Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • In“the 21st century digital silk road”, Private enterprises have a lot to offer
    • XIN Xing, YAO Jingzhou
    • Information and Communications Technology and Policy. 2018, 44(9): 5-8.
    • Abstract ( 177 )   
    • The proposal of president Xi’s“ Belt and Road”strategic concept has pointed out the direction for China’s information and communication industry to go global. China's private information and communication enterprises have stepped out of the country. With hard work, flexible mechanisms and good services, they have successfully carried out network construction and operation in information communication, Internet and multimedia in some countries, opening up new development situation in overseas localization. The overseas market expansion of private enterprises in China started late,and had certain disadvantages in terms of access to funds and policy support. The scale and effectiveness of going global have yet to be further improved. Therefore, it is recommended that relevant government departments increase support in terms of access to funds, information service systems, response to policy barriers, and participation in international cooperation, encourage private enterprises to become bigger and stronger, and promote long-term operations, and promote enterprises to develop in the“Belt and Road”information and communication market. The area continues to gain new breakthroughs.
    • Related Articles | Metrics
    • Discussion on 5G backhaul based on mixed network of IP RAN and PeOTN
    • MANXiangkun, WANGHaijun, PANGRan, SHIYan
    • Information and Communications Technology and Policy. 2018, 44(9): 26-30.
    • Abstract ( 233 )   
    • 5G network is about to start the pilot deployment. Operators proposed IP RAN, SPN, MOTN, G.metro and other technical solutions for fronthaul and backhaul network. The article focuses on 5G backhaul based on mixed network of IP RAN and PeOTN. Firstly the current research progress of 5G backhaul was introduced; Secondly the target architecture of 5G backhaul network was defined; The last, 5G backhaul scheme based on mixed network of IP RAN and PeOTN was given in detail.
    • Related Articles | Related Articles | Metrics
    • Analysis on 5G transport requirements
    • LI Fang, ZHANG Haiyi, WU Bingbing
    • Information and Communications Technology and Policy. 2018, 44(9): 40-45.
    • Abstract ( 109 )   
    • From the perspective of 5G services scenarios and network architecture changes, this paper analyzes zes summarizes the three performance indicators and six types of networking functional requirements of 5G transport network, and puts forward suggestions for 5G transport technology and industry development.
    • Related Articles | Related Articles | Metrics
    • TheAnti-attack Characterisics of CD-RFID
    • LIULibai
    • Information and Communications Technology and Policy. 2018, 44(9): 50-54.
    • Abstract ( 85 )   
    • This paper is a continuation of“TheAnti-interception Characteristics of Code-Division Radio Frequency Identification (CD-RFID)”.The requirements of anti-attack characteristics of UHF RFID are introduced, and the malicious attacks thatUHFRFID may be attacked are emphasized.The currentUHFRFID system has no solution to this problem. However, the inherent security elements of code division radio frequency identification system constitute anti-attack capability against various attacks using detecting receiving information and utilizing recognition information.
    • Related Articles | Related Articles | Metrics
    • The research on the current status of Cloud Service Security Certification
    • ZHANGZhibing, NIPing, FUKai, LIUShan
    • Information and Communications Technology and Policy. 2018, 44(9): 55-58.
    • Abstract ( 93 )   
    • This paper reviews the current status of security standards related to cloud computing services at home and abroad, teases out the research status and achievements of international and foreign standards organizations in the United States and European Union on cloud computing services security, and analyzes the major domestic standards organizations, such as TC260 andCCSA,in the cloud service security aspects of standardization work status. In cloud computing service security authentication, the paper compares the existing international and domestic cloud computing service authentication system, and analyzes the current situation and existing problems of cloud service security evaluation in the United States, European Union and China. In orderTo meet the security requirements arising from the rapid development of the cloud computing industry, this paper concludes that it is necessary to research and further improve the cloud service security authentication mechanism based on the existing system.
    • Related Articles | Related Articles | Metrics
    • Computer vision technology and industrial application situation analysis
    • HUANGWei
    • Information and Communications Technology and Policy. 2018, 44(9): 59-62.
    • Abstract ( 64 )   
    • Computer vision is an important development direction of artificial intelligence, which can greatly improve the way people interact with the world. The basic elements of computer vision include data, algorithm models and computing power. The core technologies involve image classification, object detection, target tracking, semantic segm entation and instance segmentation. The computer visual algorithm technology layer has high barriers, the hardware layer is densely populated, the giants are numerous, and the application layer market is relatively scattered. The technology level of China's middle and upstream of the industry needs to be improved, white technology integration innovation, new algorithm development and cost reduction, GPU chip technology and industrialization are still Faced with severe challenges. In addition, front-end intelligence, front-end collaborative computing and software and hardware integration have become a clear development trend. Data and application scenarios will become the key points of enterprise layout. Deep learning and convolutional neural networks will promote continuous optimization and upgrade of computer vision. In the future, China should build a local computer vision industry cluster from the aspects of strengthening the coordinated development of the industrial chain, vigorously carrying out technical research, and supporting the application of future scenarios, and enhance the international competitiveness of the industry.
    • Related Articles | Metrics
    • Chinese companies respond after GDPR implementation
    • LIU Yaohua, LIN Lin
    • Information and Communications Technology and Policy. 2018, 44(9): 74-77.
    • Abstract ( 75 )   
    • After two years of transition, the“General Data Protection Regulations”, known as the most stringent personal information protection legislation in the history of the European Union, came into force directly on all members of the European Union on May 25. In April 2016, GDPR was approved by the EU legislature, and the EU's 1995 Directive on the Protection of Individuals' Rights and Personal Data Processing and the Free Flow of Personal Data (hereinafter referred to as the“95 Directive”) was fully upgraded. The European Union has opened a new chapter in the protection of personal data. GDPR may have direct and far-reaching impact on China's corporate compliance, data management, related legislation, and foreign trade negotiations. In response to the relevant regulations and possible impacts of GDPR, measures should be taken as soon as possible to improve corporate compliance, strengthen data security supervision, formulate legislation on personal information protection, and handle foreign trade negotiations.
    • Related Articles | Related Articles | Metrics