In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management cond...With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ...With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.展开更多
After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set o...After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed.展开更多
The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key pro...The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC).展开更多
The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main ob...The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main objective of the course is to train students to have various skills,including those of enterprise scale network construction,network management,and network maintenance.Influenced by traditional teaching for a long time,the existing teaching of the course in colleges and universities urgently needs reform;otherwise,it will not be able to meet the social demand for talents in the new era.This paper focuses on the practical problems of the Computer Network teaching reform and proposes some efiective reform suggestions,hoping to engender an efficient link among the Computer Network course teaching,talent training,and the social needs in colleges and universities.展开更多
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high perfo...The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.展开更多
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ...In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.展开更多
From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc...From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc's capacity is deterministic, the quickest path problem is to find a path sending a specific of data such that the transmission time is minimized. However, in many real-life networks such as computer networks, each arc has stochastic capacity, lead time and accuracy rate. Such a network is named a multi-state computer network. Under both assured accuracy rate and time constraints, we extend the quickest path problem to compute the probability that d units of data can be sent through multiple minimal paths simultaneously. Such a probability named system reliability is a performance indicator to provide to managers for understanding the ability of system and improvement. An efficient algorithm is proposed to evaluate the system reliability in terms of the approach of minimal paths.展开更多
This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then t...This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing.展开更多
Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive area...Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility.展开更多
The artificial neural network method has been applied to the relationship between the atomic parameters and intemction packeters of binary alloy Phases, and the principle of thermodynamics in combination with artifici...The artificial neural network method has been applied to the relationship between the atomic parameters and intemction packeters of binary alloy Phases, and the principle of thermodynamics in combination with artificial neural network method has been used for the computerized phase diagrams of continuous solid solution of bigamy alloy systems. The computerized phase diagrams well agree with the real phase diagmms.展开更多
Computerized tomography (CT) scan is the only screening test recommended by doctors to look for lung cancer. Convolutional neural networks (CNNs) have recently proven their ability to successfully classify medical ima...Computerized tomography (CT) scan is the only screening test recommended by doctors to look for lung cancer. Convolutional neural networks (CNNs) have recently proven their ability to successfully classify medical images. Due to its strong compactness property, the Discrete Wavelet transform (DWT) has been commonly used in image feature extraction applications. This paper presents a novel technique for the classification of Lung cancer in Computerized Tomography (CT) scans using Wavelets to find discriminative features in the CT images and CNN to classify the extracted features. Experimental results prove that the proposed approach outperforms other commonly used methods and gives an overall accuracy of 99.5%.展开更多
BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also a...BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also achieved favorable results in clinical medical record management.However,research on their combined application is relatively lacking.Objective:it was to explore the impact of network systems and PDCA management mode on ICD-10 encoding.Material and Method:a retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.AIM To study the adoption of network and PDCA in the ICD-10.METHODS A retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.RESULTS In the 3,6,12,18,and 24 months of PDCA cycle management mode,the coding accuracy and medical record completion rate were higher,and the coding time was lower in the observation group as against the controls(P<0.05).The satisfaction of coders(80.22%vs 53.45%)and patients(84.89%vs 51.72%)in the observation group was markedly higher as against the controls(P<0.05).CONCLUSION The combination of computer networks and PDCA can improve the accuracy,efficiency,completion rate,and satisfaction of ICD-10 coding.展开更多
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
文摘With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
文摘With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.
文摘After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed.
文摘The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC).
基金The 2021 Heilongjiang Education Scientific Planning Key Projects"Research and Practice of‘Multi-Course Fusion’Online and Ofifline Hybrid Teaching Mode Based on Improving Employment Competitiveness-Taking Computer Basic Course as An Example"(Project Number:GJB1421199 and GJB1422190)The 2019 Teaching Research Project of Heilongjiang Bayi Agricultural University"Online and Offline Hybrid Teaching of Office Automation Course"(Project Number:NDJY1918)The 2021 Teaching Research Project of Heilongjiang Bayi Agricultural University"Machine Learning Course Based on Case Teaching in Application Exploration of Big Data Specialty"(Project Number:NDJY2121)。
文摘The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main objective of the course is to train students to have various skills,including those of enterprise scale network construction,network management,and network maintenance.Influenced by traditional teaching for a long time,the existing teaching of the course in colleges and universities urgently needs reform;otherwise,it will not be able to meet the social demand for talents in the new era.This paper focuses on the practical problems of the Computer Network teaching reform and proposes some efiective reform suggestions,hoping to engender an efficient link among the Computer Network course teaching,talent training,and the social needs in colleges and universities.
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
基金supported in part by the National Natural Science Foundation of China under Grants No.90604003 and No.90604004by the National Grand Fundamental Research 973 Program of China under Grant No.2003CB314801.
文摘The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.
文摘In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.
基金supported in part by the National Science Council,Taiwan,China,under Grant No.NSC 101-2628-E-011-005-MY3
文摘From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc's capacity is deterministic, the quickest path problem is to find a path sending a specific of data such that the transmission time is minimized. However, in many real-life networks such as computer networks, each arc has stochastic capacity, lead time and accuracy rate. Such a network is named a multi-state computer network. Under both assured accuracy rate and time constraints, we extend the quickest path problem to compute the probability that d units of data can be sent through multiple minimal paths simultaneously. Such a probability named system reliability is a performance indicator to provide to managers for understanding the ability of system and improvement. An efficient algorithm is proposed to evaluate the system reliability in terms of the approach of minimal paths.
文摘This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing.
文摘Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility.
文摘The artificial neural network method has been applied to the relationship between the atomic parameters and intemction packeters of binary alloy Phases, and the principle of thermodynamics in combination with artificial neural network method has been used for the computerized phase diagrams of continuous solid solution of bigamy alloy systems. The computerized phase diagrams well agree with the real phase diagmms.
文摘Computerized tomography (CT) scan is the only screening test recommended by doctors to look for lung cancer. Convolutional neural networks (CNNs) have recently proven their ability to successfully classify medical images. Due to its strong compactness property, the Discrete Wavelet transform (DWT) has been commonly used in image feature extraction applications. This paper presents a novel technique for the classification of Lung cancer in Computerized Tomography (CT) scans using Wavelets to find discriminative features in the CT images and CNN to classify the extracted features. Experimental results prove that the proposed approach outperforms other commonly used methods and gives an overall accuracy of 99.5%.
文摘BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also achieved favorable results in clinical medical record management.However,research on their combined application is relatively lacking.Objective:it was to explore the impact of network systems and PDCA management mode on ICD-10 encoding.Material and Method:a retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.AIM To study the adoption of network and PDCA in the ICD-10.METHODS A retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.RESULTS In the 3,6,12,18,and 24 months of PDCA cycle management mode,the coding accuracy and medical record completion rate were higher,and the coding time was lower in the observation group as against the controls(P<0.05).The satisfaction of coders(80.22%vs 53.45%)and patients(84.89%vs 51.72%)in the observation group was markedly higher as against the controls(P<0.05).CONCLUSION The combination of computer networks and PDCA can improve the accuracy,efficiency,completion rate,and satisfaction of ICD-10 coding.