共查询到20条相似文献,搜索用时 140 毫秒
1.
2.
印章作为一种标记在我国已有很古老的历史。如今,随着网络和信息技术的发展,人们的工作方式和行为方式发生了极大的变化,在印章领域,信息化已经使得传统的手工印章向电子印章转变,特别是《中华人民共和国电子签名法》实施后,电子印章有望在网上报税、电子发票、网上结算、电子保单、证券交易、企业年检等方面代替传统印章。 相似文献
3.
4.
加入WTO给我国的教育发展带来了新的机遇与挑战。WTO总协议中的《服务贸易总协议》第5条是教育服务,凡是签署了教育服务贸易协定的国家,必须承诺开放教育市场,其内容有5项:初等教育服务、中等教育服务、高等教育服务、成人教育服务与其他教育服务,涉及到各类教育与培训活动。因此,加入WTO后,要在教育领域引入新的竞争机制,通过合理地引进国外优质的教育资源,大力发展高等职业教育的信息化和网络化建设,通过各种信息和资源的共享,推动我国高等职业教育改革的深化,使我国的高等职业教育走上一个新的台阶。一、加入WTO对高等职业教育的影… 相似文献
6.
于晓燕 《中国新技术新产品》2010,(6):253-253
图书馆2.0作为一种新型的图书馆服务理念,是图书馆界在信息时代的一次自我适应与转型的尝试,图书馆2.0对于图书馆的服务从到提出了新的要求。公共图书馆的电子阅览室是公共图书馆的一个较为特殊的服务机构。互联网服务模式与信息技术的每一次变革都会对其产生直接的影响,对于电子阅览室馆员的素质都会产生新的要求。本文讨论的主要内容就是图书馆2.0的大环境下公共图书馆电子阅览室馆员应当具备的素质。 相似文献
7.
8.
针对现有电子现金系统的不足,提出了一类基于椭圆曲线密码的离线电子现金方案.方案中自动更新的现金数据库可以删除过期的电子现金,避免了银行现金数据库可能无限增大的问题;在通信会话协议中,同时实现了签名、认证、加密传输和数据恢复,签名与认证的协议过程同时也是加密通信的过程,减化了常规的密码协议过程.与已有的方案相比,方案中协议与算法简洁、高效,在安全强度不变的条件下,降低了软硬件实现的系统开销,可广泛应用于电子商务等网络业务环境。 相似文献
9.
WAGO作为弹簧压接电气连接技术和电子接口模块领域的开创者,于1995年推出了第一个适用于各类现场总线协议的模块化总线系统。如今,创新性和多样性成为越发重要的标准。紧凑型设计和最高质量标准的统一使WAGO-I/O-SYSTEM成为世界范围内最为成功的现场总线系统之一。万可电子(天津)有限公司是德国WAGO在中国的独资子公司,该公司在中国15年的发展过程中,取得了非常好的成就,产品和服务广泛被业界认可。在Achem Asia展会上,本刊记者就万可在此次展会推出的核心产品及万可在中国的发展等问题,采访了万可电子(天津)有限公司总经理彭夫柯(Volker Palm)先生及I/O技术支持部陈浩先生。 相似文献
11.
目的为保证含有号码印刷错误的票据不流入社会,研究一种新的用于票据印刷在线检测系统的号码识别方案。方法提出一种基于结构特征的票据号码识别方法。先对票据图像进行采集、灰度化、二值化、去噪、倾斜校正、字符定位、单字符分割及归一化等一系列预处理。建立一种基于结构特征的号码识别分类器,再根据票据中每个号码的结构特征值,对号码进行分类识别。结果实验结果表明,利用文中提出的结构特征方法,票据号码识别率达到99%以上。结论经过对大量实际发票号码的识别测试实验,该方法有较强的抗干扰性,识别算法速度快、精度高。 相似文献
12.
The article describes why trust is the core element for the success of electronic commerce or electronic government in the field of intellectual property. The introduction of electronic commerce in intellectual property marks a radical break with traditional methods of communication. Such a radical change can only be successful if all the users (i.e. offices, intermediaries, applicants and interested third parties) have confidence in the new system. There are various ways of inspiring confidence: by consultation over the design of the new system; by creation of a secure legal framework; by mechanisms to eliminate any errors; by an understanding of the new processes; by freedom to choose, for example not to use electronic commerce methods; by a suitable choice of system carriers, and so on.It is no accident that the boom in electronic commerce has coincided with the trend towards increasing openness to the public on the part of the public service (the keywords being new public management and effect-oriented approach to administration). The reason for this openness is often that the public has lost confidence in its public service and is dissatisfied with the services provided. This article shows that electronic commerce also enables the public service to regain lost public confidence. 相似文献
13.
Efficient power-consumption-based load-sharing topology control protocol for harsh environments in wireless sensor networks 总被引:2,自引:0,他引:2
Energy conservation and network performance are critical issues in wireless sensor networks.The authors present a novel efficient communication topology control protocol, called quorum-based load-sharing control protocol (QLSCP). QLSCP is a quorum-based communication protocol, which chooses appropriate communication nodes, adjusts the service loads of critical nodes and performs adaptive sleep management. QLSCP is suitable for harsh environments without a central control server calculating the locations of sensors, using the factor of the remaining power to build the system topology. The proposed protocol divides the topology operation into topology formation, adjustment and execution phases. The topology formation phase builds the backbone of an enhanced tree. In the topology adjustment phase, the enhanced tree is adjusted by an optimal balance of critical nodes in the backbone. In the topology execution phase, the efficient surplus-energy consuming (ESC) mechanism is proposed to efficiently exhaust the energy of each node. The ESC mechanism is designed to efficiently exhaust the latest remaining electronic power of sensor nodes. Simulation results of QLSCP demonstrate that it efficiently achieves to prolong system lifetime in harsh environments. 相似文献
14.
The authors propose a new analytical model based on BCMP closed queueing networks in order to evaluate the performance of IEEE 802.11 DCF MAC protocol when all nodes are in the transmission range of each other, that is, a single hop wireless ad hoc network. By the proposed model, some performance metrics such as saturation and non-saturation throughput, distributions of channel access delay and the number of packets in the MAC buffer are derived. An extension of the proposed model is used for the analysis of IEEE 802.11e EDCA and the same performance metrics are evaluated for this protocol. Analytical results on IEEE 802.11e prove that differentiation in service is possible and channel share for each service type may be well assigned by tuning the MAC protocol parameters. Simulation results show consistency with our analytical results. 相似文献
15.
The IEEE 802.11e standard is specified to support quality-of-service in wireless local area networks, and different contention parameters are designated to each type of service. This developed model is presented to analyse the scheduling and the contention between packets with different priorities, where the new features of the enhanced distributed channel access such as virtual collision, backoff, minimum contention window and different arbitration inter-frame spaces are taken into account. Based on the model, the delay performance of differentiated service traffic is analysed and a recursive method is proposed, which is capable of calculating the mean access delay. Simulations show that the model and the analysis provide an insight into the protocol and the effects of different parameters on the performance. 相似文献
16.
With much more advanced techniques employed, various applications can be supported by 3G CDMA-based wireless networks. Providing differentiated service over wireless networks has become a very important issue in the design of wireless networks. A new media access control protocol with a hierarchical scheduling algorithm to provide differentiated service for CDMA-based wireless networks is proposed. This protocol evolves from the distributed queuing random access protocol for CDMA wireless network. The proposed protocol has been designed to have an ability to accommodate integrated traffic in the networks with effective scheduling schemes. A series of simulation experiments have been carried out to evaluate the performance of the proposed protocol with the hierarchical scheduling algorithm. The results reveal that the proposed solution performs effectively in the integrated traffic composed of messages with or without time constraints and achieves proportional fairness among different types of traffic. 相似文献
17.
入侵检测是对计算机网络和计算机系统的关键节点的信息进行收集和分祈。由于高速网络和交换式网络的普遍应用,以分布式拒绝服务攻击为代表的新型攻击方式的出现和发展,以及现有入侵检测系统效率低下、误报率和漏报率较高的问题无法得到有效解决等问题,目前入侵检测技术正处于发展的关键时期。协议分析是网络入侵检测技术中的一种关键技术,但不能解决对于包含在多个数据包中的攻击。针对这一问题,本文提出了基于状态协议分析的检测技术,构建一个有限自动机(Finite Automata,简称FA)来约束网络,并用由正则表达式产生的语言来描述一系列的正常的状态转化,充分利用协议的状态信息检测入侵。 相似文献
18.
With the development of communication technologies, various mobile devices
and different types of mobile services became available. The emergence of these services
has brought great convenience to our lives. The multi-server architecture authentication
protocols for mobile cloud computing were proposed to ensure the security and
availability between mobile devices and mobile services. However, most of the protocols
did not consider the case of hierarchical authentication. In the existing protocol, when a
mobile user once registered at the registration center, he/she can successfully authenticate
with all mobile service providers that are registered at the registration center, but real
application scenarios are not like this. For some specific scenarios, some mobile service
providers want to provide service only for particular users. For this reason, we propose a
new hierarchical multi-server authentication protocol for mobile cloud computing. The
proposed protocol ensures only particular types of users can successfully authenticate
with certain types of mobile service providers. The proposed protocol reduces computing
and communication costs by up to 42.6% and 54.2% compared to two superior protocols.
The proposed protocol can also resist the attacks known so far. 相似文献
19.
We investigate the dynamics of maps and flows which arise from a class of models of closed queueing networks in computer science theory. The network consists of n+/ servers, one of which is a central server with a queue of size n-1. A protocol or scheduling discipline must be specified in this server to define the queueing network. The standard model gives rise to a flow on an n-torus. We consider the service protocols first in-first out (FIFO) and last in-first out (LIFO) in dimension three, for which the state spaces are modifications of a 3-torus. We present a sufficient condition on the time it takes each call to complete one cycle for the FIFO protocol which guarantees that the set of periodic orbits which involve no waiting in the queue is a global attractorfor the associated semi-flow. We also investigate the dynamics for the LIFO service protocol via a return map derived from the associated area preserving flow. 相似文献