期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
中国农村信贷征信技术基础要素研究——基于信息经济学的思考 被引量:4
1
作者 刘若鸿 张骥 王为鹏 《农业技术经济》 CSSCI 北大核心 2011年第3期31-40,共10页
农村金融的发展直接影响到中国经济下一步发展,然而由于考核机制不健全以及缺乏必要的征信技术和策略,正规金融机构似乎在农村金融市场难以盈利,并进一步导致了其在发展农村金融方面的缺位。本文结合"格莱珉"银行运作模式,建... 农村金融的发展直接影响到中国经济下一步发展,然而由于考核机制不健全以及缺乏必要的征信技术和策略,正规金融机构似乎在农村金融市场难以盈利,并进一步导致了其在发展农村金融方面的缺位。本文结合"格莱珉"银行运作模式,建立基于信息不对称重复博弈模型,分析了影响农户还贷以及金融机构实现盈利的基本因素。研究表明,增强农户生产能力和周边违约不认同感,降低贷款金额、利率和成本可以提高农户的还款概率,而信息的利用和风险的控制会提高农村金融的收益。政府应进一步加强和完善金融机构风险管控,建立和完善共同信息服务系统;农村金融机构应转变经营理念,优化征信策略,实现农户与农村金融机构的双赢。 展开更多
关键词 农村金融 农村 征信技术 重复博弈 “格菜珉”银行
原文传递
论财产征信的技术革新和行业重生 被引量:1
2
作者 林钧跃 《征信》 北大核心 2020年第1期6-10,共5页
财产征信是传统征信行业的一个分支,其服务多见于亚洲的征信市场。鉴于过去我国的法律环境,财产征信没能被顺利引进国内市场。当前,商品追溯行业的发展和行业信用体系建设工作的推进,倒逼财产征信技术方法做出了技术革新。新型财产征信... 财产征信是传统征信行业的一个分支,其服务多见于亚洲的征信市场。鉴于过去我国的法律环境,财产征信没能被顺利引进国内市场。当前,商品追溯行业的发展和行业信用体系建设工作的推进,倒逼财产征信技术方法做出了技术革新。新型财产征信的目标主体有所变化,征信范围也有所扩大,征信服务有了明显的市场和社会需求。财产征信方法革新后呈现出复杂性、综合性等特征,同时需要采用企业征信和个人征信技术,在这两个领域均有应用场景。 展开更多
关键词 征信技术 行业 财产 商品追溯 行业用体系
下载PDF
浅谈数字时代下金融科技应用专业的三教改革——以《征信技术与实务》为例
3
作者 汪林 何冬明 《市场调查信息(综合版)》 2021年第12期36-36,共1页
近年来,数字经济高速发展,成为经济增长的新引擎。据 2021 年政府工作报告,报告增加了一项内容暨引导银行扩大信用贷款、持续增加首贷户,推广随借随还贷款,使资金更多流向金融科技创新,能够为小微企业、个体工商户、新型农业经营主体提... 近年来,数字经济高速发展,成为经济增长的新引擎。据 2021 年政府工作报告,报告增加了一项内容暨引导银行扩大信用贷款、持续增加首贷户,推广随借随还贷款,使资金更多流向金融科技创新,能够为小微企业、个体工商户、新型农业经营主体提供可持续定向支持。值得注意的是,近段时间以来,金融科技应用成为市场探讨的热门话题,探索金融科技应用人才的新培养方式成为职教从业者亟待解决的一个问题。本文探究了以《征信技术与实务》课程为例的金融科技应用专业的三教改革。 展开更多
关键词 征信技术 金融科技应用 三教改革 复合型人才
下载PDF
引入境外商业个人征信机构:一个双赢均衡的构建 被引量:2
4
作者 乔海曙 黄小锋 《求索》 CSSCI 北大核心 2007年第9期17-20,共4页
本土个人征信中介机构的技术落后和产品匮乏使得其产出水平不能有效激发信用经济中潜在征信需求,借鉴其他发展中国家经验,引入境外商业个人征信机构是发展本土个人征信企业的捷径。我国个人征信体系建设虽有成绩但也面临个人征信中介机... 本土个人征信中介机构的技术落后和产品匮乏使得其产出水平不能有效激发信用经济中潜在征信需求,借鉴其他发展中国家经验,引入境外商业个人征信机构是发展本土个人征信企业的捷径。我国个人征信体系建设虽有成绩但也面临个人征信中介机构技术落后、产品匮乏的困境;作为重点引入对象的全球三大个人征信中介机构具有雄厚实力,技术先进且产品丰富;从政策和经济角度而言,引入操作是切实可行的,但具体实践任重而道远。 展开更多
关键词 中介机构 征信技术 产品
下载PDF
对我国征信产品开发及创新的思考 被引量:3
5
作者 陆宇生 《海南金融》 2010年第5期77-80,共4页
随着计算机的普及和电信技术突飞猛进的发展,征信机构的信息产品也随之改进,开发出一些预测类信息产品,以及各种信用管理类软件。目前,我国已有的征信产品和服务与市场潜在需求还有巨大的缺口,征信产品开发和服务创新迫在眉睫。针对现... 随着计算机的普及和电信技术突飞猛进的发展,征信机构的信息产品也随之改进,开发出一些预测类信息产品,以及各种信用管理类软件。目前,我国已有的征信产品和服务与市场潜在需求还有巨大的缺口,征信产品开发和服务创新迫在眉睫。针对现阶段我国征信行业发展过程中征信市场供需不平衡、产品结构单一等问题,本文借鉴国外发达征信机构在征信产品开发上的经验,探索我国征信产品开发及创新的途径。 展开更多
关键词 产品 中介机构 征信技术 产品开发
下载PDF
Using acoustic technique to detect leakage in city gas pipelines 被引量:2
6
作者 陈志刚 连香姣 赫亮 《Journal of Central South University》 SCIE EI CAS 2012年第8期2373-2379,共7页
For solving the difficult problem of leakage detection in city gas pipelines, a method using acoustic technique based on instantaneous energy (IE) distribution and correlation analysis was proposed. Firstly, the basic... For solving the difficult problem of leakage detection in city gas pipelines, a method using acoustic technique based on instantaneous energy (IE) distribution and correlation analysis was proposed. Firstly, the basic theory of leakage detection and location was introduced. Then the physical relationship between instantaneous energy and structural state variation of a system was analyzed theoretically. With HILBERT-HUANG transformation (HHT), the instantaneous energy distribution feature of an unstable acoustic signal was obtained. According to the relative contribution method of the instantaneous energy, the noise in signal was eliminated effectively. Furthermore, in order to judge the leakage, the typical characteristic of the instantaneous energy of signal in the input and output end was discussed using correlative analysis. A number of experiments were carried out to classify the leakage from normal operations, and the results show that the leakages are successfully detected and the average recognition rate reaches 93.3% among three group samples. It is shown that the method using acoustic technique with IED and correlative analysis is effective and it may be referred in other pipelines. 展开更多
关键词 city gas pipeline leakage detection acoustic technique instantaneous energy distribution correlative analysis
下载PDF
Signal characteristics of coal and rock dynamics with micro-seismic monitoring technique 被引量:3
7
作者 Ding Yanlu Dou Linming +4 位作者 Cai Wu Chen Jianjun Kong Yong Su Zhenguo Li Zhenlei 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2016年第4期683-690,共8页
In this study, differences of signal characteristics between mine shocks and coal and gas outbursts in coal mines were examined with the micro-seismic monitoring technique and time-frequency analysis. The duration of ... In this study, differences of signal characteristics between mine shocks and coal and gas outbursts in coal mines were examined with the micro-seismic monitoring technique and time-frequency analysis. The duration of the mine shock is short while the coal and gas outburst lasts longer. The outburst consists of three stages: the pre-shock, secondary shock and main shock stage, respectively. The velocity amplitude of the mine shock is between 10 s and 10-3 m/s, which is higher than that of the outburst with the same energy level. In addition, in both cases, the correlation between the velocity amplitude and energy is positive while the correlation between the signal frequency band distribution and energy is negative. The signal frequency band of the high energy mine shock is distributed between 0 and 50 Hz, and the low energy mine shock is between 50 and 100 Hz. The fractal characteristics of mine shocks were studied based on a fractal theory. The box dimensions of high energy mine shocks are lower than the low energy ones, however, the box dimensions of outbursts are higher than that of mine shocks with the same energy level. The higher box dimensions indicate more dangerous dynamic events. 展开更多
关键词 Mine shock Coal and gas outburst Micro-seismic signal Spectrum characteristics Fractal characteristics
下载PDF
A compression tolerant scheme for image authentication
8
作者 刘宝锋 张文军 余松煜 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第4期399-404,共6页
Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by co... Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation, which are feasible for practical applications. 展开更多
关键词 Image features AUTHENTICATION digital signature
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部