期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
感受网通信息化建设
1
作者 阿宇 《中国电子商务》 2003年第5期54-55,共2页
一些跨国公司在总部或许只有一座小型的办公楼.里面也许只有上百人的管理队伍.而其余绝大多数员工都在散布于世界各地的第一线生产着产品——是什么使得这些庞大的全球公司运作得井然有序呢?对这个问题.不同的人可能给出不同的答案... 一些跨国公司在总部或许只有一座小型的办公楼.里面也许只有上百人的管理队伍.而其余绝大多数员工都在散布于世界各地的第一线生产着产品——是什么使得这些庞大的全球公司运作得井然有序呢?对这个问题.不同的人可能给出不同的答案。中国网通管理信息系统(MIS)的建设者认为,其原因可归结为一点.即是对工作流程有效的管理。 展开更多
关键词 网通信息化建设 工作流程 企业管理 MIS系统 网络环境
下载PDF
应用计算机管理新生儿疾病筛查信息的探讨 被引量:1
2
作者 赵艳 华丽 +2 位作者 张莉 黄宏 武杰 《中国妇幼保健》 CAS 北大核心 2007年第36期5094-5095,共2页
目的:探讨应用微机管理和网通热线咨询系统,实施新生儿疾病筛查技术服务和网络信息管理的可行性。方法:应用微机输入沈阳市新生儿疾病筛查工作中各项数据,与网通形成一套适合新生儿疾病筛查工作发展需要的信息管理平台。在全市89处助产... 目的:探讨应用微机管理和网通热线咨询系统,实施新生儿疾病筛查技术服务和网络信息管理的可行性。方法:应用微机输入沈阳市新生儿疾病筛查工作中各项数据,与网通形成一套适合新生儿疾病筛查工作发展需要的信息管理平台。在全市89处助产医院递送标本管理基础上开发和应用网通自动语音查询系统,为新生儿疾病筛查提供服务和信息管理。结果:市新生儿疾病筛查中心对收集标本进行连续性编号,完成实验检测后将筛查结果输入微机管理系统,通过微机传入网通自动语音查询系统。结论:应用微机与网通管理系统对新生儿疾病筛查信息进行共享,具有兼容性、开放性、科学性、易操作性的特点,同时确保新生儿疾病筛查的执法性和严肃性,为新生儿筛查网络提供了高效、准确、简单的查询信息服务,提高了筛查信息的管理水平。 展开更多
关键词 新生儿疾病筛查 微机管理 网通信息
下载PDF
桐庐网通坚持用“四个轮子”闯市场
3
作者 傅宏波 《观察与思考》 2007年第4期126-127,共2页
地点:桐庐玉华中学事件:在窗明几净的教室里,学生正在“享受”多媒体教学系统。关键人物:学校梅书记。梅书记从事教育工作已经33年了。他在桐庐教育系统很有名,出名的不仅仅因为他是一名老教育工作者,而是他在教育技术的信息化投入方面... 地点:桐庐玉华中学事件:在窗明几净的教室里,学生正在“享受”多媒体教学系统。关键人物:学校梅书记。梅书记从事教育工作已经33年了。他在桐庐教育系统很有名,出名的不仅仅因为他是一名老教育工作者,而是他在教育技术的信息化投入方面特别“较真”。他说“教育信息化,设备条件十分重要,而且还要有一支熟悉和掌握运用现代教育技术的教师队伍。目前学校已经被校园网络、闭路电视、广播系统、多媒体等‘武装’起来。而提供技术支持的就是桐庐网通。” 展开更多
关键词 现代教育技术 多媒体教学系统 教育工作者 市场 信息化投入 桐庐网通信息港有限公司
下载PDF
网网相连 打造信息新通道──DHCP+L2TP技术在杭州网中的应用
4
《计算机》 2002年第3期10-10,共1页
关键词 杭州市 网通信息 DHCP+L2TP技术 5类线 以太网接入技术 宽带接入服务器 PPPoE技术
下载PDF
修军:我是新重庆人
5
《中国青年科技》 2004年第12期33-33,共1页
修军简历:1981-1986,清华大学,电气工程学士;1986-1989,清华大学,管理工程硕士;1989-1996,国家能源投资公司及国家开发银行,参与了世界银行、亚洲开发银行以及国家政策性银行的专项资金管理,负责评审大型项目的技术方案及投资预算等:199... 修军简历:1981-1986,清华大学,电气工程学士;1986-1989,清华大学,管理工程硕士;1989-1996,国家能源投资公司及国家开发银行,参与了世界银行、亚洲开发银行以及国家政策性银行的专项资金管理,负责评审大型项目的技术方案及投资预算等:1996年,出国深造,接受美国杜兰大学和清华大学的联合培养,在美国杜兰大学获工商管理硕士,2003年获清华大学管理科学博士。 展开更多
关键词 重庆网通信息港宽带网络有限公司 企业领导 修军 企业经营
下载PDF
应用 合作 举措
6
《信息系统工程》 2001年第11期19-20,共2页
关键词 思科公司 网通信息 联想集团 服务器 方正电脑公司 神州数码公司
下载PDF
Research and improvement on packet capture mechanism in linux for high-speed network 被引量:2
7
作者 杨武 方滨兴 +1 位作者 云晓春 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期494-498,共5页
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu... With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network. 展开更多
关键词 high-speed network packet capture TCP/IP protocol stack performance bottleneck LKM
下载PDF
Research on E-mail Communication Network Evolution Model Based on User Information Propagation 被引量:1
8
作者 ZHANG Lejun GUO Lin XU Li 《China Communications》 SCIE CSCD 2015年第7期108-118,共11页
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ... E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication. 展开更多
关键词 E-MAIL social network analysis network evolution information propagation
下载PDF
A Learning-Based Channel Model for Synergetic Transmission Technology 被引量:4
9
作者 Liang Chen Li Haihan +2 位作者 Li Yunzhou Zhou Shidong Wang Jing 《China Communications》 SCIE CSCD 2015年第9期83-92,共10页
It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a signific... It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily. 展开更多
关键词 channel model CSI synergetic transmission spectral efficiency learning-based channel measurement
下载PDF
The Innovation and Development of Internet of Vehicles 被引量:9
10
作者 Weiwei Zhang Xiaoqiang Xi 《China Communications》 SCIE CSCD 2016年第5期122-127,共6页
With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and inf... With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and infrastructures, thus, the development of IOV will greatly improve vehicles safety, promote green information consumption and have a profound impact on many industries. The purpose of this paper is to promote the innovation and development of IOV. Firstly, this paper presents general requirements of IOV such as guidelines, basic principles, and the goal of development. Secondly, we analyze critical applications, crucial support, and business model to promote the industrial development of IOV. Finally, this paper proposes some safeguard measures to further promote the development of IOV. 展开更多
关键词 internet of vehicles wireless communication vehicle platform
下载PDF
FUZZY PRINCIPAL COMPONENT ANALYSIS AND ITS KERNEL-BASED MODEL 被引量:4
11
作者 Wu Xiaohong Zhou Jianjiang 《Journal of Electronics(China)》 2007年第6期772-775,共4页
Principal Component Analysis(PCA)is one of the most important feature extraction methods,and Kernel Principal Component Analysis(KPCA)is a nonlinear extension of PCA based on kernel methods.In real world,each input da... Principal Component Analysis(PCA)is one of the most important feature extraction methods,and Kernel Principal Component Analysis(KPCA)is a nonlinear extension of PCA based on kernel methods.In real world,each input data may not be fully assigned to one class and it may partially belong to other classes.Based on the theory of fuzzy sets,this paper presents Fuzzy Principal Component Analysis(FPCA)and its nonlinear extension model,i.e.,Kernel-based Fuzzy Principal Component Analysis(KFPCA).The experimental results indicate that the proposed algorithms have good performances. 展开更多
关键词 Principal Component Analysis (PCA) Kernel methods Fuzzy PCA (FPCA) Kernel PCA (KPCA)
下载PDF
Development of underground mine monitoring and communication system integrated ZigBee and GIS 被引量:12
12
作者 Moridi Mohammad Ali Kawamura Youhei +4 位作者 Sharifzadeh Mostafa Chanda Emmanuel Knox Wagner Markus Jang Hyongdoo Okawa Hirokazu 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2015年第5期811-818,共8页
An automated underground mine monitoring and communication system based on the integration of new technologies is introduced to promote safety and health,operational management and cost-effectiveness.The proposed syst... An automated underground mine monitoring and communication system based on the integration of new technologies is introduced to promote safety and health,operational management and cost-effectiveness.The proposed system integration considering Wireless Sensor Network(WSN) assisted Geographic Information System(GIS) enables to monitor and control underground mining applications from surface office.Based on the capabilities of WSNs,ZigBee network is adapted for near real-time monitoring,ventilation system control and emergency communication in underground mine.ZigBee nodes were developed to sense environmental attributes such as temperature,humidity and gases concentration;switching ON and OFF ventilation fans;and texting emergency messages.A trigger action plan for monitored attributes above normal and threshold value limits is programmed in the surface GIS management server.It is designed to turn the auxiliary fans on remotely or automatically in orange condition and sending evacuation messages for underground miners in unsafe(red) condition.Multi-users operation and 3D visualisations are other successful achievements of the proposed system for the underground monitoring and communication. 展开更多
关键词 Wireless sensor networks ZIGBEE Underground mine safety Ventilation Mine monitoring
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
13
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
Application of GML and SVG in the development of WebGIS 被引量:3
14
作者 XI Yan-tao WU Jiang-guo 《Journal of China University of Mining and Technology》 EI 2008年第1期140-143,共4页
Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (... Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (GML), Scalable Vector Graphics (SVG) and Web Feature Service (WFS) Implementation Specifications developed by the OpenGIS Consortium (OGC), a strategy of WebGIS is proposed. The GML is used as a coding and data transportation mechanism to realize interoperability, the SVG to display GML data on the Web and the WFS as a data query mechanism to access and retrieve data at the feature level in real time on the Web. A case study shows that the combination mentioned above has enormous potential to achieve interoperability while not requiring considerable changes to existing legacy data. Original data formats need not be changed and could still be retrieved using WFS and transformed into GML in real time. SVG can oroduce suoerior ouality vector maps on a Web browser. 展开更多
关键词 GML SVG WFS INTEROPERABILITY WEBGIS
下载PDF
Internet Plus and Networks Convergence 被引量:6
15
作者 ZENG Jianqiu YANG Mengke 《China Communications》 SCIE CSCD 2015年第4期42-49,共8页
This paper discusses the relationship between Internet plus and networks convergence and highlights the development of ICT industry and the process of networks convergence. Based on lnternet plus and the theory of net... This paper discusses the relationship between Internet plus and networks convergence and highlights the development of ICT industry and the process of networks convergence. Based on lnternet plus and the theory of networks convergence, this paper suggests to implement Internet plus action plan as a strategy to accelerate the construction of networks and application of Internet, promote the traditional industry reform with ICT, increase competitive efficiency, standardize the market competition, and then realize the Internet plus strategy and networks convergence. 展开更多
关键词 Internet plus triple play networksconvergence
下载PDF
Fundamentals of Visualizing Communication Networks
16
作者 Jürgen Pfeffer 《China Communications》 SCIE CSCD 2013年第3期82-90,共9页
The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high ... The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high bandwidth in a parallel fashion, producing a picture worth more than a thousand words. Effective information visualization can be a powerful tool to capture people's attention and quickly communicate large amounts of data and complex information. This is particularly important in the context of communication data, which often describes entities (people, organizations) and their connections through communication. Visual analytics approaches can optimize the user-computer interaction to gain insights into communication networks and learn about their structures. Network visualization is a perfect instrument to better communicate the results of analysis. The precondition for effective information visualization and successful visual reasoning is the capability to draw "good" pictures. Even though communication networks are often large, including thousands or even millions of people, underlying visualization principles are identical to those used for visualizing smaller networks. In this article, you will learn about these principles, giving you the ability to assess the quality of network visualizations and to draw better network pictures by yourself. 展开更多
关键词 communication networks information visualization human perception
下载PDF
Influence of EDFA's Characteristics on Performance of All Optical Network
17
作者 WANGTian-zhu YUCong-xiu 《Semiconductor Photonics and Technology》 CAS 2002年第2期70-74,79,共6页
The characteristic of EDFA in WDM system is analyzed. The simulation system based on the architecture of the China Information Network (CAINONET) is introduced, and the influence of noise figure, gain unflatness and o... The characteristic of EDFA in WDM system is analyzed. The simulation system based on the architecture of the China Information Network (CAINONET) is introduced, and the influence of noise figure, gain unflatness and output power of EDFA on the BER performance and scale of network is investigated. Moreover, the influence of noise figure is studied with different crosstalk . Meanwhile, it is indicated that it is important to apply the "node isolation principle" in the optical network. The research results can provide the valuable reference for the practical construction of all optical network . 展开更多
关键词 EDFA WDM Optical add/drop multiplexer Optical cross-connection China information network
下载PDF
Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks 被引量:1
18
作者 LI Hongning PEI Qingqi MA Lichuan 《China Communications》 SCIE CSCD 2014年第3期125-136,共12页
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha... For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks. 展开更多
关键词 HANDOFF tracking user attack attack tree
下载PDF
Intelligent Resources Management System Design in Information Centric Networking 被引量:2
19
作者 Hengyang Zhang Shixiang Zhu +2 位作者 Renchao Xie Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2017年第8期105-123,共19页
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and... Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity. 展开更多
关键词 information centric networking traffi c estimation cache resources allocation time series analysis intelligent analysis
下载PDF
IOT technology application model research of transportation industry in China 被引量:3
20
作者 Lai Mingyong Zhou Tang Liu Zhengchi 《Engineering Sciences》 EI 2013年第3期90-96,共7页
The paper studied the connection between internet of things (lOT) technology and transportation industry. Meanwhile, the definition of IOT in transportation was given. Concerning that many problems occurred during t... The paper studied the connection between internet of things (lOT) technology and transportation industry. Meanwhile, the definition of IOT in transportation was given. Concerning that many problems occurred during the process of traditional intelligent transportation system, the paper proposed a promising model of lOT in transportation. The advantage of the information utilization model from information to function was confirmed through comparative study. Finally, the model presented that a real interconnection of transportation would be achieved based on the unified information collection. It can greatly save cost on technology transfer, exploit potential value of information, and promote the emergence of a sustainable information service market and the industrial upgrade. 展开更多
关键词 IOT intelligent transportation system sensor network IOT in transportation application model
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部