期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
基于Domino的OA系统应用与邮件应用分离实践
1
作者 黄揣明 覃健飞 《沿海企业与科技》 2017年第5期33-36,40,共5页
随着社会信息化程度的不断深入,广西电网公司OA办公业务迅猛发展,OA系统模块逐渐增多,系统运行压力也随之增大。为保证办公应用不受影响,因此需要将OA系统中系统应用与邮件应用进行分离,使系统压力能得到有效分流。根据这一迫切的需求,... 随着社会信息化程度的不断深入,广西电网公司OA办公业务迅猛发展,OA系统模块逐渐增多,系统运行压力也随之增大。为保证办公应用不受影响,因此需要将OA系统中系统应用与邮件应用进行分离,使系统压力能得到有效分流。根据这一迫切的需求,实现Domino OA系统应用和邮件应用的分离,文章从建设实践与应用出发,详细介绍了Domino OA系统应用和邮件应用分离的建设目标、思路、设计及未来的发展,以此来引导员工工作方向,保障企业工作秩序,最终提高企业的核心竞争力。 展开更多
关键词 DOMINO OA 系统 系统应用 邮件应用 分离
下载PDF
邮件合并在中职学生管理工作中的应用 被引量:1
2
作者 张远萍 《科技信息》 2011年第30期243-244,共2页
根据邮件合并的应用领域,介绍了邮件合并在中职学校学生管理工作中的具体应用,利用邮件合并功能,使中职学生信息资料管理工作简单化、科学化、系统化。
关键词 MICROSOFT WORD 邮件合并应用 中职 学生管理
下载PDF
电子邮箱的“囚徒困境”
3
作者 李义强 《新乡师范高等专科学校学报》 2007年第2期138-140,共3页
运用博弈论中的“囚徒困境”模型,对电子邮箱的收费与免费进行了分析与讨论,得出了几点收费邮箱网站面对“囚徒困境”的启示。
关键词 电子邮箱 商业价值置换 囚徒困境 应用邮件
下载PDF
ESTIMATION METHOD OF AIRSPACE CONNECTIVITY PROBABILITY IN MILITARY AANET 被引量:2
4
作者 Luo Changyuan Song Yulong Pang Songchao 《Journal of Electronics(China)》 2013年第6期538-546,共9页
Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation meth... Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation method of connectivity probability is proposed.The method takes airspace as the research object,starts with actual flight characteristics,and applies conclusions of random waypoint mobility model.Building a connectivity model by establishing Airspace Unit Circle(AUC) from the perspective of circle-circle coverage,the method obtains a theory of airspace network connectivity.Experiment demonstrates its correctness.Finally,according to the actual condition simulation,relationship between the number of aircraft,communication radius,and the flight area under connectivity probabilities is achieved,results provide reference for creating a network that under certain aerial combat condition. 展开更多
关键词 Aeronautical ad hoc network (AANET) Military aviation Mobility model Con-nectivity Airspace Unit Circle (AUC)
下载PDF
AN ADAPTIVE-WEIGHTED TWO-DIMENSIONAL DATA AGGREGATION ALGORITHM FOR CLUSTERED WIRELESS SENSOR NETWORKS
5
作者 Zhang Junhu Zhu Xiujuan Peng Hui 《Journal of Electronics(China)》 2013年第6期525-537,共13页
In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving t... In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network. 展开更多
关键词 Data aggregation Adaptive-weighted aggregation Clustered Wireless Sensor Networks(WSNs) Linear regression Data accuracy Energy consumption Lempel-Ziv-Welch (LZW)
下载PDF
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
6
作者 Yang Lijun Wu Meng Ding Chao 《Journal of Electronics(China)》 2013年第6期574-586,共13页
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso... To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks. 展开更多
关键词 Large scale Wireless Sensor Networks (WSNs) Network security Key agreement Iden-tity-based cryptography
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部