Design and Implementation of Fire Multi-Level Menu for Office Automation Platform Based on Communication Technology

2015 ◽  
Vol 733 ◽  
pp. 825-829
Author(s):  
Bin Ni

With the social development and progress, fire institutions, including colleges and universities, including office automation platform, which the functions needed to support the business more and more, need to use multilevel menu for management platform. In addition, with the rapid development of mobile Internet technology, people access to office automation platform approach is also increasingly diverse, due to the hardware and software configuration of various access devices larger difference, which requires multi-level menu office automation platform consumes fewer resources simple operation, good scalability. Now, we use the idea of finite state machines to achieve a small footprint, scalability, simple switching office automation platform colleges Fire multi-level menu management system.

2014 ◽  
Vol 556-562 ◽  
pp. 6119-6122 ◽  
Author(s):  
Qian Zhang ◽  
Qing Qing Zhang ◽  
Yun Ze Wang

OA (Office Automation, OA) has been developed rapidly in the 1970s and introduced into China. In the 1990s, it has entered the high-speed development stage. With the rapid development of mobile internet technology, it will be a trend to apply such a high-tech to office automation. Meantime, there has introduced the workflow development approach to development in the overall system implementation. This thesis presents strategy on design and implementation on workflow based mobile office automation. With the rapid development of mobile internet technology, it will be a trend to apply such a high-tech to office automation. Meantime, there has introduced the workflow development approach to development in the overall system implementation. This thesis presents strategy on design and implementation on workflow based on mobile office automation.


2020 ◽  
Vol 12 (16) ◽  
pp. 6333
Author(s):  
Chan Liu ◽  
Raymond K. H. Chan ◽  
Maofu Wang ◽  
Zhe Yang

Harnessing the rapid development of mobile internet technology, the sharing economy has experienced unprecedented growth in the global economy, especially in China. Likely due to its increasing popularity, more and more businesses have adopted this label in China. There is a concern as to the essential meaning of the sharing economy. As it is difficult to have a universally accepted definition, we aim to map the sharing economy and demystify the use of it in China in this paper. We propose seven organizing essential elements of the sharing economy: access use rights instead of ownership, idle capacity, short term, peer-to-peer, Internet platforms mediated, for monetary profit, and shared value orientation. By satisfying all or only parts of these elements, we propose one typology of sharing economy, and to differentiate bona fide sharing economy from quasi- and pseudo-sharing economy. Finally, there are still many problems that need to be solved urgently in the real sharing economy from the perspective of the government, companies and individuals.


2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Qiang Yan ◽  
Lianren Wu ◽  
Lanli Yi

Through analyzing the data about the releases, comment, and forwarding of 120,000 microblog messages in a year, this paper finds out that the intervals between information releases and comment follow a power law; besides, the analysis of data in each 24 hours reveals obvious differences between microblogging and website visit, email, instant communication, and the use of mobile phone, reflecting how people use fragments of time via mobile internet technology. The paper points out the significant influence of the user's activity on the intervals of information releases and thus demonstrates a positive correlation between the activity and the power exponent. The paper also points out that user's activity is influenced by social identity in a positive way. The simulation results based on the social identity mechanism fit well with the actual data, which indicates that this mechanism is a reasonable way to explain people's behavior in the mobile Internet.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-13 ◽  
Author(s):  
Yanni Liu ◽  
Dongsheng Liu ◽  
Yuwei Chen

With the rapid development of mobile Internet, the social network has become an important platform for users to receive, release, and disseminate information. In order to get more valuable information and implement effective supervision on public opinions, it is necessary to study the public opinions, sentiment tendency, and the evolution of the hot events in social networks of a smart city. In view of social networks’ characteristics such as short text, rich topics, diverse sentiments, and timeliness, this paper conducts text modeling with words co-occurrence based on the topic model. Besides, the sentiment computing and the time factor are incorporated to construct the dynamic topic-sentiment mixture model (TSTS). Then, four hot events were randomly selected from the microblog as datasets to evaluate the TSTS model in terms of topic feature extraction, sentiment analysis, and time change. The results show that the TSTS model is better than the traditional models in topic extraction and sentiment analysis. Meanwhile, by fitting the time curve of hot events, the change rules of comments in the social network is obtained.


2018 ◽  
Vol 173 ◽  
pp. 02029
Author(s):  
XU Jiahui ◽  
YU Hongyuan ◽  
WANG Gang ◽  
WANG Zi ◽  
BAI Jingjie ◽  
...  

The rapid development of mobile Internet technology and the wide spread of smart terminals have brought opportunities for the transformation of power grid business model. Compared to the non-real-time information, the real-time and running data of dispatch and control domain is easy to be intercepted and cracked. To solve this problem, this paper presents a new approach to mobile application security framework for the power grid control field. It is to realize secondary encryption by using the method of MD5+AES mixed encryption algorithm and combining the time stamp in real-time data transmission process. At the same time it is to prevent cross-border operations and brute force by using Token authentication and Session technology. China EPRI safety test results show that the application of the framework significantly improves the integrity, safety and reliability of real-time data in power grid control.


Author(s):  
Lin Jin ◽  
◽  
Changhong Yan

With the rapid development of mobile internet and smart city, video surveillance is popular in areas such as transportation, schools, homes, and shopping malls. It is important subject to manage the massive videos quickly and accurately. This paper tries to use Hadoop cloud platform for massive video data storage, transcoding and retrieval. The key technologies of cloud computing and Hadoop are introduced firstly in the paper. Then, we analyze the functions of video management platform, such as user management, videos storage, videos transcoding, and videos retrieval. According to the basic functions and cloud computing, each module design process and figure are provided in the paper. The massive videos management system based on cloud platform will be better than the traditional videos management system in the aspects of storage capacity, transcoding performance and retrieval speed.


2013 ◽  
Vol 336-338 ◽  
pp. 2099-2102
Author(s):  
Hui Xin Ning

With the Rapid Development of Mobile Internet Technology, People Hope Access to Internet to get Information and Service Anywhere and Anytime Urgently. Catering Industry also Hopes to Expand the Scope of Business to Network. in this Paper, through the Requirement Analysis, Using the Currently Popular Android System as the Platform, the Authors Study the Mobile Ordering System Based on Android with the Help of Mobile Internet Technology. the System was Considered the Relationship between the Customers and the Sellers, had Established a Perfect Management Mode and Comprehensive Ordering Function, and Realized the Characteristic Function Based on Google Service. the System is Low Cost, Simple Operation, and Mobility. it Solves the Catering Industry’s Problems of High Cost on Manpower and Inconvenient Online Ordering.


With the rapid development of mobile Internet technology, mobile network data traffic presents an explosive growth trend. Especially, the proportion of mobile video business has become a large proportion in mobile Internet business. Mobile video business is considered as a typical business in the 5G network, such as in online education. The growth of video traffic poses a great challenge to mobile network. In order to provide users with better quality of experience (QoE), it requires mobile network to provide higher data transmission rate and lower network delay. This paper adopts a combined optimization to minimize total cost and maximize QoE simultaneously. The optimization problem is solved by ant colony algorithm. The effectiveness is verified on experiment.


2014 ◽  
Vol 543-547 ◽  
pp. 3441-3444
Author(s):  
Ying Li Wang ◽  
Zhi Jiang Xu ◽  
Si Si Li

The rapid development of 3 g mobile internet technology and the extensive use of intelligent mobile phone system make a user access the Internet not only can through a computer which has networking conditions, but also can through the mobile phone whenever and wherever. This paper designed and developed the method of accessing to the Web server based on the Android platform, it provides a quick and convenient way for the developers.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Gang Lei ◽  
Lejun Ji ◽  
Ruiwen Ji ◽  
Yuanlong Cao ◽  
Wei Yang ◽  
...  

With the rapid development of mobile Internet technology and multihost terminal devices, multipath transmission protocol has been widely concerned. Among them, multipath TCP (MPTCP) has become a hot research protocol in recent years because of its good transmission performance and Internet compatibility. Due to the increasing power of Low-Rate Distributed Denial of Service (LDDoS) attack, the network security situation is becoming increasingly serious. The robustness of MPTCP network has become an urgent performance index to improve. Therefore, it is very necessary to detect LDDoS abnormal traffic timely and effectively in the transmission system based on MPTCP. This paper tries to use wavelet transform technology to decompose and reconstruct network traffic and find a detection method of LDDoS abnormal traffic in the MPTCP transmission system. The experimental results show that in the MPTCP transmission system, the signal processing technology based on wavelet transform can realize the identification of LDDoS abnormal traffic. It indicates a direction worth further exploration for the detection and defense of the LDDoS attack.


Sign in / Sign up

Export Citation Format

Share Document