This paper proposes the application strategy of the intelligent technology in electronic engineering automation control. Artificial intelligence technology is about to realize the calculation of perception, reasoning ...This paper proposes the application strategy of the intelligent technology in electronic engineering automation control. Artificial intelligence technology is about to realize the calculation of perception, reasoning and behavior study of it is different from most of the psychology, because it is more of an emphasis on the calculation, the artificial intelligence is also different from most of the computer science as because it is more of an emphasis on the perception, reasoning, and behavior, and future applications of artificial intelligence is beyond imagination. Regarding the multi-agent system target identification data fusion, the goal type is a proposition, each intelligent body gives through processing regarding the goal type judgment result is evidence, we discussed in detail of the essential applications on the item that will promote the further development.展开更多
This paper discussed the application strategy of the computer network technology in the electronic information engineering. The use of computer network management technology, designed to maximize the effectiveness of ...This paper discussed the application strategy of the computer network technology in the electronic information engineering. The use of computer network management technology, designed to maximize the effectiveness of computer network operations, while ensuring network management security. With the advent of the digital age, the computer network has been basically popular, so the computer network management technology research value and application value is more prominent become a digital information technology research one of the hot spots.. Good antivirus software can be easily installed in a few minutes to each NT server in the organization, and can be downloaded and distributed to all the target machine, set by the network administrator and management, it will work with the operating system and other security measures are tightly integrated to become part of the network security management, and automatically provide the best network virus defense measures. In the future, more integration of the methodologies will be considered and discussed.展开更多
文摘This paper proposes the application strategy of the intelligent technology in electronic engineering automation control. Artificial intelligence technology is about to realize the calculation of perception, reasoning and behavior study of it is different from most of the psychology, because it is more of an emphasis on the calculation, the artificial intelligence is also different from most of the computer science as because it is more of an emphasis on the perception, reasoning, and behavior, and future applications of artificial intelligence is beyond imagination. Regarding the multi-agent system target identification data fusion, the goal type is a proposition, each intelligent body gives through processing regarding the goal type judgment result is evidence, we discussed in detail of the essential applications on the item that will promote the further development.
文摘This paper discussed the application strategy of the computer network technology in the electronic information engineering. The use of computer network management technology, designed to maximize the effectiveness of computer network operations, while ensuring network management security. With the advent of the digital age, the computer network has been basically popular, so the computer network management technology research value and application value is more prominent become a digital information technology research one of the hot spots.. Good antivirus software can be easily installed in a few minutes to each NT server in the organization, and can be downloaded and distributed to all the target machine, set by the network administrator and management, it will work with the operating system and other security measures are tightly integrated to become part of the network security management, and automatically provide the best network virus defense measures. In the future, more integration of the methodologies will be considered and discussed.