期刊文献+

二次检索

题名
关键词
文摘
作者
第一作者
机构
刊名
分类号
参考文献
作者简介
基金资助
栏目信息
共找到66篇文章
< 1 2 4 >
每页显示 20 50 100
多元共治视角下公共信用网借服务优化研究
1
作者 陈亦阳 《河南图书馆学刊》 2024年第4期65-66,77,共3页
文章简述了多元共治的思想内涵及适用性,基于多元共治视角从公共图书馆、市场、公民组织等层面梳理、分析了当下公共图书馆信用网借服务存在的问题,并提出通过建立完善的信用制度、疏通多元参与主体协作渠道、强化宣传提升品牌效应等措... 文章简述了多元共治的思想内涵及适用性,基于多元共治视角从公共图书馆、市场、公民组织等层面梳理、分析了当下公共图书馆信用网借服务存在的问题,并提出通过建立完善的信用制度、疏通多元参与主体协作渠道、强化宣传提升品牌效应等措施提升公共图书馆网借信用服务。 展开更多
关键词 公共图书馆 信用网借服务 多元共治 优化对策
下载PDF
模糊综合评价法在网商信用指数测度中的应用研究 被引量:7
2
作者 王学东 金芳芳 +1 位作者 朱洋 谢辉 《现代情报》 CSSCI 2013年第9期10-14,共5页
网商是随着电子商务的发展而产生的一个具有划时代特征的商人群体,通过分析进行电子商务的企业信用测度算法的研究现状,结合网商的特点,构建一种新的网商信用指标体系,并在传统模糊综合评价法原理的基础上,对权重确定环节进行优化及优... 网商是随着电子商务的发展而产生的一个具有划时代特征的商人群体,通过分析进行电子商务的企业信用测度算法的研究现状,结合网商的特点,构建一种新的网商信用指标体系,并在传统模糊综合评价法原理的基础上,对权重确定环节进行优化及优化算法的可行性进行验证,最后将优化后的模糊综合评价法应用于网商信用指数测度之中,并通过实例验证该方法的可用性,为网商信用的评价提供了一种新的尝试。 展开更多
关键词 信用 指数测度 模糊综合评价法 电子商务 企业信用 信用指数
下载PDF
深圳企业信用网查询收费标准开始试行
3
《中外科技信息》 北大核心 2003年第3期78-78,共1页
关键词 深圳企业信用网 信息查询 收费标准
原文传递
西北地区信用卡网申渠道的可行性分析
4
作者 段井月 《全国商情》 2016年第31期53-54,共2页
目前,没有一张信用卡很多事情都不太方便了。很多信用卡凭着56天的超长免息还款期、活动力度大、申请方便等特点,成为了许多人消费与理财的重要手段。由于西北部经济发展落后,银行业务办理难度大等原因,很多银行忽视了该地区的信用卡办... 目前,没有一张信用卡很多事情都不太方便了。很多信用卡凭着56天的超长免息还款期、活动力度大、申请方便等特点,成为了许多人消费与理财的重要手段。由于西北部经济发展落后,银行业务办理难度大等原因,很多银行忽视了该地区的信用卡办理。但随着网络科技的普及,信用卡网络申请渠道渐渐进入了大众的视野。文章认为银行应该着眼于它们在未来给银行带来的长期利益,应加大对西北地区信用卡网申渠道的开发与管理,同时分析西北地区信用卡网申渠道的可行性。 展开更多
关键词 西北地区 信用申渠道 可行性
下载PDF
网购的信用与安全分析——以微商、代购为例
5
作者 高涵睿 陆思蓓 +2 位作者 韩慧颖 徐芩怡 袁紫璇 《市场周刊》 2019年第5期56-57,共2页
互联网的发展带动着消费方式的转变,以微商、代购为例的网络购物蓬勃发展。但在这一过程中,也积累了诸多问题。其原因在于:监管机制的缺失、法律体系的不完善、法律意识的欠缺等。本文通过对消费者及微商、代购群体的调研,建议通过增强... 互联网的发展带动着消费方式的转变,以微商、代购为例的网络购物蓬勃发展。但在这一过程中,也积累了诸多问题。其原因在于:监管机制的缺失、法律体系的不完善、法律意识的欠缺等。本文通过对消费者及微商、代购群体的调研,建议通过增强监管力度、完善法律法规和科普防范知识等手段,增强网购信用安全。 展开更多
关键词 信用安全 微商和代购 平台监管 法律法规
下载PDF
小议我国个人信用制度的建立
6
作者 韩国文 《中国软科学》 CSSCI 北大核心 2001年第6期122-124,共3页
关键词 中国 个人信用制度 个人信用“帐号” 个人信用网 个人信用评价体系
下载PDF
编织信息网 网住大市场
7
作者 高俊 《科技和产业》 2004年第7期51-52,共2页
关键词 抚顺石化销售公司 商机 市场开发 信用网 经济效益 人才培养
下载PDF
全国试推肉类产品食品安全信用码
8
《农村科技》 2004年第12期45-45,共1页
据肉类行业食品安全信用体系建设试点工作办公室信息服务系统建设成员李勃博士介绍,安全信用码中包含质量安全检测、认证、准入、抽查、抽检等管理要素信息。与其同步,将建立相关产品标签库以及企业生产履历中心。
关键词 肉类产品食品 安全信用 安全信用网 行业管理 中国
下载PDF
信用重建,推动中国市场经济向前走 被引量:2
9
作者 张怀旭 《计划与市场探索》 2001年第3期26-28,共3页
关键词 中国 市场经济 信用经济 商业信用认证 信用危机 国家信用管理体系 个人信用制度
下载PDF
完善我国助学贷款的几点建议 被引量:2
10
作者 罗刚 杨季春 原小平 《机械管理开发》 2010年第2期167-168,共2页
国家助学贷款是党中央、国务院在社会主义市场经济条件下,利用金融手段完善我国普通高校资助政策体系,加大对普通高校贫困家庭学生资助力度所采取的一项重大措施。我国助学贷款体制可以从建立国家助学贷款基金制度、个人信用体系和助学... 国家助学贷款是党中央、国务院在社会主义市场经济条件下,利用金融手段完善我国普通高校资助政策体系,加大对普通高校贫困家庭学生资助力度所采取的一项重大措施。我国助学贷款体制可以从建立国家助学贷款基金制度、个人信用体系和助学贷款二级市场等几个方面进行完善。 展开更多
关键词 助学贷款 信用网 二级市场
下载PDF
电子商务在农村的应用 被引量:1
11
作者 李南 《致富之友》 2002年第2期13-13,共1页
在农业方面,电子商务的应用已获得很大的发展。目前美国农业在 INTERNET上的专业农业网站超过400个,各种大型的专业农业数据仓库几十个,农产品已经能够实现网上交易,30%的农产品已经为电子商务进行了标准化,每年经过网上达成的农产品贸... 在农业方面,电子商务的应用已获得很大的发展。目前美国农业在 INTERNET上的专业农业网站超过400个,各种大型的专业农业数据仓库几十个,农产品已经能够实现网上交易,30%的农产品已经为电子商务进行了标准化,每年经过网上达成的农产品贸易已经占全部贸易额的15%,并且还在以每年300%的递增。此外, 展开更多
关键词 电子商务 农村 应用 农业 农业科技经济信用网 农业信息服务
下载PDF
STUDY ON SEAMLESS AND MULTILEVEL VPN
12
作者 陈兵 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2002年第2期182-186,共5页
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ... The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control. 展开更多
关键词 network security virtual private network FIREWALLS
下载PDF
Traffic Labeller: Collecting Internet Traffic Samples with Accurate Application Information 被引量:2
13
作者 PENG Lizhi ZHANG Hongli +2 位作者 YANG Bo CHEN Yuehui WU Tong 《China Communications》 SCIE CSCD 2014年第1期69-78,共10页
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socke... Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socket calls and their corresponding application process information in the user mode on a Windows host.Once a sending data call has been captured,its 5-tuple {source IP,destination IP,source port,destination port and transport layer protocol},associated with its application information,is sent to an intermediate NDIS driver in the kernel mode.Then the intermediate driver writes application type information on TOS field of the IP packets which match the 5-tuple.In this way,each IP packet sent from the Windows host carries their application information.Therefore,traffic samples collected on the network have been labelled with the accurate application information and can be used for training effective traffic classification models. 展开更多
关键词 network measurement traffic cla- ssification data collection ground truth
下载PDF
An application-layer based centralized information access control for VPN 被引量:2
14
作者 欧阳凯 周敬利 +1 位作者 夏涛 余胜生 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期240-249,共10页
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality... With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper. 展开更多
关键词 Virtual private network Access control TUNNELING Centralized management STREAM
下载PDF
Reliability of Substation Protection System Based on IEC61850 被引量:2
15
作者 熊小伏 于军 +1 位作者 刘晓放 沈智健 《Transactions of Tianjin University》 EI CAS 2008年第2期118-122,共5页
Although the new technology of protection and automation system of substation based on IEC61850 standard has developed rapidly in China,reliability measures depending on this technology need to be further researched.B... Although the new technology of protection and automation system of substation based on IEC61850 standard has developed rapidly in China,reliability measures depending on this technology need to be further researched.By taking advantage of convenient information sharing,two kinds of new schemes,shared backup protection unit(SBPU)and signal backup(SB),have been proposed to solve the failure problem of protective devices and current/voltage transducers respectively,and the working principle of these two schemes are also described.Furthermore,the key technologies of on-line diagnosis of protective devices'failure and on-line status diagnosis of optical or electronic current/voltage transducers to realize the two schemes are proposed. 展开更多
关键词 IEC61850 reliability measures shared backup protection unit (SBPU) signal backup
下载PDF
Research on E-mail Communication Network Evolution Model Based on User Information Propagation 被引量:1
16
作者 ZHANG Lejun GUO Lin XU Li 《China Communications》 SCIE CSCD 2015年第7期108-118,共11页
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ... E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication. 展开更多
关键词 E-MAIL social network analysis network evolution information propagation
下载PDF
Effective search with saliency-based matching and cluster-based browsing 被引量:4
17
作者 张晓宇 《High Technology Letters》 EI CAS 2013年第1期105-109,共5页
Similarity matching and this paper, a saliency-based information presentation are two matching algorithm is proposed key factors in information retrieval. In for user-oriented search based on the psychological studies... Similarity matching and this paper, a saliency-based information presentation are two matching algorithm is proposed key factors in information retrieval. In for user-oriented search based on the psychological studies on human perception, and major emphasis on the saliently similar aspect of objects to be compared is placed and thus the search result is more agreeable for users. After relevant results are obtained, the cluster-based browsing algorithm is adopted for search result presentation based on social network analysis. By organizing the results in clustered lists, the user can have a general understanding of the whole collection by viewing only a small part of results and locate those of major interest rapidly. Experimental results demonstrate the advantages of the proposed algorithm over the traditional work. 展开更多
关键词 information retrieval saliency-based matching human perception cluster-based browsing social network
下载PDF
Survey on Key Technology Development and Application in Trusted Computing 被引量:7
18
作者 Juan Wang Yuan Shi +5 位作者 Guojun Peng Huanguo Zhang Bo Zhao Fei Yan Fajiang Yu Liqiang Zhang 《China Communications》 SCIE CSCD 2016年第11期70-90,共21页
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like Chi... Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like China,it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing,such as various trusted platform modules(TPM、TCM、TPCM),TCG Software Stack(TSS),trusted cloud server and Trusted Execution Environment(TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future. 展开更多
关键词 cyberspace security information security information system security CRYPTOGRAPHY trusted computing
下载PDF
Characterizing Internet Backbone Traffic Based on Deep Packets Inpection and Deep Flows Inspection 被引量:4
19
作者 杨洁 袁仑 +3 位作者 林平 丛蓉 程钢 尼万-安瑟瑞 《China Communications》 SCIE CSCD 2012年第5期42-54,共13页
Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic ... Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic classifying efficiency in this pa- per. In particular, the study has scrutinized the net- work traffic in terms of protocol types and signatures, flow length, and port distffoution, from which mean- ingful and interesting insights on the current Intemet of China from the perspective of both the packet and flow levels are derived. We show that the classifica- tion efficiency can be greatly irrproved by using the information of preferred ports of the network applica- tions. Quantitatively, we find two traffic duration thresholds, with which 40% of TCP flows and 70% of UDP flows can be excluded from classification pro- cessing while the in^act on classification accuracy is trivial, i.e., the classification accuracy can still reach a high level by saving 85% of the resources. 展开更多
关键词 network traffic traffic characterization traffic monitoring PACKET flow
下载PDF
Applications of IoT in Smart Grid 被引量:1
20
作者 Chen Xi Liu Min Li Xiangzhen Liu Jianming Zhen Yan 《Electricity》 2012年第2期15-19,共5页
In this paper,the basic requirements of the smart grid in China are studied.By applying Internet of Things(IoT) technologies,various intelligent services can be created.The development of the smart grid would rely hea... In this paper,the basic requirements of the smart grid in China are studied.By applying Internet of Things(IoT) technologies,various intelligent services can be created.The development of the smart grid would rely heavily on the application of IoT.The three-layer architecture of IoT for the smart grid in China is introduced.Various information and communication technologies of IoT applied to smart grid are discussed.Particularly,several typical IoT application solutions such as power transmission line monitoring,smart patrol,smart home and electric vehicle management,are provided. 展开更多
关键词 Internet of Things smart grid information and communication technology WSN RFID
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部