共查询到20条相似文献,搜索用时 93 毫秒
1.
2.
由于网络应用日渐繁多,基于网络的各种应用也成数量级的增长,如何把握这些网络流量是否影响到我们正常的工作?如何确定哪种应用是否正常?如何能够比较客观地区分网络应用?这些问题都为我们网络的高性能、高效率等日常维护提出了新的要求。这里,就现在比较流行的P2P流量进行分析 相似文献
3.
P2P网络借贷是互联网技术与民间借贷相结合的一种金融创新模式。信用是影响P2P网络借贷交易的重要因素,然而中国缺少高度透明的个人信用体系,借款人的信用评级完全由P2P网络借贷平台的信用认证机制做出。本文基于"人人贷"的数据,从信息不对称的理论框架出发,研究P2P网络借贷平台的信用认证机制对借贷行为的影响。结果发现,信用评级越高,借款成功率越高且借款成本越低。进一步分析认证指标和认证方式对借贷行为的影响,研究发现,对借贷行为影响较大的是工作认证、收入认证、视频认证和车产、房产认证等认证指标。另外,相比单纯的线上信用认证方式,线上和线下相结合的信用认证方式更能提高借款成功率并降低借款成本。本文的研究结果表明,"人人贷"的信用认证机制能够揭示信用风险,缓解借贷双方的信息不对称问题,但评级指标的单一决定了其风险揭示作用的局限性。为了进一步发挥信用认证机制的风险揭示作用并降低借贷双方信息不对称问题,应丰富和完善多层次认证指标,规范线下信用认证方式,加强政府对P2P网络借贷平台信用认证机制的监管。 相似文献
4.
5.
本文介绍了智能代理技术和电子商务以及智能代理技术在电子商务中的应用,并对P2P电子商务进行界定,然后从P2P智能代理需求、P2P智能代理应用,进行P2P电子商务中的智能代理技术的研究。 相似文献
6.
为解决烟包印刷质量在线检测问题,本文提出了一种基于图像处理和BP神经网络的印刷质量检测和诊断方法。利用待测印刷图像和标准模版图像间差异的特征参数,BP神经网络可将印刷品分成优秀、合格以及不合格三类。实验结果表明,现有系统能够满足烟包印刷质量检测的需求,并且能够运用于烟包印刷质量的在线检测中。 相似文献
7.
银行们争相走进社区,但去年底被监管暂时喊了“咔”。与此同时,被视为传统银行颠覆者的互联网金融斗士们也开始走进线下社区,从抢夺门面房开始与银行短兵相接。 相似文献
8.
在互联网技术不断革新的推动下,P2P融资模式作为一种新兴的互联网借贷模式,近年来迅速发展。本文探讨了P2P融资模式的概念及其特征,阐述了P2P融资模式在中小企业中应用的必要性和可行性分析,P2P平台应开展专业化、多元化服务,监管机构应建立全国性的规范征信体系、制定相关的法律法规政策及中小企业应加强自身建设,以促进中小企业P2P融资模式的健康发展。 相似文献
9.
10.
在2013西安金博会现场,提供民间借贷的公司表现得非常踊跃,这些理财公司出示的年化收益率基本都在12%以上。面对这样的诱惑,许多市民虽然动心却十分谨慎。什么是P2P信贷,如何看它的收益风险特征?对此,本刊记者为此专访了汇中普惠财富投资管理(北京)有限公司(以下简称“汇中财富”)西北大区经理韩菲女士。 相似文献
11.
平台信息披露与信用评级是影响出资人意愿,进而影响P2P平台融资成功率的重要因素。本文综合考虑了平台、出资人、借款人三方的相互影响,并以中国第一家P2P借贷平台网站--拍拍贷在2014年1~12月的真实交易数据为样本,研究P2P平台的融资成功率影响因素。研究发现:借款详情描述字数越多,融资成功率越低,这也验证了出资人存在“懒人效应”。借款金额、利率、期限以及历史失败次数均会降低融资成功率。而历史成功次数、性别、工作、平台评级、认证均与融资成功率呈显著的正向关系。其中年龄与融资成功率没有直接关系。在所有影响因素中,平台评级在所有促进融资成功的变量中系数最大。本文研究对规范P2P平台,提高平台融资成功率具有意义。 相似文献
12.
设计并实现了以ARM11内核S3C6410处理器和2片DM9000网卡控制器为平台的主动防火墙硬件平台,设计了DM9000的Linux驱动,以Linux操作系统的Netfilter防火墙框架为基础加入入侵检测模块和响应模块,形成一个以规则策略集为中心的集检测、防护和响应为一体的主动防御系统. 相似文献
13.
The effectiveness of many proposed policies regarding both online copyright protection and network neutrality depend on the extent to which it is technically possible to detect peer-to-peer file sharing (P2P), the transfer of copyrighted files, or both. There are many detection approaches, some performed primarily by network operators and some by application-layer agents. This paper describes capabilities, limitations, privacy issues, and policy implications of detection technologies and their countermeasures, in part through quantitative analysis of empirical data. Different approaches are better for different purposes. Network operators are well-positioned to estimate how widespread copyright violations are, but application-layer detection from outside entities has important advantages when the purpose is punishment. Detection is also imperfect, so policies should require more transparency regarding how it is done than we see today. It is shown that, although network operators may not detect every transfer, and they typically miss more video than audio, they can identify most individuals who share copyrighted files via P2P after several weeks of monitoring provided that traffic is unencrypted, which is useful for some purposes. However, it is also shown that encryption is already in use, and it effectively prevents network operators from detecting transfers of copyrighted content. Thus, if network operators are held responsible for monitoring illegal file sharing, there is a tension between using detection to identify violators of copyright law for punishment, which may motivate even greater use of encryption, and using detection for other purposes such as creating fair compensation schemes for copyright-holders, warning users that they may be violating copyright law, or allocating network resources. Alternatively, there are forms of detection that are not evaded through encryption, and application-layer agents rather than network operators are primarily responsible for these. These copyright policy issues are intertwined with network neutrality policy in subtle ways. Network neutrality rules do not protect illegal transfers of copyrighted content, but if network operators are responsible for enforcement (as in “graduated response”) then regulators must determine when it is reasonable to terminate or degrade service based on allegations of copyright violation given the limitations of detection technology to prove those allegations. Allegations of copyright violation should be considered invalid unless they are accompanied with information about how detection was performed and an opportunity for rebuttal. Such transparency has been routinely lacking in both laws and industry agreements. 相似文献
14.
A case study of condition based maintenance modelling based upon the oil analysis data of marine diesel engines using stochastic filtering 总被引:2,自引:0,他引:2
This paper presents a case study of condition based maintenance modelling based on measured metal concentrations observed in oil samples of a fleet of marine diesel engines. The decision model for optimising the replacement time of the diesel engines conditional on observed measurements is derived and applied to the case discussed. We described the datasets, which were cleaned and re-organised according to the need of the research. The residual time distribution required in the decision model was formulated using a technique called stochastic filtering. Procedures for model parameter estimation are constructed and discussed in detail. The residual life model presented has been fitted to the case data, and the modelling outputs are discussed. 相似文献
15.
《Telecommunications Policy》2014,38(5-6):415-425
There is an ongoing discussion in the market which Next Generation Access (NGA) architecture best suits future needs and which investment and cost differences exist. The discussion can be subsumed as P2P vs. GPON, which is somewhat misleading as this article reveals. The discussion is driven by the fact that the high capital cost and the long asset life time of fibre mean that the technology choices made today will dominate the opportunities for telecommunication business of all market players, incumbents, competitors, content providers and business and residential users for many years in the future.The paper analyzes the cost and other differences between Fibre-to-the-Home (FTTH) access network architectures and their related different wholesale approaches by using the well-known and understood steady state approach applied in other NGA analyses in the past. In addition to the steady state analysis a dynamic cost evaluation is included taking into account the different investment behaviour of the FTTH architectures over time. The results describe investment and cost differences between architectures, incumbents and wholesale based competitive operators. The analysis has been performed for different geotypes (clusters) of decreasing population density in a representative European settlement structure. 相似文献
16.
以互联网为基础,运用JAVA技术、数据库技术及面向对象的分析设计方法,综合行业共性,确定了河北省科技成果网络管理系统的功能需求及软硬件开发平台,建立了系统的分析设计模型,探讨了系统实现中对象和数据库之间的映射等问题。 相似文献
17.
18.
This study traces the evolution of commons-based peer production by a measurement-based analysis of case studies and discusses the impact of peer production on net neutrality and copyright law. The measurements include websites such as suprnova.org, youtube.com, and facebook.com, and the Peer-to-Peer (P2P) systems Kazaa, Bittorrent, and Tribler. The measurements show the two sides of peer production, the pirate side with free availability of Hollywood movies on these P2P systems and the Samaritan side exhibited by the quick joining of 400,000+ people in a community to organize protests against events in Burma. The telecommunications and content industry are disrupted by this way of peer production. As a consequence, revenues of both industries are likely to suffer in the coming years. On the other hand, innovative P2P systems could win the battle on merit over classical distribution technologies. As a result, a continuation is expected of both legal actions against P2P and possible blocking actions of P2P traffic, violating net neutrality. It is argued that this hinders innovation and causes a large discrepancy between legal and user perspectives. A reform of copyright laws is clearly needed, otherwise they will be unenforceable around 2010. 相似文献
19.