期刊文献+

基于用户需求的高校档案在线服务平台的设计与实现 被引量:5

Design and Implementation of University Archives Online Service Platform Based on the Demands of Users
下载PDF
导出
摘要 随着大数据时代的到来,用户对便捷办理档案业务和快速获取档案信息的渴望越来越强烈,传统档案服务模式已经与现代化社会不相适应。文章在分析用户需求、档案业务类型、业务流程、功能需求的基础上,以用户需求为中心,运用工作流技术、电子商务技术、物流技术等,设计并构建了高校档案在线服务平台;实现了所有类型档案业务在线办理,提升了业务处理效率,规范了档案业务,方便了数据统计与分析,真正提升了档案远程服务能力。 With the arrival of big data era, people have more and more intense desire for the quick access to archival inlbrma- tion and the convenient operation for archival business, while traditional service mode of archives can' t meet the demands of modem society. Based on the analysis of users' demands, archives business types, business process and functional demands, the university archives online service platform was designed and built by focusing on the demands of users and applying workflow technology, electronic commerce technology and logistics technology, to implement the online operation for all types of archives business, which improved the efficiency of business pro- cessing and regulated archival business, as well as made data statistics and analysis convenient and improved the remote service ability of archives service.
作者 向禹 吴湘华
出处 《农业图书情报学刊》 2015年第8期5-11,共7页 Journal of Library and Information Sciences in Agriculture
基金 湖南省档案局科技计划项目"数字档案馆公共服务平台研究"(项目编号:2014-H-09)
关键词 数字档案馆 公共服务 在线服务 系统实现 系统设计 Digital archives Public service Online service System implementation System design
  • 相关文献

参考文献9

二级参考文献32

共引文献116

同被引文献27

  • 1李传红.心理健康教育需要健康的教育环境[J].教育探索,2004(7):115-116. 被引量:1
  • 2C. H. Bennett and G.Brassard. Quantum cryptogra- phy: Public key distribution and coin tossing. In Pro- ceedings of IEEE International Conference on Comput- ers, Systems and Signal Processing, Bangalore, India, 1984, (IEEE, New York, 1984), pp. 175-179. 被引量:1
  • 3D. Mayers. Unconditional security in quantum cryp- tography. Journal of the ACM, 2001, 48:351-406. 被引量:1
  • 4H. K. Lo and H. F. Chau. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283:2050-2056. 被引量:1
  • 5P.W. Shor and J. Preskill. Simple proof os security of the BB84 quantum key distribution protocol. Physical Review Letters, 2000: 85:441-444. 被引量:1
  • 6H. Inamori, L. Rallan, and V. VedraL Security of EPR-based quantum cryptography against incoherent symmetric attacks, preprint quant-ph/0103058. 被引量:1
  • 7E. Biham, M.Boyer, P.O. Boykin, T. Mor, and V. Roychowdhury. A proof of the security of quantum key distribution, preprint quant-ph/9912053. 被引量:1
  • 8X. Wang. Beating the photon-number-splitting at- tack in practicaJ quantum cryptography. Physical Review Letters, 2005, 94:230503. 被引量:1
  • 9J. Lodewyck, T. Debuisschert, R. Tualle-Brouri, and Philippe Grangier. Controlling excess noise in fiber-optics continuous-variable quantum key distribu- tion. Physical Review A, 2005, 72:050303(R). 被引量:1
  • 10潘旭伟,李泽彪,祝锡永,邵晨曦.自适应个性化信息服务:基于情境感知和本体的方法[J].中国图书馆学报,2009,35(6):41-48. 被引量:65

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部