期刊文献+
共找到64篇文章
< 1 2 4 >
每页显示 20 50 100
Cutting-Edge Challenges in Communication Technology and Computer Network Security
1
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 Communication technology computer network SECURITY
下载PDF
FAULT LOCATION AND RECORDING SYSTEM OF TRANSMISSION LINES BASED ON COMPUTER NETWORK 被引量:1
2
作者 贺家李 孙雅明 贺继红 《Transactions of Tianjin University》 EI CAS 1997年第1期17-23,共7页
In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location ... In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location method for extra high voltage and long distance transmission lines. 展开更多
关键词 computer network fault location recording system
下载PDF
Application Research of Computer Network Technology in Mining Railway Transport Management System 被引量:2
3
作者 余静 王振军 才庆祥 《Journal of China University of Mining and Technology》 2002年第1期57-60,共4页
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi... This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given. 展开更多
关键词 mining railway transport management computer network SECURITY reliability
下载PDF
A Practical Study of Big Data Technology in Computer Network Information Security Processing
4
作者 Kongduo Xing 《Journal of Electronic Research and Application》 2023年第6期36-41,共6页
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in... In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology. 展开更多
关键词 Big data technology computer network Information security
下载PDF
Adoption of network and plan-do-check-action in the international classification of disease 10 coding
5
作者 Biao Lian 《World Journal of Clinical Cases》 SCIE 2024年第19期3734-3743,共10页
BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also a... BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also achieved favorable results in clinical medical record management.However,research on their combined application is relatively lacking.Objective:it was to explore the impact of network systems and PDCA management mode on ICD-10 encoding.Material and Method:a retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.AIM To study the adoption of network and PDCA in the ICD-10.METHODS A retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.RESULTS In the 3,6,12,18,and 24 months of PDCA cycle management mode,the coding accuracy and medical record completion rate were higher,and the coding time was lower in the observation group as against the controls(P<0.05).The satisfaction of coders(80.22%vs 53.45%)and patients(84.89%vs 51.72%)in the observation group was markedly higher as against the controls(P<0.05).CONCLUSION The combination of computer networks and PDCA can improve the accuracy,efficiency,completion rate,and satisfaction of ICD-10 coding. 展开更多
关键词 Plan-do-check-action cycle management mode computer network International classification of diseases tenth edition coding Accuracy
下载PDF
Analytical Investigation on Computer Network Security System of Colleges and Universities
6
作者 徐悦 《电脑知识与技术(过刊)》 2013年第1X期266-268,共3页
With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management cond... With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction. 展开更多
关键词 Colleges and Universities computer network Security system PREVENTION
下载PDF
Research on the application of computer network remote control system
7
作者 Rong Miao 《International Journal of Technology Management》 2017年第4期44-46,共3页
In this era of accelerated pace of life, high efficiency and superior quality has undoubtedly become the focus of attention. In this context, the computer has been the core component of our daily production, life and ... In this era of accelerated pace of life, high efficiency and superior quality has undoubtedly become the focus of attention. In this context, the computer has been the core component of our daily production, life and entertainment. In fact, the vast majority of modem areas cannot be separated from the computer, if separated from the computer, these areas are likely to be subject to enormous challenges and threats, so people and computer dependence are increasing. With the advent of the Internet era, the network and the economic, trade, cultural exchanges and other activities related to the increasingly problematic. The computer network remote control system is a new kind of multimedia network control system Network platform to carry out related construction. In this paper, the application of computer network remote control system as the core of the study, hoping to provide help for the majority of technical staff. 展开更多
关键词 computer network REMOTE CONTROL system
下载PDF
HUSTserver:Implementation for Reliable and High-Performance Network Attached Storage System 被引量:2
8
作者 郭辉 周敬利 余胜生 《Journal of Shanghai University(English Edition)》 CAS 2003年第2期156-162,共7页
Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive area... Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility. 展开更多
关键词 storage systems network attached storage computer network channel bonding data mirroring.
下载PDF
Mobile Network Computer Can Better Describe The Future of Information Society 被引量:1
9
作者 Zhaoming Guo Yi Jiang Shihua Bi 《China Communications》 SCIE CSCD 2016年第12期90-96,共7页
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ... In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society. 展开更多
关键词 mobile computer network mobile network computer mobile communication network WAP IMS
下载PDF
Research on the Application of Computer Network Technology in Electronic Information Engineering 被引量:1
10
作者 Zhiwu Cui 《Journal of Electronic Research and Application》 2022年第3期1-5,共5页
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g... Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering. 展开更多
关键词 computer network technology Electronic information engineering Application and management
下载PDF
FINDING THE OPTIMAL LENGTH OF DATA FRAME IN PLC COMPUTER NETWORK
11
作者 Huang Ronghui Zhou Mingtian She Kun (College of Computer Science & Eng., UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第2期154-160,共7页
The length of data frame is an important parameter in Medium Access Control(MAC) layer protocol. A method of finding the optimal length of data frame when impulsive disturbance is involved in PowerLine Communications ... The length of data frame is an important parameter in Medium Access Control(MAC) layer protocol. A method of finding the optimal length of data frame when impulsive disturbance is involved in PowerLine Communications (PLC) is proposed. Having analyzed the characteristics of impulsive disturbance in powerline and the collision mechanism between the disturbance and data frame, this letter gives the function of the network channel utilization with the length of data frame in MAC layer and the impulsive disturbance. Our stochastic process simulation shows that it is feasible to get the optimal length of data frame. 展开更多
关键词 Medium Access Control (MAC) PowerLine Communications(PLC) computer network
下载PDF
Analysis on The Application of Data Mining Technology in Computer Network Virus Defense
12
作者 Sun Hujun 《International Journal of Technology Management》 2017年第3期49-51,共3页
With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services fo... With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services for people.However, the security problem of computer network is becoming more and more serious. All kinds of network viruses pose a great threat to the security of computer network.As the most advanced data processing technology currently, data mining technology can effectively resist the invasion of network virus to computer system,and plays an important role in improving the security of the computer network.This paper starts with the concept of data mining technology and the characteristics of computer network virus,and makes an in-depth analysis on the specific application of data mining technology in the computer network virus defense. 展开更多
关键词 data mining technology computer network virus CHARACTERISTIC DEFENSE APPLICATION
下载PDF
Research on Computer Network Can and Performance Asalysis
13
作者 Pan Qijing Yang Yonggao Wang Yu(Department of Computer Science,Southwest Jiaotong University, Chengdu 610031,China) 《Journal of Modern Transportation》 1994年第1期1-6,共6页
After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set o... After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed. 展开更多
关键词 computer network CAD network performance
下载PDF
Research and Analysis of the Parallel Computer Network Reliability
14
作者 Xiaodan ZHANG 《International Journal of Technology Management》 2015年第3期113-114,共2页
With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. Thi... With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. This paper gives a introduction to a simple computer network, given the reliability of the design criteria for computer network analysis, and finally through the examples to illustrate the computer network hardware and software reliability. 展开更多
关键词 computer network RELIABILITY Design criteria Example illustrations.
下载PDF
Research on Optimizing Computer Network Structure based on Genetic Algorithm and Modified Convex Optimization Theory
15
作者 Jinyu WANG 《International Journal of Technology Management》 2015年第7期95-97,共3页
In this paper, we report in-depth analysis and research on the optimizing computer network structure based on genetic algorithm and modified convex optimization theory. Machine learning method has been widely used in ... In this paper, we report in-depth analysis and research on the optimizing computer network structure based on genetic algorithm and modified convex optimization theory. Machine learning method has been widely used in the background and one of its core problems is to solve the optimization problem. Unlike traditional batch algorithm, stochastic gradient descent algorithm in each iteration calculation, the optimization of a single sample point only losses could greatly reduce the memory overhead. The experiment illustrates the feasibility of our proposed approach. 展开更多
关键词 computer network Genetic Algorithm Convex Optimization Structure Feature.
下载PDF
Research on the Novel Computer Network Intrusion Detection Model based on Improved Particle Swarm Optimization Algorithm
16
作者 Juan Fu Hai Hu Leping Wang 《International Journal of Technology Management》 2016年第8期72-75,共4页
In this paper, we conduct research on the novel computer network intrusion detection model based on improved particle swarmoptimization algorithm. TCP fl ood attack, UDP fl ood attack, ICMP fl ood attack, deformity of... In this paper, we conduct research on the novel computer network intrusion detection model based on improved particle swarmoptimization algorithm. TCP fl ood attack, UDP fl ood attack, ICMP fl ood attack, deformity of message attack, the application layer attack is themost typical DDOS attacks, DDOS attacks are also changing to upgrade at the same time, scholars research on DDOS attack defense measuresbecome more and more has the application value and basic practical signifi cance. Network security protection is a comprehensive project, nomatter what measures to take that safety is always relative, so as the network security administrator, should change with the network securitysituation and the security requirements, moderate to adjust security policies, so as to achieve the target. Under this basis, we propose the newperspective on the IDS system that will then enhance the robustness and safetiness of the overall network system. 展开更多
关键词 Particle Swarm Optimization Intrusion Detection ALGORITHM computer network
下载PDF
Research on the application of artificial intelligence in the computer network technology
17
作者 Shi Yuanmin 《International English Education Research》 2014年第2期29-31,共3页
As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the rese... As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the research field of the theory and application of artificial intelligence technology covers almost all the areas of human activity. In recent years, the rapid development of computer network technology produces and drives a batch of new scientific research fields. Among them, the application of artificial intelligence in the computer network technology is a hot topic which is academically and technically strong and can bring obvious economic benefit. 展开更多
关键词 Artificial intelligence computer network technology network security network management
下载PDF
Research on the Application of Big Data and Artificial Intelligence Technology in Computer Network
18
作者 Hongfei Wang 《Modern Electronic Technology》 2020年第2期21-25,共5页
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ... With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology. 展开更多
关键词 Big data era Artificial intelligence computer network technology Practical application
下载PDF
Research on the Computer Network Protocol Test Model based on Genetic and Random Walk Algorithm
19
作者 Ping Li 《International Journal of Technology Management》 2016年第8期39-42,共4页
In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of net... In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization. 展开更多
关键词 computer network Protocol Test Model Genetic and Random Walk Algorithm.
下载PDF
A brief analysis of the phase transitions and the overall correlation behavior in non uniformity computer network
20
作者 Liu Zhijun Pu Xiaowei 《International Journal of Technology Management》 2014年第5期10-12,共3页
With the developing of the computer, the network is more and more liked by the users. It has become an indispensable part of the living and production. However, with the expanding of network scale, there have been som... With the developing of the computer, the network is more and more liked by the users. It has become an indispensable part of the living and production. However, with the expanding of network scale, there have been some problems in the operation of the network system. Most of people lack of understanding on these issues, so they couldn' t handle them well. Some people use the theory of phase transitions to explain the power law phenomena in computer network. But it only start from the theory, but ignores the correlation of network nodes. The lack of holistic thinking mode, make the development of computer network get into a stray area. This paper started from the phase transition theory, elaborated the connotations of phase transformation and the overall correlation, and described the problems about them. 展开更多
关键词 computer network phase transitions theory the overall association the non uniformity
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部