Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (1-2): 44-46    DOI:
Current Issue | Archive | Adv Search |
Research on Encapsulating System Based on Batch ——Taking Sanya University for Example
Liang Zhiyong1,Wang Liangcheng2,Zhou Xue2
1.Computer Center, Sanya University 2.Physics engineering College, Sanya University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  This paper studies on the application of batch technology in system encapsulation. Batch has the advantage of fast speed, simple programming, small script, strong function and so on. It can effectively improve the quality of system encapsulation, reduce the working intensity of laboratory technicians and improve the work efficiency.
Published: 08 November 2017
:  TP393  

Cite this article:

Liang Zhiyong, Wang Liangcheng, Zhou Xue. Research on Encapsulating System Based on Batch ——Taking Sanya University for Example. Computer & Telecommunication, 2015, 1(1-2): 44-46.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I1-2/44

[1] LI Jia-Qi SU Li-na. Research on Science and Technology Information Service platform of Comprehensive Sci-tech Journals based on Mobile Interconnection and its Architecture[J]. 电脑与电信, 2019, 1(6): 42-46.
[2] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[3] HUANG Xiao-hua. Analysis on the Head of the Web[J]. 电脑与电信, 2019, 1(5): 75-77.
[4] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[5] FANG Yong. Research on the IPv6 Remote Network Monitoring and Communication System[J]. 电脑与电信, 2019, 1(3): 62-65.
[6] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[7] Wang Gang. A Congestion Control Mechanism for Improving Fairness of TCP and UDP Data Flow[J]. 电脑与电信, 2018, 1(12): 70-73.
[8] CHEN Si-qi. Fine Grained Image Localization Based on Bilinear Convolutional Neural Network [J]. 电脑与电信, 2018, 1(11): 78-80.
[9] ZHENG Ai-yuan. Research on Evaluation Function Based on Indexin Fuzzy Network[J]. 电脑与电信, 2018, 1(9): 32-35.
[10] WANG Biao, TAN Si-min, RUAN Yuan-hua, XIE Tian-jie. Research on Evaluation Index System of Cloud Computing Service Quality[J]. 电脑与电信, 2018, 1(4): 4-6.
[11] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[12] ZHANG Yun. Design of Intelligent Supervision and Evaluation System Based on Cloudview[J]. 电脑与电信, 2018, 1(4): 43-46.
[13] FANG Zi-ling, KUANG Fang-jun. Data Analysis on NetEase Ballad Lyrics Based on Python[J]. 电脑与电信, 2018, 1(4): 53-56.
[14] CHENWen-yao. IDC Core Network Design for Telecom Carriers[J]. 电脑与电信, 2018, 1(3): 40-42.
[15] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd