Research on Process Control of Human Resource Management Based on Visualization Technology

Article Preview

Abstract:

With the development of computer and multimedia technology, social media platforms are widely used in various fields, so this paper introduces the design of network multimedia platform in the human resources management system, and designs a kind of new human resources management computer system. In order to improve the level of human resource management, it can introduce more talents and rational allocation human resources for enterprises, so we must improve the user generated content quality of social networking platform, eliminating spam behavior, and improving the social network human resource platform reputation. This paper establishes the security mechanism related mathematical model of social network human resources system. Through the VB programming control, it can implement the security of social network content, the automatic removal of rubbish short message and the optimal audit mechanism of system human resource management, which provide innovative solutions for the enterprise human resource management.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2258-2262

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Liu Renshan, Meng Xianghong. Design and implementation of identity authentication system based on PKI [J]. Manufacturing automation, 2013(4): 45-46.

Google Scholar

[2] Gao Chen, Tang Guliang. Interactive budget: dealing with strategic uncertainty, integrating management control based on the case study of Tianjin FAW Toyota Corporation [J]. Accounting research, 2010 (9): 51-58.

Google Scholar

[3] Cao Linfeng, Zhang Zhaotai. Research on budget management control function changes [J]. Accounting monthly, 2010 (12): 3-6.

Google Scholar

[4] Li Yunda. Development of Marx economics ideological enlightenment on finance [J]. Economic issues, 2011 (9): 3-5.

Google Scholar

[5] Pu Yuanfang, Zhang Wei, Teng Shaohua, Du Hongle. A cooperative network intrusion detection based on decision tree [J]. Journal of Jiangxi Normal University: Natural Science Edition, 2010, 34 (3): 302-307.

DOI: 10.1109/jcpc.2009.5420129

Google Scholar

[6] Zhang Lei, Zhou Jifeng, Zhang Qiang. Research on system software reliability demonstration test method [J]. Computer and digital engineering, 2010(6): 67-68.

Google Scholar

[7] Zhao Pan, Lu Bin. Development of DaVinci technologyDM6467 platform algorithm [J]. Modern telecommunications technology, 2011, (4): 38-39.

Google Scholar

[8] Chen Xinbao, Zhu Jianjun. The concept and classification of spatio-temporal data model [J]. Marine surveying and mapping, 2011, 29 (5): 74-76, 81.

Google Scholar

[9] Zhang Lin, Tang Daquan. The evolution and development of spatio-temporal index [J]. Computer science, 2010, 37 (4): 15-20.

Google Scholar

[10] Qin Weihong. The strategy and countermeasure of socialist ideology construction under the network condition [J]. Study on ideological and political work, 2012 (5): 89-90.

Google Scholar

[11] Li Miao, Song Yuanlin. Optimization of network ideological and political education contents [J]. Journal of Shaoyang University (SOCIAL SCIENCE EDITION), 2011(6): 34-35.

Google Scholar

[12] Xie Zhenxie. College students' network ideological and political education present situation and countermeasure research [D]. Chongqing: Southwestern University, 2010: 1-12.

Google Scholar