期刊文献+
共找到516,255篇文章
< 1 2 250 >
每页显示 20 50 100
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
1
作者 Ackim Lutepo Kai Zhang 《Communications and Network》 2024年第3期90-107,共18页
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni... Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology. 展开更多
关键词 Artificial Intelligence network Technology Internet of Things (IoT) CYBERSECURITY Mobile Communication
下载PDF
Application of virtual reality technology improves the functionality of brain networks in individuals experiencing pain
2
作者 Takahiko Nagamine 《World Journal of Clinical Cases》 SCIE 2025年第3期66-68,共3页
Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the u... Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the use of virtual reality(VR)technology.VR has been demonstrated to be an effective treatment for pain associated with medical procedures,as well as for chronic pain conditions for which no effective treatment has been established.The precise mechanism by which the diversion from reality facilitated by VR contributes to the diminution of pain and anxiety has yet to be elucidated.However,the provision of positive images through VR-based visual stimulation may enhance the functionality of brain networks.The salience network is diminished,while the default mode network is enhanced.Additionally,the medial prefrontal cortex may establish a stronger connection with the default mode network,which could result in a reduction of pain and anxiety.Further research into the potential of VR technology to alleviate pain could lead to a reduction in the number of individuals who overdose on painkillers and contribute to positive change in the medical field. 展开更多
关键词 Virtual reality PAIN ANXIETY Salience network Default mode network
下载PDF
Cutting-Edge Challenges in Communication Technology and Computer Network Security
3
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 Communication technology computer network SECURITY
下载PDF
Computer Network and Database Security Technology Optimization
4
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 computer network and database Security technology Optimized path
下载PDF
Unlocking the future:Mitochondrial genes and neural networks in predicting ovarian cancer prognosis and immunotherapy response
5
作者 Zhi-Jian Tang Yuan-Ming Pan +2 位作者 Wei Li Rui-Qiong Ma Jian-Liu Wang 《World Journal of Clinical Oncology》 2025年第1期43-52,共10页
BACKGROUND Mitochondrial genes are involved in tumor metabolism in ovarian cancer(OC)and affect immune cell infiltration and treatment responses.AIM To predict prognosis and immunotherapy response in patients diagnose... BACKGROUND Mitochondrial genes are involved in tumor metabolism in ovarian cancer(OC)and affect immune cell infiltration and treatment responses.AIM To predict prognosis and immunotherapy response in patients diagnosed with OC using mitochondrial genes and neural networks.METHODS Prognosis,immunotherapy efficacy,and next-generation sequencing data of patients with OC were downloaded from The Cancer Genome Atlas and Gene Expression Omnibus.Mitochondrial genes were sourced from the MitoCarta3.0 database.The discovery cohort for model construction was created from 70% of the patients,whereas the remaining 30% constituted the validation cohort.Using the expression of mitochondrial genes as the predictor variable and based on neural network algorithm,the overall survival time and immunotherapy efficacy(complete or partial response)of patients were predicted.RESULTS In total,375 patients with OC were included to construct the prognostic model,and 26 patients were included to construct the immune efficacy model.The average area under the receiver operating characteristic curve of the prognostic model was 0.7268[95% confidence interval(CI):0.7258-0.7278]in the discovery cohort and 0.6475(95%CI:0.6466-0.6484)in the validation cohort.The average area under the receiver operating characteristic curve of the immunotherapy efficacy model was 0.9444(95%CI:0.8333-1.0000)in the discovery cohort and 0.9167(95%CI:0.6667-1.0000)in the validation cohort.CONCLUSION The application of mitochondrial genes and neural networks has the potential to predict prognosis and immunotherapy response in patients with OC,providing valuable insights into personalized treatment strategies. 展开更多
关键词 Ovarian cancer MITOCHONDRIA PROGNOSIS IMMUNOTHERAPY Neural network
下载PDF
Resting-state brain network remodeling after different nerve reconstruction surgeries:a functional magnetic resonance imaging study in brachial plexus injury rats
6
作者 Yunting Xiang Xiangxin Xing +6 位作者 Xuyun Hua Yuwen Zhang Xin Xue Jiajia Wu Mouxiong Zheng He Wang Jianguang Xu 《Neural Regeneration Research》 SCIE CAS 2025年第5期1495-1504,共10页
Distinct brain remodeling has been found after different nerve reconstruction strategies,including motor representation of the affected limb.However,differences among reconstruction strategies at the brain network lev... Distinct brain remodeling has been found after different nerve reconstruction strategies,including motor representation of the affected limb.However,differences among reconstruction strategies at the brain network level have not been elucidated.This study aimed to explore intranetwork changes related to altered peripheral neural pathways after different nerve reconstruction surgeries,including nerve repair,endto-end nerve transfer,and end-to-side nerve transfer.Sprague–Dawley rats underwent complete left brachial plexus transection and were divided into four equal groups of eight:no nerve repair,grafted nerve repair,phrenic nerve end-to-end transfer,and end-to-side transfer with a graft sutured to the anterior upper trunk.Resting-state brain functional magnetic resonance imaging was obtained 7 months after surgery.The independent component analysis algorithm was utilized to identify group-level network components of interest and extract resting-state functional connectivity values of each voxel within the component.Alterations in intra-network resting-state functional connectivity were compared among the groups.Target muscle reinnervation was assessed by behavioral observation(elbow flexion)and electromyography.The results showed that alterations in the sensorimotor and interoception networks were mostly related to changes in the peripheral neural pathway.Nerve repair was related to enhanced connectivity within the sensorimotor network,while end-to-side nerve transfer might be more beneficial for restoring control over the affected limb by the original motor representation.The thalamic-cortical pathway was enhanced within the interoception network after nerve repair and end-to-end nerve transfer.Brain areas related to cognition and emotion were enhanced after end-to-side nerve transfer.Our study revealed important brain networks related to different nerve reconstructions.These networks may be potential targets for enhancing motor recovery. 展开更多
关键词 brain functional networks end-to-end nerve transfer end-to-side nerve transfer independent component analysis nerve repair peripheral plexus injury resting-state functional connectivity
下载PDF
FAULT LOCATION AND RECORDING SYSTEM OF TRANSMISSION LINES BASED ON COMPUTER NETWORK 被引量:1
7
作者 贺家李 孙雅明 贺继红 《Transactions of Tianjin University》 EI CAS 1997年第1期17-23,共7页
In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location ... In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location method for extra high voltage and long distance transmission lines. 展开更多
关键词 computer network fault location recording system
下载PDF
Computer Network Control System in Automatic Automobile Detection
8
作者 高岩 窦丽华 +1 位作者 高琪 周宁 《Journal of Beijing Institute of Technology》 EI CAS 2001年第4期406-411,共6页
An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating r... An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating redundant design in work position substituting are presented. At last, the pivotal questions solved are discussed. With an advanced structure, this system is multi functional and flexible. Furthermore, advanced computer technology is adopted to improve its technical degree. 展开更多
关键词 computer control system local network automobile test error tolerance
下载PDF
Computer vision-based limestone rock-type classification using probabilistic neural network 被引量:18
9
作者 Ashok Kumar Patel Snehamoy Chatterjee 《Geoscience Frontiers》 SCIE CAS CSCD 2016年第1期53-60,共8页
Proper quality planning of limestone raw materials is an essential job of maintaining desired feed in cement plant. Rock-type identification is an integrated part of quality planning for limestone mine. In this paper,... Proper quality planning of limestone raw materials is an essential job of maintaining desired feed in cement plant. Rock-type identification is an integrated part of quality planning for limestone mine. In this paper, a computer vision-based rock-type classification algorithm is proposed for fast and reliable identification without human intervention. A laboratory scale vision-based model was developed using probabilistic neural network(PNN) where color histogram features are used as input. The color image histogram-based features that include weighted mean, skewness and kurtosis features are extracted for all three color space red, green, and blue. A total nine features are used as input for the PNN classification model. The smoothing parameter for PNN model is selected judicially to develop an optimal or close to the optimum classification model. The developed PPN is validated using the test data set and results reveal that the proposed vision-based model can perform satisfactorily for classifying limestone rocktypes. Overall the error of mis-classification is below 6%. When compared with other three classification algorithms, it is observed that the proposed method performs substantially better than all three classification algorithms. 展开更多
关键词 Supervised classification Probabilistic neural network Histogram based features Smoothing parameter LIMESTONE
下载PDF
COMPUTER SIMULATION OF NEURAL NETWORK CONTROL SYSTEM FOR CO_2 WELDING PROCESS 被引量:3
10
作者 D. Fan B. Li Y.Z. Ma and J.H. Chen (Welding Institute, Gansu University of Technology,Lanzhou 730050, China) 《Acta Metallurgica Sinica(English Letters)》 SCIE EI CAS CSCD 2000年第1期187-193,共7页
In this paper, neural network control systems for decreasing the spatter of CO2 welding have been created. The Generalized inverse Learning Architecture(GILA), the SPecialized inverse Learning Architecture(SILA)-I &a... In this paper, neural network control systems for decreasing the spatter of CO2 welding have been created. The Generalized inverse Learning Architecture(GILA), the SPecialized inverse Learning Architecture(SILA)-I & H and the Error Back Propagating Model(EBPM) are adopted respectively to simulate the static and dynamic welding control processes. The results of simulation and experiment show that the SILA-I and EBPM have betted properties. The factors affecting the simulating results and the dynamic response quality have also been analyzed. 展开更多
关键词 welding spatter neural network control SIMULATION
下载PDF
Mobile Network Computer Can Better Describe The Future of Information Society 被引量:1
11
作者 Zhaoming Guo Yi Jiang Shihua Bi 《China Communications》 SCIE CSCD 2016年第12期90-96,共7页
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ... In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society. 展开更多
关键词 mobile computer network mobile network computer mobile communication network WAP IMS
下载PDF
Dynamic Routing Protocol for Computer Networkswith Clustering Topology 被引量:2
12
作者 Li, Layuan Li, Chunlin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第1期44-53,共10页
This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering... This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology. 展开更多
关键词 Computational complexity computer simulation Dynamic programming network protocols TOPOLOGY
下载PDF
4K-DMDNet:diffraction model-driven network for 4K computer-generated holography 被引量:12
13
作者 Kexuan Liu Jiachen Wu +1 位作者 Zehao He Liangcai Cao 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2023年第5期17-29,共13页
Deep learning offers a novel opportunity to achieve both high-quality and high-speed computer-generated holography(CGH).Current data-driven deep learning algorithms face the challenge that the labeled training dataset... Deep learning offers a novel opportunity to achieve both high-quality and high-speed computer-generated holography(CGH).Current data-driven deep learning algorithms face the challenge that the labeled training datasets limit the training performance and generalization.The model-driven deep learning introduces the diffraction model into the neural network.It eliminates the need for the labeled training dataset and has been extensively applied to hologram generation.However,the existing model-driven deep learning algorithms face the problem of insufficient constraints.In this study,we propose a model-driven neural network capable of high-fidelity 4K computer-generated hologram generation,called 4K Diffraction Model-driven Network(4K-DMDNet).The constraint of the reconstructed images in the frequency domain is strengthened.And a network structure that combines the residual method and sub-pixel convolution method is built,which effectively enhances the fitting ability of the network for inverse problems.The generalization of the 4K-DMDNet is demonstrated with binary,grayscale and 3D images.High-quality full-color optical reconstructions of the 4K holograms have been achieved at the wavelengths of 450 nm,520 nm,and 638 nm. 展开更多
关键词 computer-generated holography deep learning model-driven neural network sub-pixel convolution OVERSAMPLING
下载PDF
Enhance Intrusion Detection in Computer Networks Based on Deep Extreme Learning Machine 被引量:3
14
作者 Muhammad Adnan Khan Abdur Rehman +2 位作者 Khalid Masood Khan Mohammed A.Al Ghamdi Sultan H.Almotiri 《Computers, Materials & Continua》 SCIE EI 2021年第1期467-480,共14页
Networks provide a significant function in everyday life,and cybersecurity therefore developed a critical field of study.The Intrusion detection system(IDS)becoming an essential information protection strategy that tr... Networks provide a significant function in everyday life,and cybersecurity therefore developed a critical field of study.The Intrusion detection system(IDS)becoming an essential information protection strategy that tracks the situation of the software and hardware operating on the network.Notwithstanding advancements of growth,current intrusion detection systems also experience difficulties in enhancing detection precision,growing false alarm levels and identifying suspicious activities.In order to address above mentioned issues,several researchers concentrated on designing intrusion detection systems that rely on machine learning approaches.Machine learning models will accurately identify the underlying variations among regular information and irregular information with incredible efficiency.Artificial intelligence,particularly machine learning methods can be used to develop an intelligent intrusion detection framework.There in this article in order to achieve this objective,we propose an intrusion detection system focused on a Deep extreme learning machine(DELM)which first establishes the assessment of safety features that lead to their prominence and then constructs an adaptive intrusion detection system focusing on the important features.In the moment,we researched the viability of our suggested DELMbased intrusion detection system by conducting dataset assessments and evaluating the performance factors to validate the system reliability.The experimental results illustrate that the suggested framework outclasses traditional algorithms.In fact,the suggested framework is not only of interest to scientific research but also of functional importance. 展开更多
关键词 Intrusion detection system DELM network security machine learning
下载PDF
K-Banhatti Sombor Invariants of Certain Computer Networks 被引量:1
15
作者 Khalid Hamid Muhammad Waseem Iqbal +4 位作者 Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi 《Computers, Materials & Continua》 SCIE EI 2022年第10期15-31,共17页
Any number that can be uniquely determined by a graph is called a graph invariant.During the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation analysis.How... Any number that can be uniquely determined by a graph is called a graph invariant.During the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation analysis.However,no reliable examination has been embraced to decide,how much these invariants are related with a network graph or molecular graph.In this paper,it will discuss three different variants of bridge networks with good potential of prediction in the field of computer science,mathematics,chemistry,pharmacy,informatics and biology in context with physical and chemical structures and networks,because k-banhatti sombor invariants are freshly presented and have numerous prediction qualities for different variants of bridge graphs or networks.The study solved the topology of a bridge graph/networks of three different types with two invariants KBanhatti Sombor Indices and its reduced form.These deduced results can be used for the modeling of computer networks like Local area network(LAN),Metropolitan area network(MAN),and Wide area network(WAN),backbone of internet and other networks/structures of computers,power generation,bio-informatics and chemical compounds synthesis. 展开更多
关键词 Bridge networks INVARIANTS k-banhatti sombor indices MAPLE network graph molecular graph
下载PDF
How Do the Evolution and Innovation of Social Network Analysis Matter to Computer Science and Communications? 被引量:1
16
作者 Romana Xerez 《Social Networking》 2013年第3期147-151,共5页
This paper provides a comprehensive overview of evolution and innovation in social network analysis to the paradigm of social networking. It explains how the development of sociological theory and the structural prope... This paper provides a comprehensive overview of evolution and innovation in social network analysis to the paradigm of social networking. It explains how the development of sociological theory and the structural properties of social groups matter to computer science and communications. Authors such as Moreno, John Barnes and Harrison C. White provide evidence of a growing body of literature addressing the networking of people, organizations and communities to explain the structure of society. This perspective has passed from sociology to other fields, changing understandings of social phenomena. Social networks remain a potent concept for analyzing computer science and communications. This paper shows how and why this has occurred and examines substantive areas in which social network analysis has been applied—mainly how the advantages of graphic visualization and computer software packages have influenced SNA in different audiences and publics leading to the unfolding of social networking to different audiences and publics. 展开更多
关键词 SOCIAL network Analysis Theory PARADIGM Software
下载PDF
Computer Assisted Language Learning Social Networks: What Are They Talking about? 被引量:1
17
作者 Andrew Laghos Efi Nisiforou 《Social Networking》 2018年第3期170-180,共11页
There are many reasons that motivate people to build online communities. The purpose of this study was to identify the topics that learners discuss when they are part of a computer assisted language learning course in... There are many reasons that motivate people to build online communities. The purpose of this study was to identify the topics that learners discuss when they are part of a computer assisted language learning course in order to answer the question “What are they talking about?”. We have examined an e-community of 618 students who were learning the Modern Greek language online. We analyzed their conversation topics directly from the discussion boards of the web-based course and sorted them into the pre-defined topic categories. The results of the study showed that during the first lessons of the course the students contributed more to social discussions which were unrelated to the course material. The reason of this outcome is that the students want to introduce themselves and meet their peers. As they progressed through the course’s lessons, however, their discussion topics became more course material related. The study ends with implications of the results and future research directions. 展开更多
关键词 computer Assisted Language Learning SOCIAL networks Students’ Discussion TOPICS
下载PDF
Computer modeling of high-pressure leaching process of nickel laterite by design of experiments and neural networks 被引量:1
18
作者 Milovan Milivojevic Srecko Stopic +2 位作者 Bernd Friedrich Boban Stojanovic Dragoljub Drndarevic 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2012年第7期584-594,共11页
Due to the complex chemical composition of nickel ores, the requests for the decrease of production costs, and the increase of nickel extraction in the existing depletion of high-grade sulfide ores around the world, c... Due to the complex chemical composition of nickel ores, the requests for the decrease of production costs, and the increase of nickel extraction in the existing depletion of high-grade sulfide ores around the world, computer modeling of nickel ore leaching process be- came a need and a challenge. In this paper, the design of experiments (DOE) theory was used to determine the optimal experimental design plan matrix based on the D optimality criterion. In the high-pressure sulfuric acid leaching (HPSAL) process for nickel laterite in "Rudjinci" ore in Serbia, the temperature, the sulfuric acid to ore ratio, the stirring speed, and the leaching time as the predictor variables, and the degree of nickel extraction as the response have been considered. To model the process, the multiple linear regression (MLR) and response surface method (RSM), together with the two-level and four-factor full factorial central composite design (CCD) plan, were used. The proposed re- gression models have not been proven adequate. Therefore, the artificial neural network (ANN) approach with the same experimental plan was used in order to reduce operational costs, give a better modeling accuracy, and provide a more successful process optimization. The model is based on the multi-layer neural networks with the back-propagation (BP) learning algorithm and the bipolar sigmoid activation function. 展开更多
关键词 nickel laterite LEACHING computer simulation design of experiments (DOE) response surface method (RSM) neural networks
下载PDF
Breast Tumor Computer-Aided Detection System Based on Magnetic Resonance Imaging Using Convolutional Neural Network 被引量:3
19
作者 Jing Lu Yan Wu +4 位作者 Mingyan Hu Yao Xiong Yapeng Zhou Ziliang Zhao Liutong Shang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第1期365-377,共13页
Background:The main cause of breast cancer is the deterioration of malignant tumor cells in breast tissue.Early diagnosis of tumors has become the most effective way to prevent breast cancer.Method:For distinguishing ... Background:The main cause of breast cancer is the deterioration of malignant tumor cells in breast tissue.Early diagnosis of tumors has become the most effective way to prevent breast cancer.Method:For distinguishing between tumor and non-tumor in MRI,a new type of computer-aided detection CAD system for breast tumors is designed in this paper.The CAD system was constructed using three networks,namely,the VGG16,Inception V3,and ResNet50.Then,the influence of the convolutional neural network second migration on the experimental results was further explored in the VGG16 system.Result:CAD system built based on VGG16,Inception V3,and ResNet50 has higher performance than mainstream CAD systems.Among them,the system built based on VGG16 and ResNet50 has outstanding performance.We further explore the impact of the secondary migration on the experimental results in the VGG16 system,and these results show that the migration can improve system performance of the proposed framework.Conclusion:The accuracy of CNN represented by VGG16 is as high as 91.25%,which is more accurate than traditional machine learningmodels.The F1 score of the three basic networks that join the secondary migration is close to 1.0,and the performance of the VGG16-based breast tumor CAD system is higher than Inception V3,and ResNet50. 展开更多
关键词 computer-aided diagnosis breast cancer VGG16 convolutional neural network magnetic resonance imaging
下载PDF
Application Research of Computer Network Technology in Mining Railway Transport Management System 被引量:2
20
作者 余静 王振军 才庆祥 《Journal of China University of Mining and Technology》 2002年第1期57-60,共4页
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi... This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given. 展开更多
关键词 mining railway transport management computer network SECURITY reliability
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部