期刊文献+
共找到178篇文章
< 1 2 9 >
每页显示 20 50 100
浅谈计算机网络技术在病案管理中的问题及前景 被引量:8
1
作者 刘争红 赵卉生 《中国病案》 2005年第12期26-27,共2页
随着计算机技术及网络技术的发展和应用,医院的信息化管理已经进入议事日程。在病案管理中,许多医院的病案首页已经录入电子计算机,完整的电子病案指日可待。本文就未来计算机网络技术在病案管理中应用时可能遇到的问题及前景进行了初... 随着计算机技术及网络技术的发展和应用,医院的信息化管理已经进入议事日程。在病案管理中,许多医院的病案首页已经录入电子计算机,完整的电子病案指日可待。本文就未来计算机网络技术在病案管理中应用时可能遇到的问题及前景进行了初步探讨。 展开更多
关键词 电子病案 管理 计算机/网络
原文传递
构建基于建构主义学习理论的大学英语写作课程教学模式
2
作者 倪清泉 《英语研究》 2009年第1期70-72,共3页
以建构主义学习理论为依据,以计算机/网络技术为支撑,在Stahl(2000a)的"协作知识建构模型"基础上设计了计算机/网络环境下基于建构主义学习理论的英语写作教学模式,试图改善传统英语写作教学模式,改变当前英语写作教学低效的... 以建构主义学习理论为依据,以计算机/网络技术为支撑,在Stahl(2000a)的"协作知识建构模型"基础上设计了计算机/网络环境下基于建构主义学习理论的英语写作教学模式,试图改善传统英语写作教学模式,改变当前英语写作教学低效的现状,提高学生英语写作能力。该模式以学生为中心,以教师为指导,以计算机/网络学习为主要学习环境,以视频聊天室、BBS、博客、邮箱为教学或学习介质,将成果法与过程法相结合,利用"情境"、"协作"、"会话"等要素,充分发挥学生的主动性、积极性和首创精神。 展开更多
关键词 计算机/网络环境 学习理论 英语写作 写作模式
下载PDF
FAULT LOCATION AND RECORDING SYSTEM OF TRANSMISSION LINES BASED ON COMPUTER NETWORK 被引量:1
3
作者 贺家李 孙雅明 贺继红 《Transactions of Tianjin University》 EI CAS 1997年第1期17-23,共7页
In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location ... In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location method for extra high voltage and long distance transmission lines. 展开更多
关键词 computer network fault location recording system
下载PDF
Distributed Computation Models for Data Fusion System Simulation
4
作者 张岩 曾涛 +1 位作者 龙腾 崔智社 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期291-297,共7页
An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advan... An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advanced C3I systems. Two architectures are provided and verified: one is based on pure TCP/IP protocol and C/S model, and implemented with Winsock, the other is based on CORBA (common object request broker architecture). The performance of data fusion simulation system, i.e. reliability, flexibility and scalability, is improved and enhanced by two models. The study of them makes valuable explore on incorporating the distributed computation concepts into radar system simulation techniques. 展开更多
关键词 radar system computer network data fusion SIMULATION distributed computation
下载PDF
Research and Implementation on HTTP Tunneling
5
作者 束坤 许勇 +1 位作者 吴国新 赵齐 《Journal of Southeast University(English Edition)》 EI CAS 2000年第2期52-57,共6页
The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i... The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i.e, adding local proxy to browser and reverse proxy to Web server based on present Web browser and server. The transformation between HTTP message and secure HTTP message is implemented in these two proxy modules. The architecture and implementing method is given and the features of this module is also discussed. 展开更多
关键词 computer network WEB communication security PROXY
下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
6
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
下载PDF
Prediction of Injection-Production Ratio with BP Neural Network
7
作者 袁爱武 郑晓松 王东城 《Petroleum Science》 SCIE CAS CSCD 2004年第4期62-65,共4页
Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. First... Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. Firstly, the error between the fitting and actual injection-production ratio is calculated with such methods as the injection-production ratio and water-oil ratio method, the material balance method, the multiple regression method, the gray theory GM (1,1) model and the back-propogation (BP) neural network method by computer applications in this paper. The relative average errors calculated are respectively 1.67%, 1.08%, 19.2%, 1.38% and 0.88%. Secondly, the reasons for the errors from different prediction methods are analyzed theoretically, indicating that the prediction precision of the BP neural network method is high, and that it has a better self-adaptability, so that it can reflect the internal relationship between the injection-production ratio and the influencing factors. Therefore, the BP neural network method is suitable to the prediction of injection-production ratio. 展开更多
关键词 Injection-production ratio (IPR) BP neural network gray theory PREDICTION
下载PDF
HiQoS:An SDN-Based Multipath QoS Solution 被引量:21
8
作者 YAN Jinyao ZHANG Hailong +2 位作者 SHUAI Qianjun LIU Bo GUO Xiao 《China Communications》 SCIE CSCD 2015年第5期123-133,共11页
Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking ... Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking that separates control plane and forwarding planes,and has the advantage of centralized control and programmability.In this paper,we propose HiQoS that provides QoS guarantees using SDN.Moreover,HiQoS makes use of multiple paths between source and destination and queuing mechanisms to guarantee QoS for different types of traffic.Experimental results show that our HiQoS scheme can reduce delay and increase throughput to guarantee QoS.Very importantly,HiQoS recovers from link failure very quickly by rerouting traffic from failed path to other available path. 展开更多
关键词 SDN QOS MULTIPATH OpenFlow
下载PDF
Adaptive ant-based routing in wireless sensor networks using Energy~* Delay metrics 被引量:6
9
作者 Yao-feng WEN Yu-quan CHEN Min PAN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期531-538,共8页
To find the optimal routing is always an important topic in wireless sensor networks (WSNs). Considering a WSN where the nodes have limited energy, we propose a novel Energy*Delay model based on ant algorithms ("... To find the optimal routing is always an important topic in wireless sensor networks (WSNs). Considering a WSN where the nodes have limited energy, we propose a novel Energy*Delay model based on ant algorithms ("E&D ANTS" for short) to minimize the time delay in transferring a fixed number of data packets in an energy-constrained manner in one round. Our goal is not only to maximize the lifetime of the network but also to provide real-time data transmission services. However, because of the tradeoff of energy and delay in wireless network systems, the reinforcement learning (RL) algorithm is introduced to train the model. In this survey, the paradigm of E&D ANTS is explicated and compared to other ant-based routing algorithms like AntNet and AntChain about the issues of routing information, routing overhead and adaptation. Simulation results show that our method performs about seven times better than AntNet and also outperforms AntChain by more than 150% in terms of energy cost and delay per round. 展开更多
关键词 Ant colony optimization (ACO) PHEROMONES Power consumption Wireless sensor networks (WSNs)
下载PDF
Deterministic and randomized scheduling problems under the lp norm on two identical machines 被引量:5
10
作者 林凌 谈之奕 何勇 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期20-26,共7页
Parallel machine scheduling problems, which are important discrete optimization problems, may occur in many applications. For example, load balancing in network communication channel assignment, parallel processing in... Parallel machine scheduling problems, which are important discrete optimization problems, may occur in many applications. For example, load balancing in network communication channel assignment, parallel processing in large-size computing, task arrangement in flexible manufacturing systems, etc., are multiprocessor scheduling problem. In the traditional parallel machine scheduling problems, it is assumed that the problems are considered in offline or online environment. But in practice, problems are often not really offline or online but somehow in-between. This means that, with respect to the online problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi-online ones. In this paper, the semi-online problem P2|decr|lp (p>1) is considered where jobs come in non-increasing order of their processing times and the objective is to minimize the sum of the lp norm of every machine’s load. It is shown that LS algorithm is optimal for any lp norm, which extends the results known in the literature. Furthermore, randomized lower bounds for the problems P2|online|lp and P2|decr|lp are presented. 展开更多
关键词 SEMI-ONLINE SCHEDULING RANDOMIZATION Competitive ratio
下载PDF
An Adaptive Scheme for Neighbor Discovery in Mobile Ad Hoc Networks 被引量:5
11
作者 沈耀 蔡云泽 许晓鸣 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期602-609,617,共9页
The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile no... The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile node uses fixed period to send HELLO messages to notify its existence. An adaptive scheme was proposed. The objective is that when mobile nodes are distributed sparsely or move slowly, fewer HELLO messages are needed to achieve reasonable accuracy, while in a mutable network where nodes are dense or move quickly, they can adaptively send more HELLO messages to ensure the accuracy. Simulation results show that the adaptive scheme achieves the objective and performs effectively. 展开更多
关键词 ad hoc network neighbor discovery energy efficiency
下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
12
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 SECURITY CIPHER Wireless sensor network (WSN) Feistel scheme
下载PDF
Strategic games on a hierarchical network model 被引量:2
13
作者 Yi-xiao LI Xiao-gang JIN +1 位作者 Fan-sheng KONG Hui-lan LUO 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第2期271-278,共8页
Among complex network models,the hierarchical network model is the one most close to such real networks as world trade web,metabolic network,WWW,actor network,and so on.It has not only the property of power-law degree... Among complex network models,the hierarchical network model is the one most close to such real networks as world trade web,metabolic network,WWW,actor network,and so on.It has not only the property of power-law degree distribution,but also the scaling clustering coefficient property which Barabási-Albert(BA)model does not have.BA model is a model of network growth based on growth and preferential attachment,showing the scale-free degree distribution property.In this paper,we study the evolution of cooperation on a hierarchical network model,adopting the prisoner's dilemma(PD)game and snowdrift game(SG)as metaphors of the interplay between connected nodes.BA model provides a unifying framework for the emergence of cooperation.But interestingly,we found that on hierarchical model,there is no sign of cooperation for PD game,while the fre-quency of cooperation decreases as the common benefit decreases for SG.By comparing the scaling clustering coefficient prop-erties of the hierarchical network model with that of BA model,we found that the former amplifies the effect of hubs.Considering different performances of PD game and SG on complex network,we also found that common benefit leads to cooperation in the evolution.Thus our study may shed light on the emergence of cooperation in both natural and social environments. 展开更多
关键词 Complex network Hierarchical network model Barabási-Albert (BA) model Prisoner's dilemma (PD) game Snowdrift game (SG)
下载PDF
A Novel Packet Marking Algorithm in Context-aware Autonomic QoS Framework 被引量:2
14
作者 Gong Xiangyang Wang Wendong Li Yan 《China Communications》 SCIE CSCD 2009年第4期98-107,共10页
Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a... Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a novel autonomic packet marking(APM) algorithm.In the proposed autonomic QoS framework, APM is capable of collecting various QoS related contexts, and adaptively adjusting its behavior to provide better QoS guarantee according to users' requirements and network conditions.Simulation results show that APM provides better performance than traditional packet marker, and significantly improves user's quality of experience. 展开更多
关键词 autonomic QoS framework DIFFSERV CONTEXT-AWARE packet marking
下载PDF
An Algorithm to Construct Concurrent Reachability Graph of Petri Nets 被引量:3
15
作者 张金泉 倪丽娜 蒋昌俊 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期180-184,共5页
Reachability graph is a very important tool to analyze the dynamic properties of Petri nets, but the concurrent relation of transitions in Petri nets cannot be represented by reachability graph. Petri net is a concurr... Reachability graph is a very important tool to analyze the dynamic properties of Petri nets, but the concurrent relation of transitions in Petri nets cannot be represented by reachability graph. Petri net is a concurrent system, while reachability graph is a serial one. However, concurrency is a kind of property which is not only very significant but also difficult to be analyzed and controlled. This paper presents the concepts of concurrent reachable marking and concurrent reachable graph in order to represent and analyze the concurrent system. The algorithm constructing concurrent reachable marking set and concurrent reachability graph is also shown so that we can study the response problems among services in a network computing environment and analyze the throughput of the system. The Dining Philosophers Problem, which is a classic problem of describing the management of concurrent resources, is given as an example to illustrate the significance of concurrent reachability graph. 展开更多
关键词 Petri nets concurrent system Concurrent Reachable Marking concurrent reachable marking set Concurrent Reachability Graph
下载PDF
Research on traffic congestion mechanism and countermeasures based on dynamic traffic assignment 被引量:3
16
作者 裴玉龙 郎益顺 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第3期235-238,共4页
Traffic congestion is widely distributed around a network. Generally, to analyze traffic congestion, static traffic capacity is adopted. But dynamic characteristics must be studied because congestion is a dynamic proc... Traffic congestion is widely distributed around a network. Generally, to analyze traffic congestion, static traffic capacity is adopted. But dynamic characteristics must be studied because congestion is a dynamic process. A Dynamic Traffic Assignment modeling fundamental combined with an urban congestion analysis method is studied in this paper. Three methods are based on congestion analysis, and the stochastic user optimal DTA models are especially considered. Correspondingly, a dynamic system optimal model is suggested for responding congestion countermeasures and an ideal user optimal model for predicted congestion countermeasure respectively. 展开更多
关键词 dynamic traffic assignment traffic congestion dynamic user optimal dynamic system optimal
下载PDF
Web Page Watermarking for Tamper-Proof 被引量:2
17
作者 赵启军 卢宏涛 蒋晓华 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期280-284,共5页
This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after e... This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after each word and each line. When a watermarked web page is tampered, the extracted watermark can detect and locate the modifications to the web page. Besides, the framework of watermarked Web Server system was given. Compared with traditional digital signature methods, this watermarking method is more transparent in that there is no necessary to detach the watermark before displaying web pages. The e xperimental results show that the proposed scheme is an effective tool for tamper-proof of web pages. 展开更多
关键词 web page WATERMARKING hypertext markup language(HTML) tamper-proof
下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
18
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad boc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol. 展开更多
关键词 mobile ad hoe network fuzzy Petri net certainty factor ad hoc on demand distance vector routing algorithm
下载PDF
The design and implementation of web mining in web sites security 被引量:2
19
作者 LI Jian, ZHANG Guo-yin , GU Guo-chang, LI Jian-li College of Computer Science and Technology, Harbin Engineering University, Harbin 150001China 《Journal of Marine Science and Application》 2003年第1期81-86,共6页
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg... The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency. 展开更多
关键词 data mining web log mining web sites security density-based clustering
下载PDF
Research on the Synchronization of Modulation Hopping System:I Synchronization Scheme 被引量:2
20
作者 Tai Nengjian Wu Dewei +1 位作者 Wu Jie Li Ting 《China Communications》 SCIE CSCD 2009年第4期148-154,共7页
In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed i... In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed in detail.According to the system requirements for short code in the properties of time-varying, safety and balance, an algorithm to design wide-gap chaos short code based on TOD is proposed.Synchronization performance analysis shows that the algorithm has good performance, the initial synchronization time and the later entering network synchronization time are short, additionally, maximum synchronization time difference and synchronization maintaining time are long, all of which meet the needs of normal communications, and further verify the synchronization scheme feasible. 展开更多
关键词 secure communication modulation hopping SYNCHRONIZATION
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部