scholarly journals Design and Development of Maritime Data Security Management Platform

2022 ◽  
Vol 12 (2) ◽  
pp. 800
Author(s):  
Yunong Zhang ◽  
Anmin Zhang ◽  
Dianjun Zhang ◽  
Zhen Kang ◽  
Yi Liang

Since the e-Navigation strategy was put forward, various countries and regions in the world have researched e-Navigation test platforms. However, the sources of navigation data are multi-source, and there are still difficulties in the unified acquisition, processing, analysis and application of multi-source data. Users often find it difficult to obtain the required comprehensive navigation information. The purpose of this paper is to use e-Navigation architecture to design and develop maritime data security management platform, strengthen navigation safety guarantee, strengthen Marine environment monitoring, share navigation and safety information, improve the ability of shipping transportation organizations in ports, and protect the marine environment. Therefore, this paper proposes a four-layer system architecture based on Java 2 Platform Enterprise Edition (J2EE) technology, and designs a unified maritime data storage, analysis and management platform, which realizes the intelligent, visualized and modular management of maritime data at shipside and the shore. This platform can provide comprehensive data resource services for ship navigation and support the analysis and mining of maritime big data. This paper expounds on the design, development scheme and demonstration operation scheme of the maritime data security management platform from the system structure and data exchange mode.

2016 ◽  
Vol 10 (1) ◽  
pp. 4-10 ◽  
Author(s):  
Hamid Moghaddasi ◽  
Samad Sajjadi ◽  
Mehran Kamkarhaghighi

Introduction:Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology.Background:The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management.Findings:Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability.Conclusion:Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.


2018 ◽  
Vol 28 (6) ◽  
pp. 1887-1891
Author(s):  
Todor Kalinov

Management and Command253 are two different words and terms, but military structures use them as synonyms. Military commanders’ authorities are almost equal in meaning to civilian managers’ privileges and power. Comparison between military command and the civilian management system structure, organization, and way of work shows almost full identity and overlapping. The highest in scale and size military systems are national ministries of defense and multinational military alliances and coalitions. Military systems at this level combine military command structures with civilian political leadership and support elements. Therefore, they incorporate both military command and civilian management organizations without any complications, because their nature originated from same source and have similar framework and content. Management of organizations requires communication in order to plan, coordinate, lead, control, and conduct all routine or extraordinary activities. Immediate long-distance communications originated from telegraphy, which was firstly applied in 19th century. Later, long-distance communications included telephony, aerial transmitting, satellite, and last but not least internet data exchange. They allowed immediate exchange of letters, voice and images, bringing to new capabilities of the managers. Their sophisticated technical base brought to new area of the military command and civilian management structures. These area covered technical and operational parts of communications, and created engineer sub-field of science, that has become one of the most popular educations, worldwide. Communications were excluded from the military command and moved to separate field, named Computers and Communications. A historic overview and analysis of the command and management structures and requirements shows their relationships, common origin, and mission. They have significant differences: management and control are based on humanities, natural and social sciences, while communications are mainly based on engineering and technology. These differences do not create enough conditions for defragmentation of communications from the management structures. They exist together in symbiosis and management structures need communications in order to exist and multiply their effectiveness and efficiency. Future defragmentation between military command and communications will bring risks of worse coordination, need for more human resources, and worse end states. These risks are extremely negative for nations and should be avoided by wide appliance of the education and science among nowadays and future leaders, managers, and commanders.


1982 ◽  
Vol 7 (3) ◽  
pp. 217-227 ◽  
Author(s):  
U Bussolati ◽  
G Martella

2003 ◽  
Vol 9 (1_suppl) ◽  
pp. 48-50 ◽  
Author(s):  
P Soegner ◽  
Th Rettenbacher ◽  
A Smekal ◽  
D Zur Nedden

summary The Tyrolean telemedicine pilot project linked the University Clinic of Innsbruck and the district hospital in Reutte. Five medical specialties were investigated: teleradiology, telepathology, teledermatology, tele-ophthalmology and tele-oncology. A Tyrolean ‘four-column model of quality management in telemedicine’ was introduced to ensure a global view of the project and to avoid mistakes. In teleradiology, a 12-step workflow was developed, which described the medical responsibilities at each stage. We found that the defined teleradiology workflow and the technical equipment for data security and data exchange worked without problems in over 79% of a total of 424 cases. To ensure continuous quality assurance, the whole teleradiology workflow was ISO 9001:2000 certified.


2021 ◽  
Vol 2066 (1) ◽  
pp. 012022
Author(s):  
Cheng Luo

Abstract Due to the continuous development of information technology, data has increasingly become the core of the daily operation of enterprises and institutions, the main basis for decision-making development. At the same time, due to the development of network, the storage and management of computer data has attracted more and more attention. Aiming at the common problems of computer data storage and management in practical work, this paper analyzes the object and content of data management, investigates the situation of computer data storage and management in China in recent two years, and interviews and tests the data of programming in this design platform. At the same time, in view of the related problems, the research results are applied to practice. On the basis of big data, the storage and management platform is designed. The research and design adopts a special B+ tree node linear structure of CIRC tree, and the linear node structure is changed into a ring structure, which greatly reduces the number of data persistence instructions and the performance overhead. The results show that compared with the most advanced B+ tree design for nonvolatile memory, crab tree has 3.1 times and 2.5 times performance improvement in reading and writing, respectively. Compared with the previous NV tree designed for nonvolatile memory, it has a performance improvement of 1.5 times, and a performance improvement of 8.4 times compared with the latest fast-fair. In the later stage, the expansion of the platform functions is conducive to the analysis and construction of data related storage and management functions, and further improve the ability of data management.


2019 ◽  
Vol 12 (2) ◽  
pp. 44-58
Author(s):  
Agung Tri Safari

Submission of Customs Declaration including matters regulated in the Customs Law. Furthermore, this matter is further elaborated based on the Minister of Finance Regulation. Customs Declaration can be submitted in writing on the form or in the form of Electronic Data. For those in the form of Electronic Data, it is delivered by submitting Electronic Data storage media in the form of diskettes or etc  to the Customs Office or through an Electronic Data exchange system. DJBC has issued a policy related to the full implementation (Mandatory) of the submission of customs declaration documents through the PDE system based on KEP-415 / BC / 2016 and began to be implemented effectively on January 1, 2019. The purpose of this study is to evaluate whether this policy can be applied in all regions of Indonesia This research is descriptive with a qualitative approach. Based on secondary data, not all regions of Indonesia are affordable to the internet network. The constraints on the availability of infrastructure are a necessity that must be anticipated. The results of this discussion can be input into the improvement of related policies.


Sign in / Sign up

Export Citation Format

Share Document