RETRACTED: Innovation performance of listed companies based on machine computing and data envelopment analysis (Retracted Article)

被引:1
作者
Song, Xuan [1 ]
机构
[1] Wuhan Univ, Sch Econ, Wuhan 430072, Hubei, Peoples R China
关键词
Machine computing; Data envelopment analysis; Listed companies; Innovation performance; KEY MANAGEMENT; SECURITY; INTERNET; PROTOCOLS;
D O I
10.1007/s12652-021-03056-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The introduction and creation of new technological means can change and promote the process and results of economic development, thus promoting the steady progress of economic development. In these areas of economic development, some small-scale scientific and technological innovation enterprises occupy a large proportion, and the economic development in other areas cannot do without the promotion of these enterprises, which is a typical model in China Is the gem listing. The listing of gem not only symbolizes that China has made great progress in the field of scientific and technological innovation, but also directly confirms that innovation is the source of economic development. Innovation can not only promote the growth of economic development, but also promote the reform and optimization of economic development system. This paper takes the gem as an example, based on the computer calculation and data envelopment analysis, from the data analysis of the project, summarizes the key factors affecting the innovation and development of an enterprise, and studies the specific path to effectively promote innovation.
引用
收藏
页码:65 / 65
页数:13
相关论文
共 25 条
  • [1] Secure dynamic multiparty quantum private comparison
    Abulkasim, Hussein
    Farouk, Ahmed
    Hamad, Safwat
    Mashatan, Atefeh
    Ghose, Shohini
    [J]. SCIENTIFIC REPORTS, 2019, 9 (1)
  • [2] Improving the security of quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom
    Abulkasim, Hussein
    Farouk, Ahmed
    Alsusiaih, Hanan
    Hamdan, Walaa
    Hamad, Safwat
    Ghose, S.
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (11)
  • [3] Threat-based Security Analysis for the Internet of Things
    Atamli, Ahmad W.
    Martin, Andrew
    [J]. 2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2014, : 35 - 43
  • [4] A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Srinivas, Jangirala
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8739 - 8752
  • [5] Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
    Chen, Chin-Ling
    Chen, Chih-Cheng
    Li, De-Kui
    [J]. JOURNAL OF SENSORS, 2015, 2015
  • [6] An efficient mechanism to generate dynamic keys based on genetic algorithm
    Chunka, Chukhu
    Goswami, Rajat Subhra
    Banerjee, Subhasish
    [J]. SECURITY AND PRIVACY, 2021, 4 (05)
  • [7] Key Management in Web of Trust for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 363 - 370
  • [8] Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
    Durresi, Mimoza
    Subashi, Anisa
    Durresi, Arjan
    Barolli, Leonard
    Uchida, Kazunori
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (04) : 1631 - 1640
  • [9] Gang G., 2011, INTERNET TECHNOLOGY, P1, DOI DOI 10.1109/ITAP.2011.6006307
  • [10] Huang JJ, 2015, IEEE WCNC, P1701, DOI 10.1109/WCNC.2015.7127724