首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
本文首先阐述了标准及标准体系的概念,并结合我国电子发票的背景和发展历程,分析了我国电子发票的标准化需求,最后就电子发票标准体系建设及相关内容等进行了一般性分析探讨,旨在引起有关各方就相应问题展开更加深入的研究和交流,共同促进我国电子发票的规范化发展与应用。  相似文献   

2.
印章作为一种标记在我国已有很古老的历史。如今,随着网络和信息技术的发展,人们的工作方式和行为方式发生了极大的变化,在印章领域,信息化已经使得传统的手工印章向电子印章转变,特别是《中华人民共和国电子签名法》实施后,电子印章有望在网上报税、电子发票、网上结算、电子保单、证券交易、企业年检等方面代替传统印章。  相似文献   

3.
正上海东港,一直以来深耕于商业票据印刷行业。近几年来,随着政府公开招标工作常态化,市场竞争越发激烈;并且,随着票据电子化趋势的来临,企业面临越来越严峻的危险,企业升级转型迫在眉睫。从传统票据印刷转向电子发票平台东港清醒的意识到,虽然国内票据印刷的数量每年呈增长趋势,但增长幅度逐年减少,利润水平在逐年下降。2013年4月,《网络发票管理办法》正式实施,在政府层面给出了一个发票将要无纸化、信息化、电  相似文献   

4.
加入WTO给我国的教育发展带来了新的机遇与挑战。WTO总协议中的《服务贸易总协议》第5条是教育服务,凡是签署了教育服务贸易协定的国家,必须承诺开放教育市场,其内容有5项:初等教育服务、中等教育服务、高等教育服务、成人教育服务与其他教育服务,涉及到各类教育与培训活动。因此,加入WTO后,要在教育领域引入新的竞争机制,通过合理地引进国外优质的教育资源,大力发展高等职业教育的信息化和网络化建设,通过各种信息和资源的共享,推动我国高等职业教育改革的深化,使我国的高等职业教育走上一个新的台阶。一、加入WTO对高等职业教育的影…  相似文献   

5.
全国政协委员、苏宁控股集团董事长张近东在今年两会上提交多项提案,涉及电子发票、信息安全、母婴食品等多个领域。  相似文献   

6.
图书馆2.0作为一种新型的图书馆服务理念,是图书馆界在信息时代的一次自我适应与转型的尝试,图书馆2.0对于图书馆的服务从到提出了新的要求。公共图书馆的电子阅览室是公共图书馆的一个较为特殊的服务机构。互联网服务模式与信息技术的每一次变革都会对其产生直接的影响,对于电子阅览室馆员的素质都会产生新的要求。本文讨论的主要内容就是图书馆2.0的大环境下公共图书馆电子阅览室馆员应当具备的素质。  相似文献   

7.
《国际防伪》2006,(1):39-39
利比里亚财政部发布政府特别通告,从2006年1月30日起,利财政部与中央银行启用新的银行缴款通知单(BPS,Bank Payment S1ip)和印有利国旗的发票(Flag Receipt)。新的银行缴款通知单与发票都将由电脑打印完成。发票上还印有防伪码。1月30日前开具的旧版发票仍然有效。  相似文献   

8.
针对现有电子现金系统的不足,提出了一类基于椭圆曲线密码的离线电子现金方案.方案中自动更新的现金数据库可以删除过期的电子现金,避免了银行现金数据库可能无限增大的问题;在通信会话协议中,同时实现了签名、认证、加密传输和数据恢复,签名与认证的协议过程同时也是加密通信的过程,减化了常规的密码协议过程.与已有的方案相比,方案中协议与算法简洁、高效,在安全强度不变的条件下,降低了软硬件实现的系统开销,可广泛应用于电子商务等网络业务环境。  相似文献   

9.
胡娅 《流程工业》2013,(12):61-62
WAGO作为弹簧压接电气连接技术和电子接口模块领域的开创者,于1995年推出了第一个适用于各类现场总线协议的模块化总线系统。如今,创新性和多样性成为越发重要的标准。紧凑型设计和最高质量标准的统一使WAGO-I/O-SYSTEM成为世界范围内最为成功的现场总线系统之一。万可电子(天津)有限公司是德国WAGO在中国的独资子公司,该公司在中国15年的发展过程中,取得了非常好的成就,产品和服务广泛被业界认可。在Achem Asia展会上,本刊记者就万可在此次展会推出的核心产品及万可在中国的发展等问题,采访了万可电子(天津)有限公司总经理彭夫柯(Volker Palm)先生及I/O技术支持部陈浩先生。  相似文献   

10.
《中国防伪报道》2009,(11):41-42
近年来,发票犯罪已经成为一个具有普遍性的犯罪问题,公安机关对此类案件加大打击力度,不断打击、整治、破获多起发票犯罪案件。  相似文献   

11.
谢文彬  李新芳  郑新 《包装工程》2018,39(1):202-206
目的为保证含有号码印刷错误的票据不流入社会,研究一种新的用于票据印刷在线检测系统的号码识别方案。方法提出一种基于结构特征的票据号码识别方法。先对票据图像进行采集、灰度化、二值化、去噪、倾斜校正、字符定位、单字符分割及归一化等一系列预处理。建立一种基于结构特征的号码识别分类器,再根据票据中每个号码的结构特征值,对号码进行分类识别。结果实验结果表明,利用文中提出的结构特征方法,票据号码识别率达到99%以上。结论经过对大量实际发票号码的识别测试实验,该方法有较强的抗干扰性,识别算法速度快、精度高。  相似文献   

12.
The article describes why trust is the core element for the success of electronic commerce or electronic government in the field of intellectual property. The introduction of electronic commerce in intellectual property marks a radical break with traditional methods of communication. Such a radical change can only be successful if all the users (i.e. offices, intermediaries, applicants and interested third parties) have confidence in the new system. There are various ways of inspiring confidence: by consultation over the design of the new system; by creation of a secure legal framework; by mechanisms to eliminate any errors; by an understanding of the new processes; by freedom to choose, for example not to use electronic commerce methods; by a suitable choice of system carriers, and so on.It is no accident that the boom in electronic commerce has coincided with the trend towards increasing openness to the public on the part of the public service (the keywords being new public management and effect-oriented approach to administration). The reason for this openness is often that the public has lost confidence in its public service and is dissatisfied with the services provided. This article shows that electronic commerce also enables the public service to regain lost public confidence.  相似文献   

13.
Energy conservation and network performance are critical issues in wireless sensor networks.The authors present a novel efficient communication topology control protocol, called quorum-based load-sharing control protocol (QLSCP). QLSCP is a quorum-based communication protocol, which chooses appropriate communication nodes, adjusts the service loads of critical nodes and performs adaptive sleep management. QLSCP is suitable for harsh environments without a central control server calculating the locations of sensors, using the factor of the remaining power to build the system topology. The proposed protocol divides the topology operation into topology formation, adjustment and execution phases. The topology formation phase builds the backbone of an enhanced tree. In the topology adjustment phase, the enhanced tree is adjusted by an optimal balance of critical nodes in the backbone. In the topology execution phase, the efficient surplus-energy consuming (ESC) mechanism is proposed to efficiently exhaust the energy of each node. The ESC mechanism is designed to efficiently exhaust the latest remaining electronic power of sensor nodes. Simulation results of QLSCP demonstrate that it efficiently achieves to prolong system lifetime in harsh environments.  相似文献   

14.
The authors propose a new analytical model based on BCMP closed queueing networks in order to evaluate the performance of IEEE 802.11 DCF MAC protocol when all nodes are in the transmission range of each other, that is, a single hop wireless ad hoc network. By the proposed model, some performance metrics such as saturation and non-saturation throughput, distributions of channel access delay and the number of packets in the MAC buffer are derived. An extension of the proposed model is used for the analysis of IEEE 802.11e EDCA and the same performance metrics are evaluated for this protocol. Analytical results on IEEE 802.11e prove that differentiation in service is possible and channel share for each service type may be well assigned by tuning the MAC protocol parameters. Simulation results show consistency with our analytical results.  相似文献   

15.
The IEEE 802.11e standard is specified to support quality-of-service in wireless local area networks, and different contention parameters are designated to each type of service. This developed model is presented to analyse the scheduling and the contention between packets with different priorities, where the new features of the enhanced distributed channel access such as virtual collision, backoff, minimum contention window and different arbitration inter-frame spaces are taken into account. Based on the model, the delay performance of differentiated service traffic is analysed and a recursive method is proposed, which is capable of calculating the mean access delay. Simulations show that the model and the analysis provide an insight into the protocol and the effects of different parameters on the performance.  相似文献   

16.
Ma  M. Zhu  Q. 《Communications, IET》2008,2(1):131-136
With much more advanced techniques employed, various applications can be supported by 3G CDMA-based wireless networks. Providing differentiated service over wireless networks has become a very important issue in the design of wireless networks. A new media access control protocol with a hierarchical scheduling algorithm to provide differentiated service for CDMA-based wireless networks is proposed. This protocol evolves from the distributed queuing random access protocol for CDMA wireless network. The proposed protocol has been designed to have an ability to accommodate integrated traffic in the networks with effective scheduling schemes. A series of simulation experiments have been carried out to evaluate the performance of the proposed protocol with the hierarchical scheduling algorithm. The results reveal that the proposed solution performs effectively in the integrated traffic composed of messages with or without time constraints and achieves proportional fairness among different types of traffic.  相似文献   

17.
付蕾 《中国科技博览》2009,(36):342-342
入侵检测是对计算机网络和计算机系统的关键节点的信息进行收集和分祈。由于高速网络和交换式网络的普遍应用,以分布式拒绝服务攻击为代表的新型攻击方式的出现和发展,以及现有入侵检测系统效率低下、误报率和漏报率较高的问题无法得到有效解决等问题,目前入侵检测技术正处于发展的关键时期。协议分析是网络入侵检测技术中的一种关键技术,但不能解决对于包含在多个数据包中的攻击。针对这一问题,本文提出了基于状态协议分析的检测技术,构建一个有限自动机(Finite Automata,简称FA)来约束网络,并用由正则表达式产生的语言来描述一系列的正常的状态转化,充分利用协议的状态信息检测入侵。  相似文献   

18.
With the development of communication technologies, various mobile devices and different types of mobile services became available. The emergence of these services has brought great convenience to our lives. The multi-server architecture authentication protocols for mobile cloud computing were proposed to ensure the security and availability between mobile devices and mobile services. However, most of the protocols did not consider the case of hierarchical authentication. In the existing protocol, when a mobile user once registered at the registration center, he/she can successfully authenticate with all mobile service providers that are registered at the registration center, but real application scenarios are not like this. For some specific scenarios, some mobile service providers want to provide service only for particular users. For this reason, we propose a new hierarchical multi-server authentication protocol for mobile cloud computing. The proposed protocol ensures only particular types of users can successfully authenticate with certain types of mobile service providers. The proposed protocol reduces computing and communication costs by up to 42.6% and 54.2% compared to two superior protocols. The proposed protocol can also resist the attacks known so far.  相似文献   

19.
We investigate the dynamics of maps and flows which arise from a class of models of closed queueing networks in computer science theory. The network consists of n+/ servers, one of which is a central server with a queue of size n-1. A protocol or scheduling discipline must be specified in this server to define the queueing network. The standard model gives rise to a flow on an n-torus. We consider the service protocols first in-first out (FIFO) and last in-first out (LIFO) in dimension three, for which the state spaces are modifications of a 3-torus. We present a sufficient condition on the time it takes each call to complete one cycle for the FIFO protocol which guarantees that the set of periodic orbits which involve no waiting in the queue is a global attractorfor the associated semi-flow. We also investigate the dynamics for the LIFO service protocol via a return map derived from the associated area preserving flow.  相似文献   

20.
在分组间插的OTDM局域网中,光分组的发送和接收不仅受限于电子处理速度的限制,而且受限于光分组压缩解压缩器的结构。本文提出了使用分组重排和光时分解复用器构建并行解压缩器来缓解该受限问题的方案。同时,通过对传统的周期预留多址接入CRMA(Cycle Reservation Multiple Access)协议进行进一步扩展,得到了在受限条件下既能避免将数据分组简单丢弃、又能获取很高网络性能可行的高速网络接入控制协议。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号