109 research outputs found

    High-tech SMEs Financial Management

    Get PDF
    步入21世纪的今天,世界经济发生了巨大的变化,我们正经历着从工业经济向知识经济跨越的历史性阶段。各国政府纷纷把高新技术型企业作为发展的重点,以减少传统企业对有限资源的掠夺式消耗,提高产品的附加值和竞争力,增强本国的综合国力,保证国民经济的持续、快速和健康发展。但是,与知识经济时代企业飞速发展不相适应的现状是,我国企业目前落后的财务管理状况以及存在的问题。现在的财务管理模式是建立在传统工业企业基础上的,以货币、实物等物质资本的筹集,运用为核心内容,强调的是从价值角度如何实施对财务资本的管理和运用,以实现资本的增值。而忽视了知识资本对企业发展的重要作用,和知识经济时代企业以知识资本为主要经济资源的...In the 21st century,the world economy has undergone tremendous changes and we are in a historic stage from the industrial economy to the knowledge economy.In order to reduce predatory limited resources consumption of the traditional economic model,increase the added value and competitiveness of the products, enhance the country's competitiven- ess,ensure the national economy sustained,rapid and he...学位:会计硕士院系专业:厦门大学与厦门国家会计学院会计硕士专业学位联合教育中心(MPACC)_会计硕士(MPACC)学号:X200515716

    Adaptive Masquerade Intrusion Detection Algorithm Based on Fuzzy Set and Its Application in the Security of ASP Service

    Get PDF
    伪装入侵是网络信息系统中普遍存在且难于克服的安全隐患。由于用户行为的可变性,以及伪装用户行为与正常用户行为的相似性使得伪装入侵检测算法的性能提高很有限,并且对不同用户的适应能力也不好。本论文针对这些问题,在总结前人研究成果的基础上,对伪装入侵检测中的滑动窗口设置、决策量的变换、不确定性处理和自适应模型更新等方面做了深入研究。所研究的这些问题有利于提高伪装入侵检测算法对不同用户的适应能力,对不同应用场合的适应性,并提高检测算法的性能。因此,本文的研究工作具有一定的理论意义和实际应用价值。论文研究的创新之处在于:(1)给出了确定滑动窗口的方法。采用条件熵的判定方法,提出了一种确定滑动窗口大小的算法...Masquerade intrusion is a security problem that is difficult to be dealt with and it exists in many network-based information systems. Theoretically, all kinds of the anomaly detection method could be applied to detect masquerade intrusion. However, due to the variation of user action and the similarity between masquerade user and normal user, ability of the detection algorithm to adapt to differe...学位:理学博士院系专业:物理与机电工程学院物理学系_凝聚态物理学号:B20032400

    Legitimate Mechanism to Solve None-Performing Loans and Improvement Suggestion --from AMC to see their way to dispose non-performing loans by law

    Get PDF
    内容摘要中国政府为了避免如97年东南亚发生的金融风暴给国家经济带来巨大的损失,以及加强我国金融机构在世界贸易组织(WTO)环境下与外资银行在金融市场的竞争力,为此党中央、国务院在1997年11月召开了全国金融工作会议,会议决定对国有商业银行进行改革,其中的一项重要内容就是剥离国有商业银行的不良资产,从而降低银行的不良贷款比率最后实现四大国有商业银行上市融资、改善资本结构的目的,完成四大国有银行的改革。为了达到上述目的,我国于1999年先后成立了信达、华融、长城、东方资产管理公司(AssetManagementCorporation,简称AMC)分别接收了四大国有银行剥离出来的巨额不良资产。四大...Legitimate Mechanism to Solve None-Performing Loans and Improvement Suggestion --from AMC to see their way to dispose non-performing loans by law ABSTRACT: To avoid the asian financial storm in 1997 which caused great loss to the state economy and strengthen the competitiveness of our native financial organizations in the market under the WTO environment to the forgein banks,Chinese government h...学位:法律硕士院系专业:法学院法律系_经济法学学号:X20040818

    Design and Implementation of Android Smartphone's Privacy Guarding System

    Get PDF
    随着云计算、物联网以及各种Web2.0技术的快速发展,人类社会所产生的数据种类和数据规模正以前所未有的速度增长,我们已经进入大数据时代。大数据在带来各种智能化和人性化服务的同时,也使得隐私保护问题愈发严重。智能手机以其强大的多媒体应用、实时网络浏览和个性化程序应用等功能,已成为承载个人核心隐私数据的终端设备。Android作为使用量最大的智能手机操作系统,它的安全性直接影响海量智能手机用户的个人隐私安全,但是层出不穷的Android系统漏洞事件令其安全性堪忧。本文针对以上问题进行研究和分析,提出了隐私数据保护方案,设计了“隐私数据保护系统”,实现了“远程保护”子系统。 本文对大数据时代隐私保...The big data era is approaching along with blooming technologies from cloud computing, thing of Internet and various Web2.0. The services provided by big data make human life more intelligence and meantime more security issues are exposed. Smartphone, which provides rich media, networking and personalized applications, are becoming core devices that carry private information. Android plays very im...学位:工程硕士院系专业:软件学院_工程硕士(软件工程)学号:X201123098

    Design and implementation of testing platform of small form-factor pluggable transceiver based on LabVIEW

    Get PDF
    介绍了一种利用lAbVIEW构建SfP(SMAll fOrM-fACTOr PluggAblE)光模块测试平台的方法。测试平台通过读写计算机并口来映射地址上的数据,控制并口端口的逻辑电平实现计算机并口模拟I2C总线。计算机利用模拟的I2C总线与SfP光模块实现通信。分析了生产者/消费者结构队列状态机并用于设计中,该设计模式可以及时响应前面板动作或外部事件,并且使得状态机的状态变换更加灵活多变。This paper introduces a method of constructing a SFP(small form-factor pluggable) transceiver testing platform by using LabVIEW.The testing platform controls the logic level of parallel port to simulate I2C Bus by reading and writing the data of address which map to the parallel port.The computer can attach to the SFP transceiver by means of the I2C Bus.This paper also analyzes and applies queued state machine-producer consumer architecture,this kind of design style can respond to the action of front panel or external happening without delay.What's more,it can make transformation of state more flexible and changeable

    X-window应用系统的安全问题及其解决方案

    Get PDF
    通过介绍X-window应用系统的通信原理,分析Internet环境下X-window应用系统的通信安全问题,提出了一种能够保证X-win-dow实际应用安全性的解决方案,并直接应用到Web-EDA技术平台开发中。该安全通信的解决方案主要集成了主机隐藏、通信加密、二次验证等3种通信安全技术,而无须对X-window应用软件的原程序进行修改,就能解决其在Internet中通信的安全问题

    基于区间值2型模糊集的伪装入侵检测算法

    Get PDF
    由于正常用户的行为本身是变化的,且伪装用户的行为可能看起来是正常的,这种不确定性使得现有的伪装检测算法很难正确判断用户身份的真实性,从而限制了现有算法的实际应用推广.本文合理地选择用户的行为特征,并建立相应的用户可信度计算方法,采用区间值模糊集对多个特征进行可信度综合计算得到用户的最终可信度,将该值与设定的阈值比较从而判断用户是否属于伪装.理论分析及实验结果显示,与普通模糊计算相比,区间值模糊计算能有效表示及处理伪装检测中的不确定性,因而能得到比较理想的检测效果

    一种有效支持计算机取证的审计机制研究

    Get PDF
    审计机制是获取原始证据的一种主要途径,针对目前访问控制模型在审计机制设计中的不足,采用Markov链对主体访问客体的行为进行建模及预测,确定某次访问时主体的可疑程度,并根据可疑程度决定将原始证据写入不同等级的日志文件。按照这种方法生成的日志文件,能有效减小证据存储所需要的空间,缩短取证时间

    Markov Graph Model Computation and Its Application to Intrusion Detection

    Get PDF
    Markov model is usually selected as the base model of user action in the intrusion detection system (IDS). However, the performance of the IDS depends on the status space of Markov model and it will degrade as the space dimension grows. Here, Markov Graph Model (MGM) is proposed to handle this issue. Specification of the model is described, and several methods for probability computation with MGM are also presented. Based on MGM, algorithms for building user model and predicting user action are presented. And the performance of these algorithms such as computing complexity, prediction accuracy, and storage requirement of MGM are analyzed

    一种基于可信度计算的集成身份认证与访问控制的安全机制

    Get PDF
    提出了一种基于主体可信度计算的集成身份认证和访问控制的安全机制,当主体的可信度下降到某个值之后,采用一次性口令认证方法对主体进行重新认证。该安全机制能有效提高访问控制模型对冒充用户访问的检测及控制能力
    corecore