Showing 1,521 - 1,540 results of 3,341 for search '"Information Technology"', query time: 0.08s Refine Results
  1. 1521

    Digital Finance, Financing Constraint and Enterprise Financial Risk by Zhaolin Wang

    Published 2022-01-01
    “…With the rapid development of the digital economy, digital finance, as a financial innovation combining Internet information technology with traditional finance, plays an essential role in the financial risk of microenterprises and macroeconomic operations. …”
    Get full text
    Article
  2. 1522
  3. 1523
  4. 1524

    Quantum Internet: key technologies and future prospect by Zishan LIU, Junsen LAI, Wenyu ZHAO

    Published 2022-02-01
    “…The quantum Internet integrates quantum computing, quantum measurement and communication, which can be described as the future goal of the evolution of quantum information technology.However, due to the restrictions of the laws of quantum mechanics, such as quantum teleportation, quantum entanglement, quantum measurement and non-cloning, which all pose new challenges to the quantum networking design.The basic concepts and development paths of the quantum Internet were firstly introduced, and the implementation differences between the classical network and the quantum network were explained.Considering the difference between quantum communication and the traditional communication, the key technologies for realizing the quantum Internet including the quantum physical devices, networking protocol, quantum decoherence and quantum relay were introduced, and finally the prospect and suggestions for developing quantum Internet was presented.…”
    Get full text
    Article
  5. 1525
  6. 1526

    De la matière historique à l’outil numérique : comment articuler le travail des historiens et des informaticiens avec les agences de développement logiciel ? by Manuelle Aquilina, Olivier Hû, Jean-René Ladurée

    Published 2024-06-01
    “…Experts in history and information technology come together in the context of projects run by development agencies that are entrusted by cultural organisations with the task of developing digital mediation devices. …”
    Get full text
    Article
  7. 1527
  8. 1528
  9. 1529

    Den europæiske unions harmonisering af strafferetten by Thomas Elholm

    Published 2002-06-01
    “…New information technology and the increasing transnational mobility of persons and goods have lead to changes in patterns of both crime and criminality. …”
    Get full text
    Article
  10. 1530
  11. 1531

    Geografia e Inteligência Territorial: conceitos, métodos e práticas aplicados à pesquisa em Segurança Hídrica by Raimundo Nonato Junior

    Published 2023-10-01
    “…These foundations served as the basis for the Water Security Panel (PSH) research project, with a view to linking theory and practice between Geography and Information Technology. The text also situates this discussion within the thematic scenario of water security and highlights the challenges for territorial innovation in this area. …”
    Get full text
    Article
  12. 1532

    A survey of key protocol and application scenario of time-sensitive network by Peizhuang CONG, Ye TIAN, Xiangyang GONG, Xirong QUE, Wendong WANG

    Published 2019-10-01
    “…With the development of information technology,the demand for scenarios with objects as the main body of communication is increasing,such as factory automation control,automatic driving,etc.The time delay requirements of such communication for data transmission far exceed the controllable range of traditional ethernet,then time-sensitive network have emerged.Time-sensitive network is a standardized technology that provides deterministic information transmission based on standard ethernet.It minimizes jitter through time-aware scheduling mechanism and provides reliable guarantee of data transmission for time-sensitive applications.The core characteristics and mechanism of time-sensitive network were introduced through the description of IEEE standards and its application scenarios were analyzed in vehicle network,industrial internet,aircraft data network and mobile fronthaul network.…”
    Get full text
    Article
  13. 1533

    Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era by De-yu YUAN, Xiao-juan WANG, Jian-chao WAN

    Published 2017-05-01
    “…The rapid development of network and information technology have profoundly changed the way of human life,work and thinking.However,in sharp contrast to technological development and subscriber growth,the global cyberspace security situation is becoming increasingly complex.Therefore,the importance of cyberspace security should be emphasized,and building safe and stable cyberspace is of great significance in the Internet plus era.The fact that the scale of the network continues to expand,the application model becomes more and more innovative,and the application environment becomes more and more complex brings a lot of new security issues.Based on this consideration,the influence of Internet plus on cyberspace security and the technology development trend was analyzed,and the countermeasures and suggestions were given.…”
    Get full text
    Article
  14. 1534

    Research on 5G network deployment scheme for intelligent manufacturing by Hong SHEN, Ling CUI, Tiankui ZHANG

    Published 2022-05-01
    “…Building smart factories based on 5G network and other new generation of advanced information technology is an important way for enabling industrial upgrading and realizing intelligent manufacturing.Firstly, the typical application scenario 5G network in intelligent manufacturing was analyzed and then the requirement of 5G network performance indicators was given.Based on these analysis, the specific deployment scheme of 5G network was design, including the high network capacity and large number of connections, high reliability and low delay, 5G slicing, toC/toB isolation and network security.The proposed 5G network deployment scheme provided a useful reference for the construction of smart factory based on 5G network and other advanced information technologies.…”
    Get full text
    Article
  15. 1535
  16. 1536

    Research on active defense application based on honeypot by Dequan YANG, Weimin LIU, Zhou YU

    Published 2018-01-01
    “…Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.…”
    Get full text
    Article
  17. 1537
  18. 1538
  19. 1539
  20. 1540