期刊文献+
共找到1,936篇文章
< 1 2 97 >
每页显示 20 50 100
基于GS1 Digital Link的Web编码构建与案例应用
1
作者 王少然 李小英 韩英玉 《保鲜与加工》 CAS 北大核心 2024年第4期49-53,60,共6页
为探索GS1 Digital Link技术在产品物流中的应用潜力,分析研究了GS1系统和GS1 Digital Link的基本结构、编码特点以及技术优势,充分利用GS1 Digital Link技术可以为产品从源头到零售整个物流过程提供相关对象的Web地址编码的特点,以鲜... 为探索GS1 Digital Link技术在产品物流中的应用潜力,分析研究了GS1系统和GS1 Digital Link的基本结构、编码特点以及技术优势,充分利用GS1 Digital Link技术可以为产品从源头到零售整个物流过程提供相关对象的Web地址编码的特点,以鲜活大闸蟹物流过程为例,构建了基于GS1 Digital Link的鲜活大闸蟹Web编码,为实现产品营销与追溯提供了标准化、动态化、多样化的编码数据支撑。 展开更多
关键词 GS1 GS1 digital Link 标准化 物流 编码 标识
下载PDF
Identification of a Printed Anti-Counterfeiting Code Based on Feature Guidance Double Pool Attention Networks
2
作者 Changhui You Hong Zheng +3 位作者 Zhongyuan Guo Tianyu Wang Jianping Ju Xi Li 《Computers, Materials & Continua》 SCIE EI 2023年第5期3431-3452,共22页
The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection qu... The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection quality of anti-counterfeiting codes and weak differentiation of anti-counterfeiting codes for high-quality counterfeits.Developing an anticounterfeiting code authentication algorithm based on mobile phones is of great commercial value.Although the existing algorithms developed based on special equipment can effectively identify forged anti-counterfeiting codes,the anti-counterfeiting code identification scheme based on mobile phones is still in its infancy.To address the small differences in texture features,low response speed and excessively large deep learning models used in mobile phone anti-counterfeiting and identification scenarios,we propose a feature-guided double pool attention network(FG-DPANet)to solve the reprinting forgery problem of printing anti-counterfeiting codes.To address the slight differences in texture features in high-quality reprinted anti-counterfeiting codes,we propose a feature guidance algorithm that creatively combines the texture features and the inherent noise feature of the scanner and printer introduced in the reprinting process to identify anti-counterfeiting code authenticity.The introduction of noise features effectively makes up for the small texture difference of high-quality anti-counterfeiting codes.The double pool attention network(DPANet)is a lightweight double pool attention residual network.Under the condition of ensuring detection accuracy,DPANet can simplify the network structure as much as possible,improve the network reasoning speed,and run better on mobile devices with low computing power.We conducted a series of experiments to evaluate the FG-DPANet proposed in this paper.Experimental results show that the proposed FG-DPANet can resist highquality and small-size anti-counterfeiting code reprint forgery.By comparing with the existing algorithm based on texture,it is shown that the proposed method has a higher authentication accuracy.Last but not least,the proposed scheme has been evaluated in the anti-counterfeiting code blurring scene,and the results show that our proposed method can well resist slight blurring of anti-counterfeiting images. 展开更多
关键词 Deep learning digital image anti-counterfeiting feature guidance image processing reprint forgery
下载PDF
A Personalized Digital Code from Unique Genome Fingerprinting Pattern for Use in Identification and Application on Blockchain
3
作者 Isaac Kise Lee 《Computational Molecular Bioscience》 CAS 2023年第1期1-20,共20页
With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each ... With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each individual and does not change over time. Genetic information has been used to identify individuals in a variety of contexts, such as criminal investigations, paternity tests, and medical research. In this study, each individual’s genetic makeup has been formatted to create a secure, unique code that incorporates various elements, such as species, gender, and the genetic identification code itself. The combinations of markers required for this code have been derived from common single nucleotide polymorphisms (SNPs), points of variation found in the human genome. The final output is in the form of a 24 numerical code with each number having three possible combinations. The custom code can then be utilized to create various modes of identification on the decentralized blockchain network as well as personalized services and products that offer users a novel way to uniquely identify themselves in ways that were not possible before. 展开更多
关键词 Genomic Fingerprint digital code SNP’s Auxiliary code Marker Selection Blockchain WEB3.0 Decentralized Identification (DID)
下载PDF
Digital coherent detection research on Brillouin optical time domain reflectometry with simplex pulse codes 被引量:7
4
作者 郝蕴琦 叶青 +2 位作者 潘政清 蔡海文 瞿荣辉 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期253-256,共4页
The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensi... The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensing system. The time domain signal of every code sequence is collected by the data acquisition card (DAQ). A shift-averaging technique is applied in the frequency domain for the reason that the local oscillator (LO) in the coherent detection is fix-frequency deviated from the primary source. With the 31-bit simplex code, the signal-to-noise ratio (SNR) has 3.5-dB enhancement with the same single pulse traces, accordant with the theoretical analysis. The frequency fluctuation for simplex codes is 14.01 MHz less than that for a single pulse as to 4-m spatial resolution. The results are believed to be beneficial for the BOTDR performance improvement. 展开更多
关键词 Brillouin optical time domain reflectometry digital coherent detection simplex pulse codes signal-to-noise ratio
下载PDF
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
5
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
下载PDF
DIFFERENTIAL AMPLITUDE PHASE SHIFT KEYING: A NEW MODULATION METHOD FOR TURBO CODE IN DIGITAL RADIO BROADCASTING 被引量:2
6
作者 Khalid H. Sayhood Wu Lenan (Radio Engineering Department, Southeast University, Nanjing 210096) 《Journal of Electronics(China)》 2003年第2期86-96,共11页
The multilevel modulation techniques nf M-Differential Amplitude Phase Shift Keying (DAPSK) have been proposed in combination with Turbo code scheme for digital radio broadcasting bands below 30 MHz radio channel. Com... The multilevel modulation techniques nf M-Differential Amplitude Phase Shift Keying (DAPSK) have been proposed in combination with Turbo code scheme for digital radio broadcasting bands below 30 MHz radio channel. Comparison of this modulation method with channel coding in an Additive White Gaussian Noise (AWGN) and multi-path fading channels has been presented. The analysis provides an iterative decoding of the Turbo code. 展开更多
关键词 DAPSK system Turbo code digital radio broadcasting
下载PDF
PERFORMANCE EVALUATION OF LOW DENSITY PARITY CHECK CODES FOR DIGITAL RADIO MONDIALE (DRM) SYSTEM 被引量:2
7
作者 Wang Jiaqing Yu Xiaoyan Wu Lenan 《Journal of Electronics(China)》 2006年第2期189-192,共4页
In Digital Radio Mondiale (DRM) system, achieving good audio quality becomes a challenge due to its limited band-width of 9 or 10kHz and the very bad lading channels. Therefore, DRM needs highly efficient channel co... In Digital Radio Mondiale (DRM) system, achieving good audio quality becomes a challenge due to its limited band-width of 9 or 10kHz and the very bad lading channels. Therefore, DRM needs highly efficient channel coding schemes. This paper, proposes the schemes which use the Low-Density Parity-Check (LDPC) coded Bit-Interleaved Coded Modulation (BICM) schemes for the implementation of DRM systems. Simulation results show that the proposed system is more efficient than the Rate Compatible Punctured Convolutional (RCPC) coded DRM system on various broadcast channels, and may be recommended as a coding technology for Digital Amplitude Modulation Broadcasting (DAMB) systems of China. 展开更多
关键词 Low-Density Parity-Check (LDPC) codes digital Radio Mondiale (DRM) Bit Interleaved coded Modulation (BICM) Orthogonal Frequency Division Multiplexing (OFDM)
下载PDF
Modulation for Digital Radio Broadcasting Using Amplitude Autocorrelation of Pseudo Random Noise Codes to Carry Information
8
作者 Fabrício de Araújo Carvalho Fernando Walter 《Communications and Network》 2013年第3期57-64,共8页
The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the ... The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the results of a proposed modulation using a variation of the autocorrelation of pseudo-random codes to carry information. The work also presents the generation of multiple orthogonal axes to increase the bit rate thus improving the channel efficiency. 展开更多
关键词 digital Radio Broadcasting Spectral Efficiency Pseudo Random codes CDMA SDR
下载PDF
Digital Number的数学表达问题
9
作者 张行清 庞芳 +2 位作者 姚振东 李昭春 张行明 《中国科技术语》 2020年第6期77-85,共9页
Digital Number(DN)是信息科学关于信息采集的术语,需要界定和理顺DN各方面的关系,解决DN在遥感技术、数学、计算机科学的表达问题。阐述DN基本认识及其应有常态,给出DN名称和DN含义,梳理DN来源及其演变,明确DN与模拟量关系、DN与数值... Digital Number(DN)是信息科学关于信息采集的术语,需要界定和理顺DN各方面的关系,解决DN在遥感技术、数学、计算机科学的表达问题。阐述DN基本认识及其应有常态,给出DN名称和DN含义,梳理DN来源及其演变,明确DN与模拟量关系、DN与数值关系及DN与非DN界限,陈述数字结构、数字标识及不同系统层面DN,形成10方面正面共识,供分析对照。对DN表达问题归纳为DN代表关系、技术关系、数学关系、数值关系、标识关系5种类型,分析这些相应关系的表达缺陷,对DN有关方面做表达示范。创新成果:界定DN与模拟量关系;归纳DN的感性错误与其错误导向关系;重新解释数值及数值类型,对数值做定义,数值类型应包括DN分支,数值应包括DN来源成员;完善DN、数值及非数值式中参数的相应描述;规范数字术语在数字技术及数学的使用。达到提高DN及其关联的认识,促进数学的发展,利于消除遥感技术、数学、计算机科学出现的DN各种表达问题。 展开更多
关键词 数字编码 DN 表达 模拟量 数值 数值类型
下载PDF
Digital signature systems based on smart card and fingerprint feature 被引量:3
10
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
下载PDF
A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment 被引量:2
11
作者 LIU Quan WANG Jin (School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S2期552-556,共5页
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th... In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 展开更多
关键词 network manufacture COPYRIGHT protection digital WATERMARKING wavelet transform error CORRECTING coding chaotic ENCRYPTION
下载PDF
Adaptive Digital Predistortion Schemes to Linearize RF Power Amplifiers with Memory Effects 被引量:2
12
作者 张鹏 吴嗣亮 张钦 《Journal of Beijing Institute of Technology》 EI CAS 2008年第2期217-221,共5页
To compensate for nonlinear distortion introduced by RF power amplifiers (PAs) with memory effects, two correlated models, namely an extended memory polynomial (EMP) model and a memory lookup table (LUT) model, ... To compensate for nonlinear distortion introduced by RF power amplifiers (PAs) with memory effects, two correlated models, namely an extended memory polynomial (EMP) model and a memory lookup table (LUT) model, are proposed for predistorter design. Two adaptive digital predistortion (ADPD) schemes with indirect learning architecture are presented. One adopts the EMP model and the recursive least square (RLS) algorithm, and the other utilizes the memory LUT model and the least mean square (LMS) algorithm. Simulation results demonstrate that the EMP-based ADPD yields the best linearization performance in terms of suppressing spectral regrowth. It is also shown that the ADPD based on memory LUT makes optimum tradeoff between performance and computational complexity. 展开更多
关键词 adaptive digital predistortion power amplifiers memory polynomial lookup table wideband code division multiple access (WCDMA)
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
13
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code digital watermarking MLUT(modifled look-up table)
下载PDF
The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model
14
作者 Sergey Bezzateev Natalia Voloshina 《Journal of Computer and Communications》 2014年第9期121-126,共6页
The algorithm of fingerprint constructing for still images based on weighted image structure model is proposed. The error correcting codes that are perfect in weighted Hamming metric are used as a base for fingerprint... The algorithm of fingerprint constructing for still images based on weighted image structure model is proposed. The error correcting codes that are perfect in weighted Hamming metric are used as a base for fingerprint constructing. 展开更多
关键词 Fingerprinting Error CORRECTING codeS Perfect codeS in WEIGHTED Hamming METRIC WEIGHTED Container Model digital RIGHTS Management
下载PDF
Design of Digital Hybrid Chaotic Sequence Generator
15
作者 饶妮妮 曾东 《Journal of Electronic Science and Technology of China》 2004年第1期14-16,75,共4页
The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high... The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos. 展开更多
关键词 digital hybrid chaotic sequence GENERATOR VHDL code divided multiple access(CDMA)
下载PDF
Digital Video Stabilization System by Adaptive Fuzzy Filtering
16
作者 Mohammad Javad Tanakia~ Mehdi Rezaei Farahnaz Mohanna 《通讯和计算机(中英文版)》 2012年第10期1206-1212,共7页
关键词 自适应补偿 模糊滤波 稳定系统 数字视频 自适应模糊系统 全局运动估计 相机运动 无限脉冲响应
下载PDF
数字资本主义技术代码视域下功绩主体的自我剥削与自由悖论 被引量:4
17
作者 姜英华 《东北师大学报(哲学社会科学版)》 CSSCI 北大核心 2024年第1期25-32,共8页
数字技术作为数字资本主义的重要基点,既承载了数字生产力的纯粹要素方面,也维持和重塑着数字生产关系。数字资本主义的技术代码表征了数字技术生产力与生产关系、技术需求与社会需求的内聚统一,形塑了数字资本主义下崭新的功绩社会。... 数字技术作为数字资本主义的重要基点,既承载了数字生产力的纯粹要素方面,也维持和重塑着数字生产关系。数字资本主义的技术代码表征了数字技术生产力与生产关系、技术需求与社会需求的内聚统一,形塑了数字资本主义下崭新的功绩社会。功绩社会下,驯化主体被功绩主体所代替,功绩主体将传统的否定禁止和他者剥削翻转为肯定示好和自我剥削,自我剥削打着自我发展、自我实现、自我优化和自我完善的幌子,实际却是自我征服、自我促逼、自我耗散和自我毁灭,由此呈现出自由的功绩主体不自由的悖论景象。对此,我们需要求教和回归马克思历史唯物主义和技术批判的原则方法,透视和掌握数字资本主义的技术代码和技术本质,识破功绩主体自我剥削的不自由真相,分析其深层本质和致因逻辑,并在此基础上阐明一种真正自由的可能的未来方向。 展开更多
关键词 数字资本主义 技术代码 功绩主体 自我剥削 自由辩证法
下载PDF
智慧教育对受教育权的变革及其在教育法典中的表达 被引量:1
18
作者 刘璞 薛雅如 《湖南师范大学教育科学学报》 CSSCI 北大核心 2024年第3期106-112,122,共8页
数字技术正在推动传统教育向智慧教育蜕变,以智慧教育为显著特征的全球教育发展新格局正在形成。受教育权被赋予新的内涵,受教育机会权兼有“入学机会”和“数字教育机会”,受教育条件权从获得“物理条件”向“虚拟资源”延伸,受教育结... 数字技术正在推动传统教育向智慧教育蜕变,以智慧教育为显著特征的全球教育发展新格局正在形成。受教育权被赋予新的内涵,受教育机会权兼有“入学机会”和“数字教育机会”,受教育条件权从获得“物理条件”向“虚拟资源”延伸,受教育结果权的评价方式从“结果评价”变为“过程评价”。为适应权利保障诉求,教育立法价值取向应从保障“社会权为核心的受教育权”发展为追求“自由权为主的学习权”,兼顾“教育机会均等”与“公平优质教育”,从“教育管理法”向“国家教育管理权与个人受教育权的平衡法”发展。教育法典编纂应对智慧教育模式下受教育权新内涵做出回应,加大公平优质教育的制度供给;增加保障教育选择自由权的制度;确立数字教育保障制度和数字教育隐私保护制度;纳入非制度化教育与终身学习法律制度,保障教育活动中的自由权,实现人的全面发展。 展开更多
关键词 智慧教育 受教育权 数字化 教育法典 公平优质教育 价值取向
下载PDF
基于上下文词预测和窗口压缩编码的数字水印方法
19
作者 向凌云 黄明豪 +1 位作者 张晨凌 杨春芳 《通信学报》 EI CSCD 北大核心 2024年第2期213-224,共12页
针对已有自然语言数字水印方法可替换词数量有限以及水印提取效率低的问题,提出了一种基于上下文词预测和窗口压缩编码的数字水印方法。该方法通过神经网络语言模型自动学习原始文本中每个词的上下文语义特征,预测每个词的候选词列表,... 针对已有自然语言数字水印方法可替换词数量有限以及水印提取效率低的问题,提出了一种基于上下文词预测和窗口压缩编码的数字水印方法。该方法通过神经网络语言模型自动学习原始文本中每个词的上下文语义特征,预测每个词的候选词列表,从而扩充可用于嵌入水印信息的可替换词数量。同时,考虑到不同位置的候选词的替换对句子语义的影响存在差异,该方法以由多个词组成的窗口为单位来嵌入水印信息,并通过词替换前后句子间的相似度来优化水印嵌入时候选词的选择。在此基础上,提出了一种语义无关的窗口压缩编码方法,其根据窗口中词的字符信息对窗口进行水印编码,解决了提取水印信息时对词替换位置的原始上下文的依赖。实验结果表明,所提方法在具有较高嵌入容量和文本质量的前提下,大大提高了水印的提取效率。 展开更多
关键词 数字水印 词替换 词预测 水印编码
下载PDF
广东省东莞市生猪及其产品质量安全信息化监管模式
20
作者 杨振波 潘杰 +4 位作者 李小军 林其明 赖笑娴 刘烺 钟亮宁 《中国动物检疫》 CAS 2024年第9期45-49,共5页
为解决猪肉产品消费环节与生猪养殖环节信息脱钩的问题,东莞市以数字喷码技术为基础,探索建立了生猪及其产品质量安全信息化监管模式,打通了从生猪养殖到猪肉产品消费各环节的信息关联,实现了生猪屠宰及肉产品质量安全可追溯和全产业链... 为解决猪肉产品消费环节与生猪养殖环节信息脱钩的问题,东莞市以数字喷码技术为基础,探索建立了生猪及其产品质量安全信息化监管模式,打通了从生猪养殖到猪肉产品消费各环节的信息关联,实现了生猪屠宰及肉产品质量安全可追溯和全产业链智慧监管。经东莞市2个生猪屠宰场及4个农贸市场试点证实,该模式可行有效,既节省了屠宰加工企业经营成本,又提高了肉产品价值,同时也提高了监管机构监管效率,使动物检疫行为更加规范,动物疫病防控能力得到增强,保障了东莞市猪肉肉产品质量卫生安全。东莞市的全过程信息化监管模式为其他地区的生猪产品信息化监管提供了借鉴。 展开更多
关键词 畜禽产品质量安全 智慧监管 数字喷码技术 信息化
下载PDF
上一页 1 2 97 下一页 到第
使用帮助 返回顶部