Discussion on the Development Path of Chinas Laser Industry
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 5
Abstract
Since the formation of China’s laser industry, it has maintained a good momentum of development, the industrial scale has maintained steady growth, the industrial structure is mature, the technical strength is constantly enhanced, and the industry application is gradually expanded. In the future, China’s laser industry will further develop rapidly, but affected by the macro environment, there may be risks such as the increase of R and D costs and the short term fracture of the industrial chain. The industry will also face the problems of intensified competition and lagging key technologies. In this paper, the SWOT analysis method is used to determine the internal strengths, weaknesses, external opportunities, and threats of China’s laser industry development, and the AHP analysis method is used to quantify and visualize the factors affecting the development of China’s laser industry. It can be concluded that China’s laser industry should attach importance to technological innovation, strengthen the vertical integration ability of industry, and actively participate in international cooperation to promote the development of China’s laser industry. Xiaoyan Li | Mrs. Di Li "Discussion on the Development Path of China's Laser Industry" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31905.pdf Paper Url :https://www.ijtsrd.com/management/strategic-management/31905/discussion-on-the-development-path-of-chinas-laser-industry/xiaoyan-li
Authors and Affiliations
Xiaoyan Li | Mrs. Di Li
Database Security Model using Access Control Mechanism in Student Data Management
Database security means the protection of data against unauthorized disclosure, alteration, destruction. This paper present a procedure to implement a Data Access Policy to ensure the protection of privacy rights of stud...
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Accessible encryption Technique is expanding the enthusiasm to ensure the information protection in secure accessible distributed storage. In this task, explore the security of a notable cryptographic crude, specifically...
Design and Fabrication of IoT Enabled Wheelchair cum Stretcher with Home Automation and Patient Monitoring System
The proposed project was aimed at designing and fabricating a wheelchair cum stretcher that can overcome the shortcomings of a conventional wheelchair, with focus on cost effectiveness and utility. This project will elim...
Analysis of Allocation Algorithms in Memory Management
Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance and also known as memory allocation. P...
A Review on Various Image Watermarking Technique
This paper represents digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Two types of di...