分析,为机务人员的安全知识能力培养提供决策依据和参考。  相似文献   

19.
由于嵌入式应用环境的多样性,单纯软件或硬件安全技术或者安全产品的功能和性能都有其局限性,只能满足某类系统的特定安全需求。因此,如何有效利用软硬件技术特点,通过协同防护来保障系统的安全已成为当前信息安全领域的研究热点。通过对嵌入式系统安全威胁和隐患的分析,在此基础上提出一种可以提高嵌入式系统安全性的软硬协同安全防护技术。该技术通过硬件检测、软件处理、综合治理的方法,可以有效地增强嵌入式系统抗击本身缺陷和恶意攻击的能力。  相似文献   

20.
飞行训练保障费用是飞机使用保障费用中的重要组成部分,也是使用保障费用估算的重点和难点。结合目前航空兵部队实际工作情况,首先利用作业成本法的基本原理,对航空兵部队飞行保障阶段的作业进行划分,得出成本库及成本动因。其次针对军机飞行保障阶段的多种作业,建立基于作业成本法的飞行训练保障费用模型。最后通过算例说明其比其他估算方法所具备的优势。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号