期刊文献+
共找到83篇文章
< 1 2 5 >
每页显示 20 50 100
Can whole steps of grain production be outsourced? Empirical analysis based on the three provinces of Jiangsu,Jilin,and Sichuan in China
1
作者 Jiacheng Liu Shengzhi Mao +1 位作者 Qiufen Zheng Zhigang Xu 《Journal of Integrative Agriculture》 SCIE CSCD 2024年第1期336-347,共12页
Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services obs... Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services observed in harvesting,land preparation,and sowing.This study examines the feasibility of implementing whole-step outsourcing in grain production by conducting a case study of rice and maize production in Jiangsu,Jilin,and Sichuan provinces in China.The provision of outsourcing services hinges on two essential conditions:technological advancements fostering specialized production and economies of scale,coupled with a market size sufficient to realize the aforementioned potential economies of scale.The results showed that outsourcing pest control or harvesting services had varying economies of scale.The outsourcing services in pest control were less common than in harvesting services,and their marginal growth space of the economies of scale with technological change was also smaller.Determined by the operational characteristics of pest control itself,the market scale of its professional services is small.Therefore,achieving the whole-step outsourcing of grain production necessitates not only technological innovation but also effective policy interventions to overcome the constraints of market scale.Such interventions include(1)optimizing crop layouts between planning regions and reducing land fragmentation and(2)supplying timely and effective inter-regional agricultural information for service providers aided by information technology. 展开更多
关键词 outsourcing services economy of scale technical conditions market scale
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
2
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
3
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Research on the Status Quo and Countermeasures of Human Resource Management Outsourcing in China’s Pharmaceutical Enterprises
4
作者 Wang Jianing Wang Shuling 《Asian Journal of Social Pharmacy》 2024年第1期64-71,共8页
Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current sit... Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns. 展开更多
关键词 pharmaceutical enterprise human resource management outsourcing countermeasure research
下载PDF
Breeding against mycorrhizal symbiosis:Modern cotton (Gossypium hirsutum L.) varieties perform more poorly than older varieties except at very high phosphorus supply levels
5
作者 WANG Xin-xin ZHANG Min +2 位作者 SHENG Jian-dong FENG Gu Thomas W.KUYPER 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第3期701-715,共15页
Cotton (Gossypium hirsutum L.) is an importantfiber cash crop,but its root traits related to phosphorus (P) acquisition,including mycorrhizal root traits,are poorly understood.Eight cotton varieties bred in northweste... Cotton (Gossypium hirsutum L.) is an importantfiber cash crop,but its root traits related to phosphorus (P) acquisition,including mycorrhizal root traits,are poorly understood.Eight cotton varieties bred in northwestern China that were released between 1950 and 2013 were grown in pots with or without one arbuscular mycorrhizal fungal (AMF) species(Funneliformis mosseae) at three P supply levels (0,50 and 300 mg P as KH_(2)PO_(4)kg^(-1)).Eleven root traits were measured and calculated after 7 wk of growth.The more recent accessions had smaller root diameters,acquired less P and produced less biomass,indicating an (inadvertent) varietal selection for thinner roots that provided less cortical space for AMF,which then increased the need for a high P fertilizer level.At the two lower P levels,the mycorrhizal plants acquired more P and produced more biomass than non-mycorrhizal plants (3.2 vs.0.9 mg P per plant;1.8 vs.0.9 g biomass per plant at P_(0);14.5 vs.1.7 mg P per plant;and 4.7 vs.1.6 g biomass per plant at P_(50)).At the highest P level,the mycorrhizal plants acquired more P than non-mycorrhizal plants (18.8 vs.13.4 mg per P plant),but there was no difference in biomass (6.2 vs.6.3 g per plant).At the intermediate P level,root diameter was significantly positively correlated with shoot biomass,P concentration and the P content of mycorrhizal plants.The results of our study support the importance of the outsourcing model of P acquisition in the root economics space framework.Inadvertent varietal selection in the last decades,resulting in thinner roots and a lower benefit from AMF,has led to a lower productivity of cotton varieties at moderate P supply (i.e.,when mycorrhizal,the average biomass of older varieties 5.0 g per plant vs.biomass of newer varieties 4.4 g per plant),indicating the need to rethink cotton breeding efforts in order to achieve high yields without very high P input.One feasible way to solve the problem of inadvertent varietal selection for cotton is to be aware of the trade-offs between the root do-it-yourself strategy and the outsourcing towards AMF strategy,and to consider both morphological and mycorrhizal root traits when breeding cotton varieties. 展开更多
关键词 cotton varieties plant breeding arbuscular mycorrhizal fungi root economics space OUTSOURCING phosphorus acquisition
下载PDF
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
6
作者 Atif Ikram Masita Abdul Jalil +3 位作者 Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan 《Computers, Materials & Continua》 SCIE EI 2023年第3期5035-5048,共14页
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most... The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development only.Several frameworks have been developed focusing on guiding software systemmanagers concerning offshore software outsourcing.However,none of these studies delivered comprehensive guidelines for managing the whole process of OSMO.There is a considerable lack of research working on managing OSMO from a vendor’s perspective.Therefore,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s perspective.This study validated the preliminary OSMO process model via a case study research approach.The results showed that the OSMO process model is applicable in an industrial setting with few changes.The industrial data collected during the case study enabled this paper to extend the preliminary OSMO process model.The refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk. 展开更多
关键词 Offshore outsourcing process model model validation vendor challenges case study
下载PDF
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
7
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2023年第1期1871-1886,共16页
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different w... Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and value.One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’projects.The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients.The projects belong to OSMO vendors,having offices in developing countries while providing services to developed countries.In the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed model.The proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden layers.The results express that the suggested model has gained a notable recognition rate in comparison to any previous studies.The current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment. 展开更多
关键词 Software outsourcing deep extreme learning machine(DELM) machine learning(ML) extreme learning machine ASSESSMENT
下载PDF
Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption
8
作者 Chen Wang Jian Xu +2 位作者 Jiarun Li Yan Dong Nitin Naik 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1421-1436,共16页
Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new sys... Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new system employing an outsourced privacy-preserving kNN Classifier Model based on Multi-Key Homomorphic Encryption(kNNCM-MKHE).We firstly propose a security protocol based on Multi-key Brakerski-Gentry-Vaikuntanathan(BGV)for collaborative evaluation of the kNN classifier provided by multiple model owners.Analyze the operations of kNN and extract basic operations,such as addition,multiplication,and comparison.It supports the computation of encrypted data with different public keys.At the same time,we further design a new scheme that outsources evaluation works to a third-party evaluator who should not have access to the models and data.In the evaluation process,each model owner encrypts the model and uploads the encrypted models to the evaluator.After receiving encrypted the kNN classifier and the user’s inputs,the evaluator calculated the aggregated results.The evaluator will perform a secure computing protocol to aggregate the number of each class label.Then,it sends the class labels with their associated counts to the user.Each model owner and user encrypt the result together.No information will be disclosed to the evaluator.The experimental results show that our new system can securely allow multiple model owners to delegate the evaluation of kNN classifier. 展开更多
关键词 Outsourced privacy-preserving multi-key HE machine learning KNN
下载PDF
On Incentive and Coordination Mechanism of Service Outsourcing Based on Principal-Agent Theory and Blockchain Technology
9
作者 Chenglong Yan Xiao Wang +1 位作者 Xiaonan Zhang Ruzhi Xu 《Journal of Artificial Intelligence and Technology》 2023年第1期1-9,共9页
To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-... To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-agent framework,examines the dynamic game situation before the contract being signed,and develops four information models.The analysis reveals a Pareto improvement in the game’s Nash equilibrium when comparing the four models from the standpoint of the supply chain.In the complete information scenario,the service level of the service provider,the customer company’s incentive effectiveness,and the supply chain system’s ultimate profit are all maximized.Furthermore,a coordinating mechanism for disposable profit is built in this study.The paper then suggests a blockchain-based architecture for the service outsourcing process supervision and a distributed incentive mechanism under the coordination mechanism in response to the inadequacy of the principal-agent theory to address the information asymmetry problem and the moral hazard problem.The experiment’s end findings demonstrate that both parties can benefit from the coordination mechanism,and the application of blockchain technology can resolve these issues and effectively encourage service providers. 展开更多
关键词 service outsourcing coordination mechanism distributed incentive mechanism blockchain
下载PDF
通过战略合作管理企业信息技术资源——企业信息系统外包及其ASP模式分析 被引量:9
10
作者 武芳 严丽芳 《管理工程学报》 CSSCI 2002年第2期72-74,共3页
本文在综述企业信息系统外包发展的基础上 ,初步探讨了企业如何建立和管理企业与“承包商”之间的战略联盟问题 ;最后论述了目前流行的电子商务环境下的外包形式—应用服务提供商ASP的相关问题及其在中国的应用实践。
关键词 IT应用服务外包outsourcing 承包商 战略联盟 应用服务提供商ASP
下载PDF
高校档案数字化外包的安全风险研究 被引量:3
11
作者 石剑文 《兰台内外》 2017年第2期16-17,共2页
外包(outsourcing),最早源于工业企业的一种新的经营管理理念、方法。它是企业将本应由企业人员负责的业务包转给专业服务提供商,借助外部专业资源实现对相关业务的高效经营和管理。近年来,随着档案信息化建设的飞速发展,档案数字化... 外包(outsourcing),最早源于工业企业的一种新的经营管理理念、方法。它是企业将本应由企业人员负责的业务包转给专业服务提供商,借助外部专业资源实现对相关业务的高效经营和管理。近年来,随着档案信息化建设的飞速发展,档案数字化技术短板日益显现,越来越多的机构将档案数字化业务外包给专业机构。 展开更多
关键词 档案数字化 大学档案馆 高校扩招 OUTSOURCING 贵州师范大学 档案馆管理 经营管理理念 档案信息 工业企业 陕西科技大学
下载PDF
新加坡警察培训课程的外包策略及其启示 被引量:1
12
作者 欧阳国亮 《公安教育》 2016年第3期75-77,共3页
"外包"(Outsourcing)这个词是上世纪伴随着企业管理制度的发展而产生的一个专门术语,具体指企业动态地配置自身和其他企业的功能和服务,并利用外部资源为自身的生产经营提供服务,以此实现资源的优化配置。新加坡政府十分重视"外包... "外包"(Outsourcing)这个词是上世纪伴随着企业管理制度的发展而产生的一个专门术语,具体指企业动态地配置自身和其他企业的功能和服务,并利用外部资源为自身的生产经营提供服务,以此实现资源的优化配置。新加坡政府十分重视"外包"这种管理服务策略,该策略在多个领域得到了推行,其中就包括警察培训。 展开更多
关键词 外包策略 服务策略 企业管理制度 OUTSOURCING 国土面积 企业动态 专门术语 教学工作 资源节约 社会教育机构
下载PDF
对银行服务外包业务的几点思考 被引量:3
13
作者 宋江云 李群 虞凡 《时代金融》 2009年第2X期26-28,共3页
银行服务外包BPO(Business Process Outsourcing),是指商业银行将原本应由其自身负责处理的某些事务或者某些业务活动,委托给本机构以外的第三方进行处理的经营方式。
关键词 服务外包业务 票据影像 经营方式 OUTSOURCING 源讯公司 后台服务 声誉风险 网上银行服务 合规风险 人力资源管理
下载PDF
Can harvest outsourcing services reduce field harvest losses of rice in China? 被引量:4
14
作者 QU Xue Daizo KOJIMA +2 位作者 Yukinaga NISHIHARA WU La-ping Mitsuyoshi ANDO 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2021年第5期1396-1406,共11页
The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and ... The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and outsourcing services.Data were collected from a national survey conducted in 2016 by the research team in conjunction with the Research Center for the Rural Economy of the Ministry of Agriculture and Rural Affairs of China.A non-parametric method was used to test whether combine harvesting and outsourcing services could significantly reduce harvest losses.Next,quantile regression was used to estimate the real effects of machinery and outsourcing services on harvest losses.The analysis yielded four main study outcomes.First,the harvest loss rate of rice in China was 3.65%.Second,mechanical reaping and winnowing caused greater losses than manual methods,while the opposite was true of field transportation.Third,combine harvesting increased the losses.Fourth,the effects of an outsourcing service on losses differed among the different harvesting methods.Outsourcing services increased losses in segmented harvesting but they reduced losses in combine harvesting. 展开更多
关键词 rice harvest outsourcing service combine harvesting harvest loss RICE
下载PDF
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
15
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption Outsourcing decryption IoT divices
下载PDF
FACOR:Flexible Access Control with Outsourceable Revocation in Mobile Clouds 被引量:2
16
作者 ZHOU Shungan DU Ruiying +3 位作者 CHEN Jing SHEN Jian DENG Hua ZHANG Huanguo 《China Communications》 SCIE CSCD 2016年第4期136-150,共15页
Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile d... Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile devices. However, less attention has been paid to the efficiency of revocation when there are mobile devices needed to be revoked. In this paper, we put forward a new solution, referred to as flexible access control with outsourceable revocation(FACOR) for mobile clouds. The FACOR applies the attribute-based encryption to enable flexible access control on outsourced data, and allows mobile users to outsource the time-consuming encryption and decryption computations to proxies, with only requiring attributes authorization to be fully trusted. As an advantageous feature, FACOR provides an outsourceable revocation for mobile users to reduce the complicated attribute-based revocation operations. The security analysis shows that our FACOR scheme achieves data security against collusion attacks and unauthorized accesses from revoked users. Both theoretical and experimental results confirm that our proposed scheme greatly reliefs the mobile devices from heavy encryption and decryption computations, as well as the complicated revocation of access rights in mobile clouds. 展开更多
关键词 mobile cloud computing ABE OUTSOURCING user revocation
下载PDF
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing 被引量:2
17
作者 Zhen Yang Yongfeng Huang +1 位作者 Xing Li Wenyu Wang 《Computers, Materials & Continua》 SCIE EI 2018年第7期1-17,共17页
To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on... To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance. 展开更多
关键词 Data provenance asymmetric fingerprint protocol digital watermarking multimedia outsourcing
下载PDF
中国医药外包产业的发展趋势分析 被引量:1
18
作者 张建中 沈家文 +1 位作者 满群杰 J. 《中国医药技术经济与管理》 2009年第11期-,共3页
中国医药外包产业未来的发展趋势将会怎样?我们依据对中国医药外包产业的研究,深入分析了中国医药外包产业的未来发展趋势,及其成长动力与制约因素,并对将来数年内的发展趋势做出了预测.
关键词 中国医药 外包产业 趋势分析 OUTSOURCING Chinese Development TREND 未来发展趋势 制约因素 成长动力 预测
下载PDF
Service outsourcing:A new way to shrink regional gaps 被引量:2
19
作者 刘志彪 《China Economist》 2009年第6期42-48,共7页
International outsourcing is an important way to realize intra-product division of labor. China's industrial upgrade and policy efforts directed at outsourcing are not entirely endogenous but have a dependent path... International outsourcing is an important way to realize intra-product division of labor. China's industrial upgrade and policy efforts directed at outsourcing are not entirely endogenous but have a dependent path prone to be captured and locked at the low end of the global value chain by developed countries at the chain's high end. In light of the stage and reality of China's economic development, we should not only upgrade manufacturing outsourcing but also grasp service outsourcing opportunities. We should implement a strategy of coordinated development of manufacturing and service outsourcing rather than hastily transforming China from a "factory of the world" into an "office of the world." Balancing services with manufacturing and linking the global value chain with the domestic value chain is the best tool to address the problem of China's uneven regional development and establish a multi-tiered modern industrial system. 展开更多
关键词 service OUTSOURCING MANUFACTURING OUTSOURCING INDUSTRIAL UPGRADE China’s ECONOMY
下载PDF
Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing 被引量:4
20
作者 Leqi Jiang Zhangjie Fu 《Journal of Cyber Security》 2020年第1期49-61,共13页
Genetic Algorithm(GA)has been widely used to solve various optimization problems.As the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA ... Genetic Algorithm(GA)has been widely used to solve various optimization problems.As the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the cloud server.However,the algorithm user would never want his data to be disclosed to cloud server.Thus,it is necessary for the user to encrypt the data before transmitting them to the server.But the user will encounter a new problem.The arithmetic operations we are familiar with cannot work directly in the ciphertext domain.In this paper,a privacy-preserving outsourced genetic algorithm is proposed.The user’s data are protected by homomorphic encryption algorithm which can support the operations in the encrypted domain.GA is elaborately adapted to search the optimal result over the encrypted data.The security analysis and experiment results demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 Homomorphic encryption genetic algorithm OUTSOURCING cloud computing
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部