期刊文献+
共找到84篇文章
< 1 2 5 >
每页显示 20 50 100
诚信是“网商”的命脉 被引量:1
1
作者 陈志平 《现代商业》 2009年第32期46-47,共2页
"网商"是指在网上销售商品的商人,更是指一种新型商业。我国"网商"在迅速崛起的同时,也出现了许多因诚信缺失而引发的行为。诚信是"网商"的命脉。构建以诚信为核心的"网商",需要采取宣传教育... "网商"是指在网上销售商品的商人,更是指一种新型商业。我国"网商"在迅速崛起的同时,也出现了许多因诚信缺失而引发的行为。诚信是"网商"的命脉。构建以诚信为核心的"网商",需要采取宣传教育、培育诚信文化、规范经济行为、建立利益运行机制、制订与实施相关制度等多种方式。 展开更多
关键词 “网商” 诚信
下载PDF
“微时代”视角下大学生的心理特点及教育路径 被引量:1
2
作者 刘海珍 《西部素质教育》 2017年第5期189-190,共2页
文章首先分析了"微时代"视角下大学生的心理特点:网络依赖性强、心理稳定性减弱,然后从引导学生树立远大的理想与抱负、有针对性地提高大学生的"网商"、强化师资队伍建设三方面阐述了"微时代"视角下加强... 文章首先分析了"微时代"视角下大学生的心理特点:网络依赖性强、心理稳定性减弱,然后从引导学生树立远大的理想与抱负、有针对性地提高大学生的"网商"、强化师资队伍建设三方面阐述了"微时代"视角下加强大学生心理健康教育的具体措施。 展开更多
关键词 微时代 心理特点 教育路径 “网商” 师资队伍
下载PDF
Reliability supply chain network design model for perishable products 被引量:1
3
作者 于海生 赵林度 《Journal of Southeast University(English Edition)》 EI CAS 2007年第S1期94-98,共5页
The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is d... The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is defined by introducing the probability that a facility may be prone to inactivity based on the analysis of perishable product characteristics.The perishable product SCN design problem is formulated as a 0-1 integer programming model.The objective is to minimize the weighted sum of the operating cost(the fixed plus transportation cost)and the expected failure cost.And then,the perishable product SCN design model is discussed and solved using the genetic algorithm(GA).The results show how to generate the tradeoff curve between the operating costs and the expected failure costs.And these tradeoff curves demonstrate empirically that substantial improvements in reliability are often possible with minimal increase in the operating costs. 展开更多
关键词 supply chain network perishable product network design RELIABILITY
下载PDF
A new species in the genus Saxetophilus Umnov(Orthoptera:Arcypteridae) from Qinghai,China 被引量:3
4
作者 郑哲民 陈振宁 林立亮 《Entomotaxonomia》 CSCD 北大核心 2012年第1期13-16,共4页
Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et ... Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et al., 2006 and Saxetophilus mistshenkoi Naumovitsh, 1988. It differs from both of them in: l) widest between lateral keels of pronotum by 3.30-3.75 times (~) or 3.00-3.60 times (~) length of median keel in metazona; and 2) interspace of mesosternal lobes wider than that of lateral lobes. Type specimens are at the Institute of Zoology, Shaanxi Normal University. 展开更多
关键词 ORTHOPTERA ARCYPTERIDAE Saxetophilus new species China
下载PDF
Security analysis of newly ameliorated WAPI protocol 被引量:3
5
作者 庞辽军 李慧贤 王育民 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期25-28,共4页
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ... Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security. 展开更多
关键词 wireless local area network (WLAN) WLAN authentication and privacy infrastructure (WAPI) AUTHENTICATION key negotiation CK model
下载PDF
Multi-agent based modeling for order distribution cooperative negotiation in supply chains
6
作者 陈国华 钱军 孙胜楠 《Journal of Southeast University(English Edition)》 EI CAS 2007年第S1期140-145,共6页
With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.Aft... With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.After reviewing and analyzing some main domestic and overseas processes in cooperative negotiation modeling in supply chain,some problems are subsequently pointed out.For example,the traditional simple multi-agent system(MAS)frameworks which have some limitations,are not suitable for solving modeling complex systems.To solve these problems,thinking with the aid of the multi-agent structure and complex system modeling,the manufacturing supply chain is taken as an example,and a time Petri net production model is adopted to decompose the materials.And then a cooperative negotiation model for the order distribution in supply chain is constructed based on combining multi-agent techniques with time Petri net modeling.The simulation results reveal that the above model helps solve the problems of cooperative negotiation in supply chains. 展开更多
关键词 MULTI-AGENT time Petri net supply chain cooperative negotiation
下载PDF
A survey of the Internet application in the AEC industry
7
作者 周琦 罗伯特J.克罗切克 《Journal of Southeast University(English Edition)》 EI CAS 2003年第3期225-230,共6页
The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of... The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects. 展开更多
关键词 internet aided design web services web vendors in the AEC industry
下载PDF
City Networks of Online Commodity Services in China:Empirical Analysis of Tmall Clothing and Electronic Retailers 被引量:7
8
作者 XI Guangliang ZHEN Feng +1 位作者 HE Jinliao GONG Yanhao 《Chinese Geographical Science》 SCIE CSCD 2018年第2期231-246,共16页
City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditi... City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditional urban network of which the major measuring indexes are population sizes and entity industries, online commodity service networks could reflect well the influencing of emerging economies, especially the Internet economy, on city networks. This study analyzes and reveals structural features of China's city networks through online commodity services, providing the internet economic approach on city networks. Results indicate that the core cities of online commodity service networks are mainly concentrated in eastern coastal areas. In addition, spatial polarization and layer structure of network connections are obvious, descending from the centers in eastern China to peripheral cities in central and western China. Online commodity services of different cities show apparent differences and uncertainties in terms of specialization rates of international connection, which presents a tendency toward diversification. Online commodity service networks are not only associated with goods production, supply, and consumption in physical space but also reflect virtual information, capital, and technology flows, thus providing a new empirical approach for understanding city networks in information and internet economic age. 展开更多
关键词 city networks online commodity services intercity relationships SPECIALIZATION
下载PDF
Exploratory study of logistics service quality scale based on online shopping malls 被引量:16
9
作者 FENG Yi-xiong ZHENG Bing TAN Jian-rong 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第6期926-931,共6页
Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ... Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ) has significant impact on revenue and profitability. This paper presents the issue from the perspective of the customer, and explores the initial factors of LSQ based on the online shopping through in-depth interview and the Delphi method. The survey uses a standard 7-point Likert-type scale to measure the LSQ. Empirical research results are shown in detail to confirm seven LSQ dimensions with Chinese characteristics, including timeliness quality, personal contact quality, order quality, order discrepancy handling, order condition and convenience. Statistical analyses of the investigation were conducted to test the reliability and validity of the LSQ evaluation model. 展开更多
关键词 Online shopping Logistics service Logistics service quality (LSQ) Dimensions of LSQ
下载PDF
Using multi-class queuing network to solve performance models of e-business sites 被引量:1
10
作者 郑小盈 陈德人 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期31-39,共9页
Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are bas... Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are based on the assumption that no service center is saturated as a result of the combined loads of all the classes. Several formulas are used to calculate performance measures, including throughput, residence time, queue length, response time and the average number of requests. The solution technique of closed multi-class QN models is an approximate mean value analysis algorithm (MVA) based on three key equations, because the exact algorithm needs huge time and space requirement. As mixed multi-class QN models, include some open and some closed classes, the open classes should be eliminated to create a closed multi-class QN so that the closed model algorithm can be applied. Some corresponding examples are given to show how to apply the algorithms mentioned in this article. These examples indicate that multi-class QN is a reasonably accurate model of e-business and can be solved efficiently. 展开更多
关键词 Queuing network (QN) Multi class Performance E business
下载PDF
CIT/XML Security Platform Syntax and Processing 被引量:1
11
作者 安南 张申生 《Journal of Southeast University(English Edition)》 EI CAS 2002年第2期108-113,共6页
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl... Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided. 展开更多
关键词 electronic commerce security digital certificates smart card digitalcommerce AUTHENTICATION SPKI XML
下载PDF
An Overview of Internet of Vehicles 被引量:56
12
作者 YANGFangchun WANG Shangguang LI Jinglin LIU Zhihan SUN Qibo 《China Communications》 SCIE CSCD 2014年第10期1-15,共15页
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l... The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV. 展开更多
关键词 internet of vehicles VANET vehicle telematics network model
下载PDF
Negotiation Model for Shopping Agents in E-marketplace 被引量:1
13
作者 肖正光 徐良贤 《Journal of Donghua University(English Edition)》 EI CAS 2004年第2期105-111,共7页
Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to b... Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to buy and provide their agents with a reservation price, and the agents make offers and reach agreements with other agents according to this reservation price. However, in real world electronic marketplaces users probably do not know the exact value of the item, which is in terms of price, and the reservation price they set to their agents only means the maximum price they are willing to pay for the item. In this paper, we propose a negotiation model to deal with the valuation problem. The shopping agent in our model can deliberate the market price and the seller agent’s reservation price from public available information and the seller agent’s proposals. Also in order to conform with the real world negotiation conditions, we introduce negotiation features of real world human shopping such as multiple sellers, valuation, ultimatum, and learning from available information, etc. into our model. 展开更多
关键词 Automated negotiation shopping agent belief revision
下载PDF
Research on customer loyalty of B2C e-commerce 被引量:1
14
作者 ZHAO Gong-min 《Chinese Business Review》 2010年第5期46-52,共7页
Customer loyalty of B2C e-commerce is studied by testing the hypotheses on five latent variables using the structural equation modeling method. After correcting model, online store image is obviously fundamental basis... Customer loyalty of B2C e-commerce is studied by testing the hypotheses on five latent variables using the structural equation modeling method. After correcting model, online store image is obviously fundamental basis on expectations of shopping online, experience of shopping online, customer satisfaction and customer loyalty between which there are seven positive relationships accepted in the AMOS model. The results provide scientific evidence for B2C e-commerce. 展开更多
关键词 structural equation modeling E-COMMERCE customer loyalty
下载PDF
Analyses on Four Models and Cases of Enterprise Informatization 被引量:1
15
作者 石春生 Han +4 位作者 Xinjuan YANG Cuilan ZHAO Dongbai 《High Technology Letters》 EI CAS 2003年第3期75-80,共6页
The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integ... The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integration Informatization Model, the Flow Management Informatization Model, the Intranet E-commerce Informatization Model and the Network Enterprise Informatization Model. The conditions for using and problems needing attentions of these 4 models are also analyzed. 展开更多
关键词 informatization model resource integration intranet e-commerce network enterprise
下载PDF
Rayleigh Quotient Based Interference Alignment Spectrum Sharing in MIMO Cognitive Radio Networks 被引量:1
16
作者 RONG MEI 《China Communications》 SCIE CSCD 2015年第6期96-105,共10页
An interference alignment(IA)spectrum sharing method based on Rayleigh quotient is proposed for distributed multi-user multi-antenna cognitive radio(CR) networks.The interference from cognitive users(CUs)to the primar... An interference alignment(IA)spectrum sharing method based on Rayleigh quotient is proposed for distributed multi-user multi-antenna cognitive radio(CR) networks.The interference from cognitive users(CUs)to the primary(PR) system is constrained through the Rayleigh quotients of channel matrices to deal with the absence of PR users(PUs) in the IA process.As a result,the IA scheme can be applied in CR networks without harmful interference to PUs.Compared with existing IA based spectrum sharing methods,the proposed method is more general because of breaking the restriction that CUs can only transmit on the idle sub-channels of the PR system.Moreover,in comparison to other four spectrum sharing methods applicable in general scene,the proposed method leads to improved performance of achievable sum rate of the CR system as well as guarantees the transmission of PUs. 展开更多
关键词 cognitive radio spectrum sharing Rayleigh quotient interference alignment MIMO
下载PDF
A genre analysis of the B2B website
17
作者 李亚丽 《Sino-US English Teaching》 2009年第1期34-41,共8页
The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in term... The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features. 展开更多
关键词 B2B website genre analysis communicative purpose netspeak
下载PDF
Towards Efficient and Secure Access Control System for Mobile Cloud Computing 被引量:5
18
作者 TU Shanshan HUANG Yongfeng 《China Communications》 SCIE CSCD 2015年第12期43-52,共10页
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ... This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud. 展开更多
关键词 cloud execution constraints partition encryption Encryption satisfying assume posed visualization
下载PDF
Consumer willingness to pay for plastic bags levy and willingness to accept eco-friendly alternatives in Botswana 被引量:1
19
作者 Patricia K.Madigele Goemeone E.J Mogomotsi Mavis Kolobe 《Chinese Journal of Population,Resources and Environment》 2017年第3期255-261,共7页
Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty o... Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty of the environment. In an effort to curtail the excessive use of plastic bags in Botswana, the government introduced a plastic levy targeted at consumers at retail points. This study uses primary data collected from 367 respondents randomly selected from six geospatially and purposively selected shopping malls to determine the consumers' willingness to pay (WTP) for continued plastic bag usage and their willingness to accept (WTA) to shift to eco-friendly alternatives. The results of the study revealed that open dumping and burning of plastic litter are more common in Maun than in Gaborone, It also showed that there is a significant relationship between the level of education and W'FP. Further, there is a significant variation in income and education in respect to environmental awareness. The government should improve its efforts of sensitizing the public about the improper disposal of plastic bags. 展开更多
关键词 Willingness to pay willingness to accept plasticbags plastic bag levy environmental externality
下载PDF
Parallelized Jaccard-Based Learning Method and MapReduce Implementation for Mobile Devices Recognition from Massive Network Data 被引量:2
20
作者 刘军 李银周 +2 位作者 Felix Cuadrado Steve Uhlig 雷振明 《China Communications》 SCIE CSCD 2013年第7期71-84,共14页
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this pape... The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions. 展开更多
关键词 mobile device recognition data mining Jaccard coefficient measurement distributed computing MAPREDUCE
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部