The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management cond...With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
The length of data frame is an important parameter in Medium Access Control(MAC) layer protocol. A method of finding the optimal length of data frame when impulsive disturbance is involved in PowerLine Communications ...The length of data frame is an important parameter in Medium Access Control(MAC) layer protocol. A method of finding the optimal length of data frame when impulsive disturbance is involved in PowerLine Communications (PLC) is proposed. Having analyzed the characteristics of impulsive disturbance in powerline and the collision mechanism between the disturbance and data frame, this letter gives the function of the network channel utilization with the length of data frame in MAC layer and the impulsive disturbance. Our stochastic process simulation shows that it is feasible to get the optimal length of data frame.展开更多
With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services fo...With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services for people.However, the security problem of computer network is becoming more and more serious. All kinds of network viruses pose a great threat to the security of computer network.As the most advanced data processing technology currently, data mining technology can effectively resist the invasion of network virus to computer system,and plays an important role in improving the security of the computer network.This paper starts with the concept of data mining technology and the characteristics of computer network virus,and makes an in-depth analysis on the specific application of data mining technology in the computer network virus defense.展开更多
In this era of accelerated pace of life, high efficiency and superior quality has undoubtedly become the focus of attention. In this context, the computer has been the core component of our daily production, life and ...In this era of accelerated pace of life, high efficiency and superior quality has undoubtedly become the focus of attention. In this context, the computer has been the core component of our daily production, life and entertainment. In fact, the vast majority of modem areas cannot be separated from the computer, if separated from the computer, these areas are likely to be subject to enormous challenges and threats, so people and computer dependence are increasing. With the advent of the Internet era, the network and the economic, trade, cultural exchanges and other activities related to the increasingly problematic. The computer network remote control system is a new kind of multimedia network control system Network platform to carry out related construction. In this paper, the application of computer network remote control system as the core of the study, hoping to provide help for the majority of technical staff.展开更多
With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. Thi...With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. This paper gives a introduction to a simple computer network, given the reliability of the design criteria for computer network analysis, and finally through the examples to illustrate the computer network hardware and software reliability.展开更多
In this paper, we report in-depth analysis and research on the optimizing computer network structure based on genetic algorithm and modified convex optimization theory. Machine learning method has been widely used in ...In this paper, we report in-depth analysis and research on the optimizing computer network structure based on genetic algorithm and modified convex optimization theory. Machine learning method has been widely used in the background and one of its core problems is to solve the optimization problem. Unlike traditional batch algorithm, stochastic gradient descent algorithm in each iteration calculation, the optimization of a single sample point only losses could greatly reduce the memory overhead. The experiment illustrates the feasibility of our proposed approach.展开更多
In this paper, we conduct research on the novel computer network intrusion detection model based on improved particle swarmoptimization algorithm. TCP fl ood attack, UDP fl ood attack, ICMP fl ood attack, deformity of...In this paper, we conduct research on the novel computer network intrusion detection model based on improved particle swarmoptimization algorithm. TCP fl ood attack, UDP fl ood attack, ICMP fl ood attack, deformity of message attack, the application layer attack is themost typical DDOS attacks, DDOS attacks are also changing to upgrade at the same time, scholars research on DDOS attack defense measuresbecome more and more has the application value and basic practical signifi cance. Network security protection is a comprehensive project, nomatter what measures to take that safety is always relative, so as the network security administrator, should change with the network securitysituation and the security requirements, moderate to adjust security policies, so as to achieve the target. Under this basis, we propose the newperspective on the IDS system that will then enhance the robustness and safetiness of the overall network system.展开更多
As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the rese...As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the research field of the theory and application of artificial intelligence technology covers almost all the areas of human activity. In recent years, the rapid development of computer network technology produces and drives a batch of new scientific research fields. Among them, the application of artificial intelligence in the computer network technology is a hot topic which is academically and technically strong and can bring obvious economic benefit.展开更多
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ...With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.展开更多
In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of net...In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.展开更多
With the developing of the computer, the network is more and more liked by the users. It has become an indispensable part of the living and production. However, with the expanding of network scale, there have been som...With the developing of the computer, the network is more and more liked by the users. It has become an indispensable part of the living and production. However, with the expanding of network scale, there have been some problems in the operation of the network system. Most of people lack of understanding on these issues, so they couldn' t handle them well. Some people use the theory of phase transitions to explain the power law phenomena in computer network. But it only start from the theory, but ignores the correlation of network nodes. The lack of holistic thinking mode, make the development of computer network get into a stray area. This paper started from the phase transition theory, elaborated the connotations of phase transformation and the overall correlation, and described the problems about them.展开更多
After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set o...After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed.展开更多
This paper discussed the application strategy of the computer network technology in the electronic information engineering. The use of computer network management technology, designed to maximize the effectiveness of ...This paper discussed the application strategy of the computer network technology in the electronic information engineering. The use of computer network management technology, designed to maximize the effectiveness of computer network operations, while ensuring network management security. With the advent of the digital age, the computer network has been basically popular, so the computer network management technology research value and application value is more prominent become a digital information technology research one of the hot spots.. Good antivirus software can be easily installed in a few minutes to each NT server in the organization, and can be downloaded and distributed to all the target machine, set by the network administrator and management, it will work with the operating system and other security measures are tightly integrated to become part of the network security management, and automatically provide the best network virus defense measures. In the future, more integration of the methodologies will be considered and discussed.展开更多
The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key pro...The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC).展开更多
The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main ob...The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main objective of the course is to train students to have various skills,including those of enterprise scale network construction,network management,and network maintenance.Influenced by traditional teaching for a long time,the existing teaching of the course in colleges and universities urgently needs reform;otherwise,it will not be able to meet the social demand for talents in the new era.This paper focuses on the practical problems of the Computer Network teaching reform and proposes some efiective reform suggestions,hoping to engender an efficient link among the Computer Network course teaching,talent training,and the social needs in colleges and universities.展开更多
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also a...BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also achieved favorable results in clinical medical record management.However,research on their combined application is relatively lacking.Objective:it was to explore the impact of network systems and PDCA management mode on ICD-10 encoding.Material and Method:a retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.AIM To study the adoption of network and PDCA in the ICD-10.METHODS A retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.RESULTS In the 3,6,12,18,and 24 months of PDCA cycle management mode,the coding accuracy and medical record completion rate were higher,and the coding time was lower in the observation group as against the controls(P<0.05).The satisfaction of coders(80.22%vs 53.45%)and patients(84.89%vs 51.72%)in the observation group was markedly higher as against the controls(P<0.05).CONCLUSION The combination of computer networks and PDCA can improve the accuracy,efficiency,completion rate,and satisfaction of ICD-10 coding.展开更多
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
文摘With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
文摘The length of data frame is an important parameter in Medium Access Control(MAC) layer protocol. A method of finding the optimal length of data frame when impulsive disturbance is involved in PowerLine Communications (PLC) is proposed. Having analyzed the characteristics of impulsive disturbance in powerline and the collision mechanism between the disturbance and data frame, this letter gives the function of the network channel utilization with the length of data frame in MAC layer and the impulsive disturbance. Our stochastic process simulation shows that it is feasible to get the optimal length of data frame.
文摘With the rapid development of computer network,the society has entered the information and digital era,it plays an important role in speeding up the pace of social development and providing more convenient services for people.However, the security problem of computer network is becoming more and more serious. All kinds of network viruses pose a great threat to the security of computer network.As the most advanced data processing technology currently, data mining technology can effectively resist the invasion of network virus to computer system,and plays an important role in improving the security of the computer network.This paper starts with the concept of data mining technology and the characteristics of computer network virus,and makes an in-depth analysis on the specific application of data mining technology in the computer network virus defense.
文摘In this era of accelerated pace of life, high efficiency and superior quality has undoubtedly become the focus of attention. In this context, the computer has been the core component of our daily production, life and entertainment. In fact, the vast majority of modem areas cannot be separated from the computer, if separated from the computer, these areas are likely to be subject to enormous challenges and threats, so people and computer dependence are increasing. With the advent of the Internet era, the network and the economic, trade, cultural exchanges and other activities related to the increasingly problematic. The computer network remote control system is a new kind of multimedia network control system Network platform to carry out related construction. In this paper, the application of computer network remote control system as the core of the study, hoping to provide help for the majority of technical staff.
文摘With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. This paper gives a introduction to a simple computer network, given the reliability of the design criteria for computer network analysis, and finally through the examples to illustrate the computer network hardware and software reliability.
文摘In this paper, we report in-depth analysis and research on the optimizing computer network structure based on genetic algorithm and modified convex optimization theory. Machine learning method has been widely used in the background and one of its core problems is to solve the optimization problem. Unlike traditional batch algorithm, stochastic gradient descent algorithm in each iteration calculation, the optimization of a single sample point only losses could greatly reduce the memory overhead. The experiment illustrates the feasibility of our proposed approach.
文摘In this paper, we conduct research on the novel computer network intrusion detection model based on improved particle swarmoptimization algorithm. TCP fl ood attack, UDP fl ood attack, ICMP fl ood attack, deformity of message attack, the application layer attack is themost typical DDOS attacks, DDOS attacks are also changing to upgrade at the same time, scholars research on DDOS attack defense measuresbecome more and more has the application value and basic practical signifi cance. Network security protection is a comprehensive project, nomatter what measures to take that safety is always relative, so as the network security administrator, should change with the network securitysituation and the security requirements, moderate to adjust security policies, so as to achieve the target. Under this basis, we propose the newperspective on the IDS system that will then enhance the robustness and safetiness of the overall network system.
文摘As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the research field of the theory and application of artificial intelligence technology covers almost all the areas of human activity. In recent years, the rapid development of computer network technology produces and drives a batch of new scientific research fields. Among them, the application of artificial intelligence in the computer network technology is a hot topic which is academically and technically strong and can bring obvious economic benefit.
文摘With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.
文摘In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.
文摘With the developing of the computer, the network is more and more liked by the users. It has become an indispensable part of the living and production. However, with the expanding of network scale, there have been some problems in the operation of the network system. Most of people lack of understanding on these issues, so they couldn' t handle them well. Some people use the theory of phase transitions to explain the power law phenomena in computer network. But it only start from the theory, but ignores the correlation of network nodes. The lack of holistic thinking mode, make the development of computer network get into a stray area. This paper started from the phase transition theory, elaborated the connotations of phase transformation and the overall correlation, and described the problems about them.
文摘After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed.
文摘This paper discussed the application strategy of the computer network technology in the electronic information engineering. The use of computer network management technology, designed to maximize the effectiveness of computer network operations, while ensuring network management security. With the advent of the digital age, the computer network has been basically popular, so the computer network management technology research value and application value is more prominent become a digital information technology research one of the hot spots.. Good antivirus software can be easily installed in a few minutes to each NT server in the organization, and can be downloaded and distributed to all the target machine, set by the network administrator and management, it will work with the operating system and other security measures are tightly integrated to become part of the network security management, and automatically provide the best network virus defense measures. In the future, more integration of the methodologies will be considered and discussed.
文摘The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC).
基金The 2021 Heilongjiang Education Scientific Planning Key Projects"Research and Practice of‘Multi-Course Fusion’Online and Ofifline Hybrid Teaching Mode Based on Improving Employment Competitiveness-Taking Computer Basic Course as An Example"(Project Number:GJB1421199 and GJB1422190)The 2019 Teaching Research Project of Heilongjiang Bayi Agricultural University"Online and Offline Hybrid Teaching of Office Automation Course"(Project Number:NDJY1918)The 2021 Teaching Research Project of Heilongjiang Bayi Agricultural University"Machine Learning Course Based on Case Teaching in Application Exploration of Big Data Specialty"(Project Number:NDJY2121)。
文摘The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main objective of the course is to train students to have various skills,including those of enterprise scale network construction,network management,and network maintenance.Influenced by traditional teaching for a long time,the existing teaching of the course in colleges and universities urgently needs reform;otherwise,it will not be able to meet the social demand for talents in the new era.This paper focuses on the practical problems of the Computer Network teaching reform and proposes some efiective reform suggestions,hoping to engender an efficient link among the Computer Network course teaching,talent training,and the social needs in colleges and universities.
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
文摘BACKGROUND with the widespread application of computer network systems in the medical field,the plan-do-check-action(PDCA)and the international classification of diseases tenth edition(ICD-10)coding system have also achieved favorable results in clinical medical record management.However,research on their combined application is relatively lacking.Objective:it was to explore the impact of network systems and PDCA management mode on ICD-10 encoding.Material and Method:a retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.AIM To study the adoption of network and PDCA in the ICD-10.METHODS A retrospective collection of 768 discharged medical records from the Medical Record Management Department of Meishan People’s Hospital was conducted.They were divided into a control group(n=232)and an observation group(n=536)based on whether the PDCA management mode was implemented.The two sets of coding accuracy,time spent,case completion rate,satisfaction,and other indicators were compared.RESULTS In the 3,6,12,18,and 24 months of PDCA cycle management mode,the coding accuracy and medical record completion rate were higher,and the coding time was lower in the observation group as against the controls(P<0.05).The satisfaction of coders(80.22%vs 53.45%)and patients(84.89%vs 51.72%)in the observation group was markedly higher as against the controls(P<0.05).CONCLUSION The combination of computer networks and PDCA can improve the accuracy,efficiency,completion rate,and satisfaction of ICD-10 coding.