期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
NB-IoT的基本架构与环境监测系统的应用设计 被引量:2
1
作者 张伟 胡雄强 +1 位作者 王宜怀 袁贵锋 《单片机与嵌入式系统应用》 2018年第11期4-8,共5页
在研究窄带物联网技术的基础上,提出基于NB-IoT的环境监测系统。系统设计充分利用窄带物联网的特点,硬件设计以ARM公司的KL36微控制器为核心,GPRS模块采用的是樘棣公司生产的R616;软件设计以C#为开发工具。最后实现了对远程终端的监测,... 在研究窄带物联网技术的基础上,提出基于NB-IoT的环境监测系统。系统设计充分利用窄带物联网的特点,硬件设计以ARM公司的KL36微控制器为核心,GPRS模块采用的是樘棣公司生产的R616;软件设计以C#为开发工具。最后实现了对远程终端的监测,通过IoT侦听软件可以获得终端的IMSI号、光线强度、TSI次数等信息,并对侦测到的信息进行解析后回发。经测试,系统软硬件运行正常,性能稳定,降低了物联网技术应用的开发成本,也为窄带物联网的应用提供了参考。 展开更多
关键词 窄带物联网 KL36 MCU 系统 侦测程序
下载PDF
The usage of technology in preventing and detecting fraud
2
作者 Vjollca Karapici Ibrahimi 《Chinese Business Review》 2010年第9期22-30,共9页
Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsibl... Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsible for detection, determination of fraud and use of anti-fraud programs. With rapid developments in information, communication and technology, it is no surprise that companies grow and secure IT system, but with the development of technology was developed and fraud schemes. Detection or not the auditor of the fraud, not fulfilling his work reflects you, or not drafting of a plan audit standards and procedures, but he has to do with personal ability auditor, to analyze the findings during the audit, use of tests, the natural limitations of internal control and the fact that most of the findings of the auditor of nature are more persuasive than effective. When you conduct an audit, auditor has a professional skeptic attitude that considers the risk of circumvention of control procedures by management and recognizes that simple fact, the audit procedures that are effective in connection with the discovery of errors, are not suitable for detection and identification fraud. This requires from the auditor to establish a procedure for considering the risk of fraud, in order to detect the exact appearance not as a result of fraud. A particular impact has The Model of Fraud Detection Strategy, as an 8 steps model for identifying fraud, using IT to collect, define and analyze the data and anomalies that highlight indicators of fraud. 展开更多
关键词 FRAUD TECHNOLOGY skeptic attitude
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部