期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
A Practical Study of Big Data Technology in Computer Network Information Security Processing
1
作者 Kongduo Xing 《Journal of Electronic Research and Application》 2023年第6期36-41,共6页
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in... In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology. 展开更多
关键词 Big data technology computer network Information security
下载PDF
Mobile Network Computer Can Better Describe The Future of Information Society 被引量:1
2
作者 Zhaoming Guo Yi Jiang Shihua Bi 《China Communications》 SCIE CSCD 2016年第12期90-96,共7页
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ... In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society. 展开更多
关键词 mobile computer network mobile network computer mobile communication network WAP IMS
下载PDF
Analytical Investigation on Computer Network Security System of Colleges and Universities
3
作者 徐悦 《电脑知识与技术(过刊)》 2013年第1X期266-268,共3页
With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management cond... With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction. 展开更多
关键词 Colleges and Universities computer network Security System PREVENTION
下载PDF
Research on the Application of Computer Network Technology in Electronic Information Engineering 被引量:1
4
作者 Zhiwu Cui 《Journal of Electronic Research and Application》 2022年第3期1-5,共5页
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g... Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering. 展开更多
关键词 computer network technology Electronic information engineering Application and management
下载PDF
Research on the Application of Big Data and Artificial Intelligence Technology in Computer Network
5
作者 Hongfei Wang 《Modern Electronic Technology》 2020年第2期21-25,共5页
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ... With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology. 展开更多
关键词 Big data era Artificial intelligence computer network technology Practical application
下载PDF
Research on Computer Network Can and Performance Asalysis
6
作者 Pan Qijing Yang Yonggao Wang Yu(Department of Computer Science,Southwest Jiaotong University, Chengdu 610031,China) 《Journal of Modern Transportation》 1994年第1期1-6,共6页
After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set o... After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed. 展开更多
关键词 computer network CAD network performance
下载PDF
CAS COMPUTER NETWORK INFORMATION CENTER
7
《Bulletin of the Chinese Academy of Sciences》 1996年第2期179-181,共3页
The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key pro... The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC). 展开更多
关键词 NET FTP CAS computer network INFORMATION CENTER CNIC CMC
下载PDF
Research on the Teaching Reform of Computer Network in the New Era
8
作者 Ling Liu Tiemin Ma +3 位作者 Xue Wang Zhengguang Chen Aichuan Li Nan Xu 《Journal of Contemporary Educational Research》 2022年第5期8-13,共6页
The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main ob... The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main objective of the course is to train students to have various skills,including those of enterprise scale network construction,network management,and network maintenance.Influenced by traditional teaching for a long time,the existing teaching of the course in colleges and universities urgently needs reform;otherwise,it will not be able to meet the social demand for talents in the new era.This paper focuses on the practical problems of the Computer Network teaching reform and proposes some efiective reform suggestions,hoping to engender an efficient link among the Computer Network course teaching,talent training,and the social needs in colleges and universities. 展开更多
关键词 Colleges and universities computer network TEACHING REFORM METHOD
下载PDF
A Research on the Application of Virtual Network Technology in Computer Network Security
9
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 Virtual network technology computer network security Application research
下载PDF
Computer-assisted English Teaching Model in Academic Writing:A Case Study of Three-Stage Development
10
作者 胡曦 《海外英语》 2020年第20期263-265,共3页
This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then t... This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing. 展开更多
关键词 computer network technology college English teaching mode
下载PDF
HUSTserver:Implementation for Reliable and High-Performance Network Attached Storage System 被引量:2
11
作者 郭辉 周敬利 余胜生 《Journal of Shanghai University(English Edition)》 CAS 2003年第2期156-162,共7页
Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive area... Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility. 展开更多
关键词 storage systems network attached storage computer network channel bonding data mirroring.
下载PDF
Some Issues on Computer Networks:Architecture and Key Technologies 被引量:2
12
作者 顾冠群 罗军舟 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第5期708-722,共15页
The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high perfo... The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies. 展开更多
关键词 computer network tussle resource control network management SECURITY MIDDLEWARE wireless/mobile network modeling high availability network
原文传递
Multicast routing algorithm of multiple QoS based on widest-bandwidth 被引量:4
13
作者 Chen Niansheng Li Layuan Dong Wushi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期642-647,共6页
A multicast routing algorithm of multiple QoS constraints based on widest-bandwidth (MRQW) which takes available bandwidth as the prime metric, considering the constraints of the surplus energy of the node, delay an... A multicast routing algorithm of multiple QoS constraints based on widest-bandwidth (MRQW) which takes available bandwidth as the prime metric, considering the constraints of the surplus energy of the node, delay and delay jitter, is presented. The process of routing based on MRQW is provided for as well. Correctness proof and the complexity analysis of the MRQW are also given in the paper. Simulation results show that the MRQW has a good performance in creating multicast trees. It not only satisfys multiple QoS constraints but also makes multicast links have larger available bandwidth 展开更多
关键词 computer network Ad hoc networks QoS multicast routing available bandwidth.
下载PDF
SYSTEM RELIABILITY OF ASSURED ACCURACY RATE FOR MULTI-STATE COMPUTER NETWORKS FROM SERVICE LEVEL AGREEMENTS VIEWPOINT 被引量:1
14
作者 Yi-Kuei Lin Cheng Fu Huang 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2014年第2期196-211,共16页
From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc... From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc's capacity is deterministic, the quickest path problem is to find a path sending a specific of data such that the transmission time is minimized. However, in many real-life networks such as computer networks, each arc has stochastic capacity, lead time and accuracy rate. Such a network is named a multi-state computer network. Under both assured accuracy rate and time constraints, we extend the quickest path problem to compute the probability that d units of data can be sent through multiple minimal paths simultaneously. Such a probability named system reliability is a performance indicator to provide to managers for understanding the ability of system and improvement. An efficient algorithm is proposed to evaluate the system reliability in terms of the approach of minimal paths. 展开更多
关键词 Assured accuracy rate service level agreement (SLA) transmission time multi-state computer network (MSCN) system reliability
原文传递
General Design of Rural Area Electricity Management Information System Based on Intranet
15
作者 WANG Xing fen (Northeast Agricultural University, Harbin 150030,PRC) 《Journal of Northeast Agricultural University(English Edition)》 CAS 2000年第1期29-32,共4页
Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture i... Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture is proposed.The advantages of new system include uniform user interface friendly,quick and accurate database accessing,and easy maintenance. 展开更多
关键词 rural area electucity management INTRANET computer network ASP
下载PDF
A New Adaptive Regularization Parameter Selection Based on Expected Patch Log Likelihood
16
作者 Jianwei Zhang Ze Qin Shunfeng Wang 《Journal of Cyber Security》 2020年第1期25-36,共12页
Digital images have been applied to various areas such as evidence in courts.However,it always suffers from noise by criminals.This type of computer network security has become a hot issue that can’t be ignored.In th... Digital images have been applied to various areas such as evidence in courts.However,it always suffers from noise by criminals.This type of computer network security has become a hot issue that can’t be ignored.In this paper,we focus on noise removal so as to provide guarantees for computer network security.Firstly,we introduce a well-known denoising method called Expected Patch Log Likelihood(EPLL)with Gaussian Mixture Model as its prior.This method achieves exciting results in noise removal.However,there remain problems to be solved such as preserving the edge and meaningful details in image denoising,cause it considers a constant as regularization parameter so that we denoise with the same strength on the whole image.This leads to a problem that edges and meaningful details may be oversmoothed.Under the consideration of preserving edges of the image,we introduce a new adaptive parameter selection based on EPLL by the use of the image gradient and variance,which varies with different regions of the image.Moreover,we add a gradient fidelity term to relieve staircase effect and preserve more details.The experiment shows that our proposed method proves the effectiveness not only in vision but also on quantitative evaluation. 展开更多
关键词 computer network security image denoising EPLL adaptive parameter EDGES
下载PDF
Analysis and Implementation of an Open Programmable Router Based on Forwarding and Control Element Separation 被引量:4
17
作者 王伟明 董黎刚 诸葛斌 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第5期769-779,共11页
A router architecture based upon ForCES (Forwarding and Control Element Separation), which is being standardized by IETF ForCES working group, gains its competitive advantage over traditional router architectures in... A router architecture based upon ForCES (Forwarding and Control Element Separation), which is being standardized by IETF ForCES working group, gains its competitive advantage over traditional router architectures in flexibility, programmability, and cost-effectiveness. In this paper, design and implementation of a ForCES-based router (ForTER) is illustrated. Firstly, the implementation architecture of ForTER is discussed. Then, a layered software model, which well illustrates ForCES features, is proposed. Based on the model, design and implementation of Control Element (CE) and Forwarding Element (FE) in ForTER are introduced in detail. Moreover, security for ForTER is considered and an algorithm to prevent DoS attacks is presented. Lastly, experiments of ForTER are illustrated for routing and running routing protocols, network management, DoS attack prevention, etc. The experimental results show the feasibility of the ForTER design. Consequently, the ForTER implementation basically testifies the feasibility of ForCES architecture and some IETF ForCES specifications. 展开更多
关键词 computer network ROUTER FORCES open programmable PROTOCOL architecture network element
原文传递
The Review of China Post's Informationizing Constructing 被引量:1
18
作者 WANG Wei-min DU Yu-wei SUN Hao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第3期101-104,共4页
The article briefly introduces the three stages that China Post experienced and the circumstances of the fundamental network construction, focusing on introducing the three sorts of services based on postal comprehens... The article briefly introduces the three stages that China Post experienced and the circumstances of the fundamental network construction, focusing on introducing the three sorts of services based on postal comprehensive computer network's applicable software system : postal financial service ; traditional service electrified ; electronic postal service. Finally the thinking for future China Post's informationizing constructing is put forward. 展开更多
关键词 Post informationizing postal comprehensive computer network fundamental network construction software system application
原文传递
Parallel Algorithm Core: A Novel IPSec Algorithm Engine for Both Exploiting Parallelism and Improving Scalability
19
作者 程东年 胡宇翔 刘彩霞 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第5期792-805,共14页
To deal with the challenges of both computation-complexity and algorithm-scalability posed to the design of an IPSec engine, we develop PAC (parallel algorithm core), called PAC, employed in an IPSec engine, which c... To deal with the challenges of both computation-complexity and algorithm-scalability posed to the design of an IPSec engine, we develop PAC (parallel algorithm core), called PAC, employed in an IPSec engine, which can meet requirements of both exploiting parallelism existing in IPSec packets and offering scalability in both the scales and types of cryptographic algorithms. With three kinds of parallelism and two kinds of transparency defined, a novel hierarchy of the specifically-designed parallel structure for PAC is presented, followed by corresponding mechanisms. With a simulation, the scalability of PAC is examined. For the purpose of performance evaluation, a Quasi Birth-and-Death (QBD) process is then established to model a simplified version of the proposed PAC. Performance evaluation of PAC in terms of two representative measures, throughput and mean packet waiting time, is numerically investigated. A comparison study is done on a simulation basis. Conclusions are finally drawn for providing a helpful guideline for both the design and implementation of our proposal. 展开更多
关键词 computer network architecture IPSEC queuing theory parallel processing numerical analysis
原文传递
A Traffic Partition Algorithm for Switched LANs and Its Performance Analysis
20
作者 丁伟 龚俭 余晓 《Journal of Computer Science & Technology》 SCIE EI CSCD 1998年第3期261-267,共7页
An algorithm is proposed which can be used for the topology design of switched LAN with heavy traffic and multi-segments. The main principle of the algorithm is to split the whole traffic to segments as even as possib... An algorithm is proposed which can be used for the topology design of switched LAN with heavy traffic and multi-segments. The main principle of the algorithm is to split the whole traffic to segments as even as possible. The algorithm consists of binary division and ordinary division. When the number of segments equals to powers of 2, binary division is used; ordinary division is based on binary division but suitable to more common cases. Both correctness and time complexity of the algorithm are discussed in detail, and a comparison of the algorithm with the best result is given at the same time. 展开更多
关键词 computer network network design ALGORITHM switched LAN
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部