首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
基于中文文献的反恐情报研究分析   总被引:1,自引:0,他引:1  
目前我国面临着严峻的反恐形势,面对恐怖主义的威胁,反恐方必须加强情报在反恐中的应用。基于文献分析的视角,采用定性分析的方法,对我国反恐情报相关研究的现状进行了分析,总结概括了国内反恐情报研究的相关基础理论、关键要素及情报保障等内容,并对目前的研究现状给予了简要的评析,为我国反恐情报的进一步研究提供借鉴和参考。  相似文献   

2.
[研究目的]对恐怖分子的时空轨迹数据进行聚集模式挖掘,有助于了解涉恐人员的群体行为模式,进而预测并提前防范一些涉恐的群体活动。[研究方法]通过对比反恐情报数据特征和多种聚集模式的特点,选择移动簇作为反恐情报中的聚集模式类型,修改移动簇挖掘经典方法中的数据采样、数据预处理、移动对象邻近度度量方法、时间点聚类方法以及移动簇的筛选条件等环节,找出适用于反恐工作需求的移动簇,再由有经验的情报分析人员进一步研判并提出处置对策。[研究结论]提出的方法通过与其他时空类型数据分析方法相结合,可以挖掘反恐情报时空轨迹数据分布规律,为反恐预警和反恐决策提供科学客观的参考。  相似文献   

3.
计算机网络技术的不断发展与完善,其在情报中的应用越来越广。情报是企业之间竞争的关键因素,在现在大数据时代,如何提高企业情报的准确性、及时性、可靠性是企业发展的核心,主要从大数据的内涵及特征分析、大数据环境下企业对竞争情报的需求分析、大数据对企业竞争情报的影响、大数据时代企业竞争情报的发展趋势及对策分析了大数据时代企业竞争情报研究的创新与发展,希望能为研究企业竞争情报工作者提供理论参考依据。  相似文献   

4.
李勇男  梅建明  秦广军 《情报科学》2017,35(11):103-107
【目的/意义】近年来,世界各地的暴恐活动呈现出破坏性大、影响范围广、计划性强、手段多样等特点,这也 决定了打击恐怖主义要把反恐预警工作作为重中之重。利用数据挖掘技术进行涉恐情报分析,发现涉恐线索是实 现反恐预警的有效手段之一。数据预处理是使用各种数据挖掘方法的前提和基础。【方法/过程】本文将系统研究 数据预处理在涉恐情报量化分析中的应用。主要讨论数据清洗、数据集成、数据离散化以及数据二元化等预处理 方法在涉恐信息处理时应该重点注意的问题。文中所有涉恐数据特征均从媒体公开报道中获取。【结果/结论】本 文讨论的预处理方法可以为展开涉恐情报数据挖掘消除数据缺陷,提供标准化的基础数据,为挖掘结果分析和可 视化展现打下良好基础,有利于反恐预警的实现。  相似文献   

5.
赵发珍 《现代情报》2009,40(2):168-177
应急情报为政府在突发事件中的应急决策提供了科学、有效的支持。突发事件中的应急情报研究涉及应急管理、信息技术、情报学等多个学科领域,具有多学科交叉的特点。本文系统梳理了我国突发事件中的应急情报研究相关文献,从应急情报理论基础研究(应急情报角色与定位、应急情报过程及其体系、应急情报驱动下的应急决策等)、大数据环境下的应急情报研究、面向各领域突发事件中的应急情报应用研究3方面进行综述。研究表明,该领域还存在基础概念有待厘清、缺乏宏观层次的整体性研究、规范性讨论较多,实证性检验不足等问题。另外,本文还从应急情报与社会计算融合、非常规突发事件的应急情报研究、总体国家安全观视角下的应急情报研究等方面对该领域未来的研究进行了展望。  相似文献   

6.
[研究目的]从区块链思维出发,对竞争情报联盟运行机制展开研究,为竞争情报在合作网络中的共享提供保障。[研究方法]首先,分析区块链思维应用至竞争情报联盟中的优势;其次,构建基于区块链思维的竞争情报联盟运行机制并运用系统动力学的方法仿真分析;最后,对区块链思维运用至竞争情报联盟中的案例进行分析。[研究结论]在竞争情报联盟运作中引入区块链思维对竞争情报资源共享的实现具有重要的指导意义,同时企业员工与政府机构参与比重、大数据技术与共享平台应用率、规范性制度与文化建设等要素对竞争情报联盟的稳定运作存在正向作用。  相似文献   

7.
数据挖掘能在浩如烟海的信息中找到恐怖分子留下的蛛丝马迹.关联分析与序列模式分析,分类分析与聚类分析是数据挖掘在情报主导反恐中的核心应用.恐怖主义信息分析中的数据挖掘流程一般由恐怖主义问题识别、数据准备、数据挖掘、模式评估与知识表达四个主要阶段构成.贝叶斯信念网络是情报主导反恐工作中适用的一个数据挖掘工具.  相似文献   

8.
从局部战争、联合演习和反恐行动3个方面,介绍了地理空间情报在现代军事行动中的作用,认为数字战场三维化、地理空间情报网络化、多源情报集成化是地理空间情报发展趋势,并预测了地理空间情报在未来军事上应用将面临的挑战.  相似文献   

9.
李勇男 《情报杂志》2021,(2):90-94,68
[目的/意义]对多源异构时空数据进行同现模式挖掘可以发现涉恐人员、涉恐物资、涉恐活动在邻近地点同时段共同出现的规律,为反恐工作提供包含时间特征和空间特征的情报信息。[方法/过程]在同位模式挖掘的基础上提出预先确定目标情报类别从而确定涉恐人员分类方式,使用概念层次树对涉恐物资和涉恐活动进行数据预处理,使得目标同现模式覆盖更多情报信息。[结果/结论]该方法与同位模式挖掘、频繁时间序列模式挖掘以及各种时空轨迹模式挖掘可以相互补充,覆盖多种不同的反恐情报信息,完善反恐预警机制,为反恐决策提供客观依据。  相似文献   

10.
根据当前国内外反恐斗争的特殊性、复杂性和艰巨性,结合我国智慧城市建设成果,探索其与反恐预警机制建设有机结合,并利用大数据等技术架构了反恐情报信息汇聚平台和智能分析平台。实践证明,情报工作是反恐斗争的生命线。根据大数据的特点对城市海量信息进行分类处理,设置攻击目标、时间、规模、方式等参数,经智能系统进行信息融合、情报分析、数据挖掘和数据筛选;以“情报、预警、预案”三位一体,构建三个层级的反恐预警机制,完善城市反恐预警机制,提升城市反恐预警能力。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号