期刊文献+
共找到69篇文章
< 1 2 4 >
每页显示 20 50 100
Understanding Credit Risk in Internet Consumer Finance:An Empirical Analysis with a Focus on the Young Generation
1
作者 Xiaodan Wang 《Proceedings of Business and Economic Studies》 2023年第6期81-91,共11页
In recent years,internet finance has garnered increasing attention from the public.Online lending,emerging within the framework of Internet finance as a pivotal component,has witnessed substantial growth.While online ... In recent years,internet finance has garnered increasing attention from the public.Online lending,emerging within the framework of Internet finance as a pivotal component,has witnessed substantial growth.While online credit,within the realm of Internet finance,presents numerous advantages over traditional lending,it concurrently exposes a plethora of credit risk issues.This study aims to facilitate the effective utilization of online credit tools by the young generation within the context of Internet finance.Additionally,it seeks to ensure the overall stability of the Internet finance environment and mitigate risks for the youth.Given the significance of understanding credit risk management for college students in the age of internet finance,this paper adopts the logistic model to evaluate credit risk in internet consumer finance and provides pertinent recommendations from the perspective of the young generation. 展开更多
关键词 Young generation Credit risk in internet consumer finance Influencing factors Logistic model
下载PDF
ZTE's Solution to China Next Generation Internet (CNGI)
2
作者 Gu Zhongyu, Liu Jumei (Data Division of ZTE Corporation, Nanjing 210012, China) 《ZTE Communications》 2005年第3期37-40,共4页
Today IPv6 is the hottest topic worldwide. Many countries are positively impelling the research and application of the Next Generation Internet (NGI). China launched a large scale IPv6 backbone network project: China ... Today IPv6 is the hottest topic worldwide. Many countries are positively impelling the research and application of the Next Generation Internet (NGI). China launched a large scale IPv6 backbone network project: China Next Generation Internet (CNGI). This article introduces the birth of IPv6 and CNGI, then discusses ZTE's solution to CNGI in detail. 展开更多
关键词 Cngi IP ZTE’s Solution to China Next generation internet CPN
下载PDF
Consortium Chain Consensus Vulnerability and Chain Generation Mechanism
3
作者 Rui Qiao hi Dong 《Computers, Materials & Continua》 SCIE EI 2023年第11期2505-2527,共23页
Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation ... Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications. 展开更多
关键词 Consortium chain BYZANTINE CONSENSUS generation mechanism internet of Things consensus vulnerability
下载PDF
Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption
4
作者 Mesfer Al Duhayyim Fatma S.Alrayes +5 位作者 Saud S.Alotaibi Sana Alazwari Nasser Allheeib Ayman Yafoz Raed Alsini Amira Sayed A.Aziz 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3209-3223,共15页
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g... The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches. 展开更多
关键词 Remote sensing internet of things image encryption SECURITY optimal key generation
下载PDF
Development of IPv6 Capabilities for Next Generation Internet
5
作者 Ling Miao, Qin Hao (Data Division of ZTE Corporation, Nanjing 210012, China) 《ZTE Communications》 2005年第3期2-5,共4页
The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational pur... The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational purposes and information household appliance networking are also on the horizon. In other words, IPv6 means new revenue resources for telecom carriers. 展开更多
关键词 IETF RFC Development of IPv6 Capabilities for Next generation internet VPN IPSEC
下载PDF
美国下一代Internet(NGI) 被引量:1
6
作者 何淑贞 《世界网络与多媒体》 1999年第3期16-16,18,共2页
关键词 internet 信息基础设施 ngi 美国
全文增补中
Improved Channel Reciprocity for Secure Communication in Next Generation Wireless Systems 被引量:2
7
作者 Imtisal Qadeer Muhammad Khurram Ehsan 《Computers, Materials & Continua》 SCIE EI 2021年第5期2619-2630,共12页
To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G ... To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G wireless systems.Physical layer key generation(PLKG)tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium.In this paper,relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process.Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless connection in IoTs and 5G systems.Circulant deconvolution is proposed as a promising technique for relative calibration to ensure channel reciprocity in comparison to existing techniques Total Least Square(TLS)and Structured Total Least Square(STLS).The proposed deconvolution technique replicates the performance of the STLS by exploiting the possibility of higher information reuse and its lesser computational complexity leads to less processing time in comparison to the STLS.The presented idea is validated by observing the relation between signalto-noise ratio(SNR)and the correlation coefficient of the corresponding channel measurements between communicating parties. 展开更多
关键词 Channel measurements physical layer key generation channel reciprocity internet of things DECONVOLUTION
下载PDF
美国的第二代Internet计划(NGI) 被引量:2
8
作者 郑登理 《通讯世界》 1997年第12期59-60,共2页
1996年秋,美国一些科研机构和34所大学提出了研制新一代Internet的设想。同年10月6日,美国总统克林顿宣布,在今后五年内动用5亿美元的联邦资金实施下一代In-ternet计划(以下简称为NGI)。据报道,该项目第一年1亿美元的经费已在1997财政... 1996年秋,美国一些科研机构和34所大学提出了研制新一代Internet的设想。同年10月6日,美国总统克林顿宣布,在今后五年内动用5亿美元的联邦资金实施下一代In-ternet计划(以下简称为NGI)。据报道,该项目第一年1亿美元的经费已在1997财政年度中解决。重要的工作文件包括国家协调办公室关于NGI的《概念报告》、InternetⅡ工程的《应用报告》、《初步工程报告》等都已先后出台。相关的政府机构都明确了各自的工作,并有相应的资金安排。参与InternetⅡ工程的高等学校及研究机构已超过100个。这个计划的提出和实施可能将成为目前全球信息化热潮中最重要的动向之一。 美国之所以启动NGI计划有着深刻的背景。一方面,现有的Internet已经给美国带来巨大的好处,它的飞速发展正在改变成千上万美国人的生活方式。 展开更多
关键词 internet ngi计划 美国
下载PDF
IoT Based Approach in a Power System Network for Optimizing Distributed Generation Parameters
9
作者 P.Shanmugapriya J.Baskaran +1 位作者 C.Nayanatara D.P.Kothari 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第6期541-558,共18页
The objective of this paper is to provide a robust Virtual Power Plant(VPP)network collaborated with Internet of Things(IoT)which uses a conceptual model to integrate each device in the grid.Based on the functionality... The objective of this paper is to provide a robust Virtual Power Plant(VPP)network collaborated with Internet of Things(IoT)which uses a conceptual model to integrate each device in the grid.Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres.To ensure the trapping of the available power and the efficient transfer of Distributed Generation(DG)power to the grid Distribution Active Control(DAC)strategy is used.Synchronized optimization of DG parameter which includes DG size,location and type are adopted using Dispatch strategy.The case studies are optimized by rescheduling the generation and with load curtailment.Maximized Customer Benefit(MCB)is taken as an objective function and a straight forward solution is given by heuristic search techniques.This method was vindicated in a practical Indian Utility system.This control proposes better performances,ensures reliability and efficiency even under parameter variations along with disturbances which is justified using IEEE 118 bus system and real time Indian utility 63 bus system.Results reveal that the proposed technique proves advantages of low computational intricacy. 展开更多
关键词 CUSTOMER BENEFIT distributed generation internet of THINGS VIRTUAL power PLANT distribution active control
下载PDF
NGI和Internet2计划
10
作者 岳云 《电信快报》 1999年第2期19-22,共4页
本文介绍通过超高速网络技术和新型应用的开发来保持美国在信息通信领域领先地位的NGI和Internet2计划。
关键词 ngi internet2 因特网 高速网络技术
下载PDF
第二代 Internet──NGI
11
作者 张铨 果刚 《自动化博览》 2000年第3期44-45,共2页
关键词 internet ngi internetZ网
下载PDF
未来网络发展新概念--Internet2与NGI
12
作者 蒋蓓蓓 《航空档案》 2004年第1期58-58,65,共2页
美国从1969年出于军事目的开始研究互联网,从光纤到PC机(芯片),从路由器到操作系统,所有的一切都是美国造,甚至全世界的网络都在为美国支付带宽费用。因特网的出现,使得美国成为世界头号信息强国。因特网的商业化,给美国带来了巨... 美国从1969年出于军事目的开始研究互联网,从光纤到PC机(芯片),从路由器到操作系统,所有的一切都是美国造,甚至全世界的网络都在为美国支付带宽费用。因特网的出现,使得美国成为世界头号信息强国。因特网的商业化,给美国带来了巨大的经济利益。随着用户的快速增长,原来的通信设施已重负。 展开更多
关键词 internet2 国际互联网 ngi 网络结构
下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
13
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 User authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
下载PDF
NGI中反应式一体化容错QoS单播路由机制 被引量:1
14
作者 王兴伟 蔡淑降 黄敏 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第10期1087-1090,共4页
在IP/DWDM光Internet中,如何提高其容错能力同时改善其QoS(qualityofservice)是需要解决的主要问题.容错QoS路由是解决该问题的一个有效方法.采用反应式容错策略,基于启发式A算法,设计了一种一体化容错QoS单播路由机制,在寻找路由的同... 在IP/DWDM光Internet中,如何提高其容错能力同时改善其QoS(qualityofservice)是需要解决的主要问题.容错QoS路由是解决该问题的一个有效方法.采用反应式容错策略,基于启发式A算法,设计了一种一体化容错QoS单播路由机制,在寻找路由的同时进行波长分配.该机制以网络延迟、负载、波长转换代价达到平衡的最佳值为目标,兼顾波长资源的高效利用和故障恢复率的提高.仿真研究表明,该机制是可行和有效的. 展开更多
关键词 下一代互联网(ngi) IP/DWDM光internet 反应式容错 一体化QoS单播路由 启发式A算法
下载PDF
论下一代网络与下一代Internet及其体系结构 被引量:3
15
作者 曾华燊 窦军 《计算机应用》 CSCD 北大核心 2007年第11期2615-2618,2622,共5页
对国际、国内有关下一代网络(NGN)和下一代Internet(NGI)研究与标准化工作进展情况进行了综述,分析了各类工作的优势与不足。在探讨NGI研究策略的基础上,以四川省网络通信技术重点实验室对NGI体系结构的研究工作为基础,概要地介绍了笔... 对国际、国内有关下一代网络(NGN)和下一代Internet(NGI)研究与标准化工作进展情况进行了综述,分析了各类工作的优势与不足。在探讨NGI研究策略的基础上,以四川省网络通信技术重点实验室对NGI体系结构的研究工作为基础,概要地介绍了笔者提出的"单物理层用户数据传输与交换平台体系结构"(SUPA)及"面向以太网的物理帧时槽交换"(EPFTS)技术,探讨了如何用上述技术解决Internet所面临的高速交换、服务质量保障和网络安全问题。 展开更多
关键词 下一代网络 下一代internet 网络体系结构
下载PDF
NGI中基于微分进化的柔性QoS组播路由算法 被引量:1
16
作者 王军伟 王兴伟 +1 位作者 黄敏 刘彭程 《计算机工程》 CAS CSCD 北大核心 2007年第19期1-3,25,共4页
针对满足多个约束条件的服务质量组播路由的特点,提出了一种下一代互联网中基于微分进化算法的柔性QoS组播路由算法。给出了QoS组播路由问题模型及其数学描述,针对NGI中QoS参数信息不精确的特点,基于模糊数学的相关知识并利用DE算法的... 针对满足多个约束条件的服务质量组播路由的特点,提出了一种下一代互联网中基于微分进化算法的柔性QoS组播路由算法。给出了QoS组播路由问题模型及其数学描述,针对NGI中QoS参数信息不精确的特点,基于模糊数学的相关知识并利用DE算法的寻优能力,找出在用户柔性QoS需求的条件下满足用户QoS需求的可信度和用户QoS满意度同时达到最大的组播路由树。对算法进行了仿真实现与性能评价,结果表明,它是可行和有效的。 展开更多
关键词 下一代互联网 柔性服务质量 组播路由 微分进化算法
下载PDF
NGI中一种基于食物链算法的柔性QoS组播路由算法 被引量:2
17
作者 王军伟 王兴伟 +1 位作者 黄敏 刘彭程 《计算机科学》 CSCD 北大核心 2007年第6期30-33,57,共5页
针对下一代互联网(Next Generation Internet,NGI)难以精确测量和用户服务质量(Quality of Service,QoS)需求难以完全表达的特点,设计了一种基于食物链算法(Food Chain Algorithm,FCA)的柔性QoS组播路由算法。给出了QoS组播路由问题模... 针对下一代互联网(Next Generation Internet,NGI)难以精确测量和用户服务质量(Quality of Service,QoS)需求难以完全表达的特点,设计了一种基于食物链算法(Food Chain Algorithm,FCA)的柔性QoS组播路由算法。给出了QoS组播路由问题模型及其数学描述,针对NGI中QoS参数信息不精确和用户需求柔性的特点,通过博弈分析确定用户和网络方在边上的效用能否达到Nash均衡,基于模糊数学的相关知识并结合FCA的寻优能力,找出在给定条件下用户效用、网络方效用和满足用户QoS需求的可信度同时达到最大的组播路由树。对算法进行了仿真实现与性能评价,结果表明,它是可行和有效的。 展开更多
关键词 ngi 柔性服务质量 组播路由 食物链算法 博弈论 NASH均衡
下载PDF
Internet的新发展和NI/GI建设 被引量:1
18
作者 周明天 蒋遂平 黄荣辉 《计算机应用》 CSCD 1998年第4期1-4,共4页
本文从技术的角度,介绍当前Internet的发展和NI/GII的建设,对某些关键性的问题提出了自己的看法和见解。
关键词 internet NⅡ/GⅡ 信息基础
下载PDF
NGI中立队竞争演化QoS组播路由算法
19
作者 王兴伟 任炜 +1 位作者 易秀双 黄敏 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第6期635-638,共4页
设计了一种NGI中的非NP类QoS组播路由算法.该算法以最小化费用为目标,基于立队竞争演化算法,寻找一棵延迟、延迟抖动、带宽及出错率受限且费用优化的组播路由树,一体化解决路由与波长分配问题,同时兼顾网络负载均衡.仿真研究表明,该算... 设计了一种NGI中的非NP类QoS组播路由算法.该算法以最小化费用为目标,基于立队竞争演化算法,寻找一棵延迟、延迟抖动、带宽及出错率受限且费用优化的组播路由树,一体化解决路由与波长分配问题,同时兼顾网络负载均衡.仿真研究表明,该算法是可行和有效的,不仅能够满足QoS约束,而且在组播树费用和运行时间上明显优于基于经典遗传算法的QoS组播路由算法. 展开更多
关键词 ngi IP/DWDM光internet QoS 组播 路由 立队竞争演化算法
下载PDF
NGI中一种混合智能预防式容错QoS单播路由模式
20
作者 王兴伟 蔡淑降 +1 位作者 于洋 黄敏 《计算机科学》 CSCD 北大核心 2007年第2期35-37,共3页
IP/DWDM(IPover Dense Wavelength Division Multiplexing)光Internet是下一代互联网NGI(Next Genera-tion Internet)主干网的主要组网技术之一。在IP/DWDM光Internet中,如何提高其容错能力同时改善其QoS(Qual-ity of Service)是需要解... IP/DWDM(IPover Dense Wavelength Division Multiplexing)光Internet是下一代互联网NGI(Next Genera-tion Internet)主干网的主要组网技术之一。在IP/DWDM光Internet中,如何提高其容错能力同时改善其QoS(Qual-ity of Service)是需要解决的主要问题,容错QoS路由是行之有效的解决方法之一。本文采用预防式容错策略,基于蚁群算法和遗传算法相结合的混合智能算法,设计了一种容错QoS单播路由模式。仿真研究表明,该模式是可行和有效的,具有较好的性能。 展开更多
关键词 ngi IP/DWDM光internet QOS单播路由 预防式容错 混合智能 蚁群算法 遗传算法
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部