首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
2006年国外初创P2P小额资金借贷项目,该商业交易行为是以汇集小额资金为方向,旨在将该部分资金借贷给急需货币资金的私人群体,借此提高整个社会闲置货币资金的使用率。从2007年到2014年,自引进国外的网络借贷模式到现如今的发展猛增,体现了网贷平台的发展前景。然而由于经验不足,其问题平台也越来越多,其中欺诈平台现象也屡屡发生。本文主要从理论方面叙述对贷平台的研究背景及重要性,对其不足之处及对策等方面进行梳理。  相似文献   

2.
由于网络应用日渐繁多,基于网络的各种应用也成数量级的增长,如何把握这些网络流量是否影响到我们正常的工作?如何确定哪种应用是否正常?如何能够比较客观地区分网络应用?这些问题都为我们网络的高性能、高效率等日常维护提出了新的要求。这里,就现在比较流行的P2P流量进行分析  相似文献   

3.
P2P网络借贷是互联网技术与民间借贷相结合的一种金融创新模式。信用是影响P2P网络借贷交易的重要因素,然而中国缺少高度透明的个人信用体系,借款人的信用评级完全由P2P网络借贷平台的信用认证机制做出。本文基于"人人贷"的数据,从信息不对称的理论框架出发,研究P2P网络借贷平台的信用认证机制对借贷行为的影响。结果发现,信用评级越高,借款成功率越高且借款成本越低。进一步分析认证指标和认证方式对借贷行为的影响,研究发现,对借贷行为影响较大的是工作认证、收入认证、视频认证和车产、房产认证等认证指标。另外,相比单纯的线上信用认证方式,线上和线下相结合的信用认证方式更能提高借款成功率并降低借款成本。本文的研究结果表明,"人人贷"的信用认证机制能够揭示信用风险,缓解借贷双方的信息不对称问题,但评级指标的单一决定了其风险揭示作用的局限性。为了进一步发挥信用认证机制的风险揭示作用并降低借贷双方信息不对称问题,应丰富和完善多层次认证指标,规范线下信用认证方式,加强政府对P2P网络借贷平台信用认证机制的监管。  相似文献   

4.
其实,无论是前年央行等十部委出台《关于促进互联网金融健康发展的指导意见》(以下称"指导意见"),还是去年8月银监会等四部委印发《网络借贷信息中介机构业务管理暂行办法》,都无一例外地强调,P2P网贷资金应由银行业金融机构进行存管。接下来,《网络借贷资金存管业务指引》是否会在前两项制度的基础上,对银行如何开展P2P网贷资金存管业务作进一步明确和细化呢?  相似文献   

5.
本文介绍了智能代理技术和电子商务以及智能代理技术在电子商务中的应用,并对P2P电子商务进行界定,然后从P2P智能代理需求、P2P智能代理应用,进行P2P电子商务中的智能代理技术的研究。  相似文献   

6.
为解决烟包印刷质量在线检测问题,本文提出了一种基于图像处理和BP神经网络的印刷质量检测和诊断方法。利用待测印刷图像和标准模版图像间差异的特征参数,BP神经网络可将印刷品分成优秀、合格以及不合格三类。实验结果表明,现有系统能够满足烟包印刷质量检测的需求,并且能够运用于烟包印刷质量的在线检测中。  相似文献   

7.
银行们争相走进社区,但去年底被监管暂时喊了“咔”。与此同时,被视为传统银行颠覆者的互联网金融斗士们也开始走进线下社区,从抢夺门面房开始与银行短兵相接。  相似文献   

8.
在互联网技术不断革新的推动下,P2P融资模式作为一种新兴的互联网借贷模式,近年来迅速发展。本文探讨了P2P融资模式的概念及其特征,阐述了P2P融资模式在中小企业中应用的必要性和可行性分析,P2P平台应开展专业化、多元化服务,监管机构应建立全国性的规范征信体系、制定相关的法律法规政策及中小企业应加强自身建设,以促进中小企业P2P融资模式的健康发展。  相似文献   

9.
范杰 《工业会计》2013,(12):56-57
P2P(Peer to Peer)原本是指互联网对等实体问的信息交互方式。2005年出现了将这种信息交互方式运用到借贷服务企业——由该企业在网络上提供平台,使零售贷款的供求信息能够交流,并促成交易。国内的P2P已经突破了互联网限制,产生了线下(如宜信模式)和线上P2P。其定义为依靠资金中介通过互联网为借贷双方提供居间服务,以促进借贷交易。  相似文献   

10.
李鸿 《工业会计》2013,(12):24-24
在2013西安金博会现场,提供民间借贷的公司表现得非常踊跃,这些理财公司出示的年化收益率基本都在12%以上。面对这样的诱惑,许多市民虽然动心却十分谨慎。什么是P2P信贷,如何看它的收益风险特征?对此,本刊记者为此专访了汇中普惠财富投资管理(北京)有限公司(以下简称“汇中财富”)西北大区经理韩菲女士。  相似文献   

11.
平台信息披露与信用评级是影响出资人意愿,进而影响P2P平台融资成功率的重要因素。本文综合考虑了平台、出资人、借款人三方的相互影响,并以中国第一家P2P借贷平台网站--拍拍贷在2014年1~12月的真实交易数据为样本,研究P2P平台的融资成功率影响因素。研究发现:借款详情描述字数越多,融资成功率越低,这也验证了出资人存在“懒人效应”。借款金额、利率、期限以及历史失败次数均会降低融资成功率。而历史成功次数、性别、工作、平台评级、认证均与融资成功率呈显著的正向关系。其中年龄与融资成功率没有直接关系。在所有影响因素中,平台评级在所有促进融资成功的变量中系数最大。本文研究对规范P2P平台,提高平台融资成功率具有意义。  相似文献   

12.
设计并实现了以ARM11内核S3C6410处理器和2片DM9000网卡控制器为平台的主动防火墙硬件平台,设计了DM9000的Linux驱动,以Linux操作系统的Netfilter防火墙框架为基础加入入侵检测模块和响应模块,形成一个以规则策略集为中心的集检测、防护和响应为一体的主动防御系统.  相似文献   

13.
The effectiveness of many proposed policies regarding both online copyright protection and network neutrality depend on the extent to which it is technically possible to detect peer-to-peer file sharing (P2P), the transfer of copyrighted files, or both. There are many detection approaches, some performed primarily by network operators and some by application-layer agents. This paper describes capabilities, limitations, privacy issues, and policy implications of detection technologies and their countermeasures, in part through quantitative analysis of empirical data. Different approaches are better for different purposes. Network operators are well-positioned to estimate how widespread copyright violations are, but application-layer detection from outside entities has important advantages when the purpose is punishment. Detection is also imperfect, so policies should require more transparency regarding how it is done than we see today. It is shown that, although network operators may not detect every transfer, and they typically miss more video than audio, they can identify most individuals who share copyrighted files via P2P after several weeks of monitoring provided that traffic is unencrypted, which is useful for some purposes. However, it is also shown that encryption is already in use, and it effectively prevents network operators from detecting transfers of copyrighted content. Thus, if network operators are held responsible for monitoring illegal file sharing, there is a tension between using detection to identify violators of copyright law for punishment, which may motivate even greater use of encryption, and using detection for other purposes such as creating fair compensation schemes for copyright-holders, warning users that they may be violating copyright law, or allocating network resources. Alternatively, there are forms of detection that are not evaded through encryption, and application-layer agents rather than network operators are primarily responsible for these. These copyright policy issues are intertwined with network neutrality policy in subtle ways. Network neutrality rules do not protect illegal transfers of copyrighted content, but if network operators are responsible for enforcement (as in “graduated response”) then regulators must determine when it is reasonable to terminate or degrade service based on allegations of copyright violation given the limitations of detection technology to prove those allegations. Allegations of copyright violation should be considered invalid unless they are accompanied with information about how detection was performed and an opportunity for rebuttal. Such transparency has been routinely lacking in both laws and industry agreements.  相似文献   

14.
This paper presents a case study of condition based maintenance modelling based on measured metal concentrations observed in oil samples of a fleet of marine diesel engines. The decision model for optimising the replacement time of the diesel engines conditional on observed measurements is derived and applied to the case discussed. We described the datasets, which were cleaned and re-organised according to the need of the research. The residual time distribution required in the decision model was formulated using a technique called stochastic filtering. Procedures for model parameter estimation are constructed and discussed in detail. The residual life model presented has been fitted to the case data, and the modelling outputs are discussed.  相似文献   

15.
《Telecommunications Policy》2014,38(5-6):415-425
There is an ongoing discussion in the market which Next Generation Access (NGA) architecture best suits future needs and which investment and cost differences exist. The discussion can be subsumed as P2P vs. GPON, which is somewhat misleading as this article reveals. The discussion is driven by the fact that the high capital cost and the long asset life time of fibre mean that the technology choices made today will dominate the opportunities for telecommunication business of all market players, incumbents, competitors, content providers and business and residential users for many years in the future.The paper analyzes the cost and other differences between Fibre-to-the-Home (FTTH) access network architectures and their related different wholesale approaches by using the well-known and understood steady state approach applied in other NGA analyses in the past. In addition to the steady state analysis a dynamic cost evaluation is included taking into account the different investment behaviour of the FTTH architectures over time. The results describe investment and cost differences between architectures, incumbents and wholesale based competitive operators. The analysis has been performed for different geotypes (clusters) of decreasing population density in a representative European settlement structure.  相似文献   

16.
以互联网为基础,运用JAVA技术、数据库技术及面向对象的分析设计方法,综合行业共性,确定了河北省科技成果网络管理系统的功能需求及软硬件开发平台,建立了系统的分析设计模型,探讨了系统实现中对象和数据库之间的映射等问题。  相似文献   

17.
针对图像经过CARDBAL多小波变换后,各层系数的能量平均分配,且其同一尺度、同一方向上的4个子块系数相近这一特性,结合奇异值分解和BP神经网络将二值图案水印嵌入到多小波系数的高频分量中。实验表明,该算法有良好的不可感知性和强健的鲁棒性。  相似文献   

18.
This study traces the evolution of commons-based peer production by a measurement-based analysis of case studies and discusses the impact of peer production on net neutrality and copyright law. The measurements include websites such as suprnova.org, youtube.com, and facebook.com, and the Peer-to-Peer (P2P) systems Kazaa, Bittorrent, and Tribler. The measurements show the two sides of peer production, the pirate side with free availability of Hollywood movies on these P2P systems and the Samaritan side exhibited by the quick joining of 400,000+ people in a community to organize protests against events in Burma. The telecommunications and content industry are disrupted by this way of peer production. As a consequence, revenues of both industries are likely to suffer in the coming years. On the other hand, innovative P2P systems could win the battle on merit over classical distribution technologies. As a result, a continuation is expected of both legal actions against P2P and possible blocking actions of P2P traffic, violating net neutrality. It is argued that this hinders innovation and causes a large discrepancy between legal and user perspectives. A reform of copyright laws is clearly needed, otherwise they will be unenforceable around 2010.  相似文献   

19.
建设工程监理是一种以严密制度为特征的综合管理行为,传统的管理模式已不能胜任现代工程的新特点。为了合理地进行计划、组织、协调、控制,监理企业必须结合现代工程项目的管理方法,充分利用现代项目管理软件进行控制。文中引入项目管理的系统方法,采用工作分解结构(WBS)方法,对工程项目进行分解,提出一种监理工作的明确表示法。在此基础上结合P3e/c的项目管理信息系统,实现建设工程监理的动态控制。  相似文献   

20.
以Browser/Server构架为基础搭建了教学辅助系统,并结合以Client/Server模式的"大学生体验英语配套视听系统"而构建英语自主视听学习系统,使网络英语自主学习的教学模式更趋完善。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号