期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
Research on the Application of Computer Network Technology in Electronic Information Engineering 被引量:1
1
作者 Zhiwu Cui 《Journal of Electronic Research and Application》 2022年第3期1-5,共5页
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g... Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering. 展开更多
关键词 computer network technology Electronic information engineering Application and management
下载PDF
Research on the Application of Big Data and Artificial Intelligence Technology in Computer Network
2
作者 Hongfei Wang 《Modern Electronic Technology》 2020年第2期21-25,共5页
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ... With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology. 展开更多
关键词 Big data era Artificial intelligence computer network technology Practical application
下载PDF
A Research on the Application of Virtual Network Technology in Computer Network Security
3
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 Virtual network technology computer network security Application research
下载PDF
Reform of the Course System of Network Security Theory and Technology for Foreign Students in China
4
作者 Hu Xiong Jinhao Chen +1 位作者 Yang Zhao Zhiguang Qin 《计算机教育》 2020年第12期49-52,共4页
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the... Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures. 展开更多
关键词 theory and technology of network security REFORM education of foreign graduate students
下载PDF
OAM Technology of Packet Transport Network 被引量:1
5
作者 He Tingzong(ZTE Corporation,Shenzhen 518005,P.R.China) 《ZTE Communications》 2009年第1期33-35,共3页
The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It... The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions. 展开更多
关键词 OAM technology of Packet Transport network PBT PTN MPLS
下载PDF
Ring Network Technology for Carrier Ethernet
6
作者 Zhang Yongjun,Yao Yu,Gu Wanyi(Key Laboratory of Optical Communication and Lightwave Technologies,Ministry of Education,Beijing University of Posts and Telecommunications,Beijing 100876,P.R.China) 《ZTE Communications》 2009年第1期21-24,共4页
The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies... The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies are introduced into the Metropolitan Area Network(MAN).Ring network control protocols and ring network protection technologies are applied to guarantee manageability and reliability required in the telecom networks.The Ethernet Ring Protection(ERP) and Resilient Packet Ring(RPR) are two different ring protection technologies.The Transport Multi-Protocol Label Switching(T-MPLS) network uses the T-MPLS Shared Protection Ring(TM-SPRing) technology to provide ring protection.Carriers can expand the protection as needed and use appropriate ring technologies to meet the requirements of Carrier Ethernet(CE). 展开更多
关键词 MPLS 电信级以太网 RPR Ring network technology for Carrier Ethernet NODE link 城域网 市域网 计算机网络 EAPS
下载PDF
Next Generation Network Enabled by ZTE's Softswitch Technology
7
作者 Yah Hua L Xuhong (Nanjing R&D Center of ZTE Corporation,Nanjing 210012,China) 《ZTE Communications》 2003年第1期26-28,共3页
Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evo... Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evolution and convergenceof current communication networks. It also fol- 展开更多
关键词 ZTE of WORK IT on Next Generation network Enabled by ZTE’s Softswitch technology by
下载PDF
Application of GIS and GPS technologies in managing a statewide groundwater monitoring and assessment network in the state of Minnesota,USA
8
《Global Geology》 1998年第1期85-85,共1页
关键词 GIS GPS Application of GIS and GPS technologies in managing a statewide groundwater monitoring and assessment network in the state of Minnesota USA USA
下载PDF
Computer-assisted English Teaching Model in Academic Writing:A Case Study of Three-Stage Development
9
作者 胡曦 《海外英语》 2020年第20期263-265,共3页
This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then t... This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing. 展开更多
关键词 computer network technology college English teaching mode
下载PDF
Prediction Model of Weekly Retail Price for Eggs Based on Chaotic Neural Network 被引量:3
10
作者 LI Zhe-min CUI Li-guo +4 位作者 XU Shi-wei WENG Ling-yun DONG Xiao-xia LI Gan-qiong YU Hai-peng 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2013年第12期2292-2299,共8页
This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of... This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of determining the structure of the chaotic neural network,the number of input layer nodes of the network is calculated by reconstructing phase space and computing its saturated embedding dimension,and then the number of hidden layer nodes is estimated by trial and error.Finally,this model is applied to predict the retail prices of eggs and compared with ARIMA.The result shows that the chaotic neural network has better nonlinear fitting ability and higher precision in the prediction of weekly retail price of eggs.The empirical result also shows that the chaotic neural network can be widely used in the field of short-term prediction of agricultural prices. 展开更多
关键词 chaos theory chaotic neural network neural network technology short-term prediction weekly retail price of eggs
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
11
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home network and Digital Rights Management technology ZTE ISDB ATSC
下载PDF
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
12
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 Key Technologies of Wireless Heterogeneous network Security NODE WLAN
下载PDF
Wireless Mesh Technology and Network 被引量:1
13
作者 Zhu Jinkang (University of Science and Technology of China , Hefei 230027, China ) 《ZTE Communications》 2008年第2期1-6,共6页
Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and intr... Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles . 展开更多
关键词 MESH Wireless Mesh technology and network WMN
下载PDF
Multi-Radio Cooperation Technology and Heterogeneous Network Convergence 被引量:1
14
作者 Huang Chuan, Zheng Baoyu (Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2008年第3期29-33,共5页
The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radi... The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible. 展开更多
关键词 RADIO RATE data Multi-Radio Cooperation technology and Heterogeneous network Convergence MRC WMN
下载PDF
Key Technologies of Wireless Mesh Network 被引量:1
15
作者 Wu Fan, Mao Yuming, Zhang Ke (University of Electronic Science and Technology of China , Chengdu 610054, China ) 《ZTE Communications》 2008年第2期25-29,共5页
The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity... The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity supply constraints , convergence of flows . Improving the spatial reuse of spectrum is an effective approach to increase network capacity. The linchpin of this approach is to effectively control the interference range between wireless links . The multi- channel networking technology is one of the key technologies of WMN, and its core is the channel allocation through which the channel utilization can be maximized . The mutual interference between multi- hop wireless links should be considered when choosing the routing metrics in WMN. Through the load - balancing routing method , the network capacity and throughput of nodes can be improved . 展开更多
关键词 MESH WMN Key Technologies of Wireless Mesh network
下载PDF
Investigation of Architecture and Essential Technologies of Wireless Sensor Network 被引量:1
16
作者 Peng Mugen, Wang Yingjie, Wang Wenbo (School of Telecommunications Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2005年第4期25-32,共8页
This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing proto... This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing protocols are discussed and compared. A proposal of applying the simple IEEE 802 MAC protocol into the wireless sensor network is introduced. In addition, in order to improve the system capacity, a multi-channel strategy for the sensor nodes is presented for decreasing the blocking probability and suppressing the accessing time delay. It is concluded that there are still a number of problems to be solved, including decreasing power consumption, improving capacity and avoiding access collision, to promote the successful commercial application of wireless sensor network. 展开更多
关键词 IEEE WSN Investigation of Architecture and Essential Technologies of Wireless Sensor network NODE MAC
下载PDF
New Directions of 5G for the Development of Blended Learning Models
17
作者 Li Xinya Jiang Bo 《Psychology Research》 2022年第10期802-807,共6页
To improve the quality of education,the application of various forms of teaching and learning tools supported by technology is becoming increasingly widespread in education.Especially the internet communication and te... To improve the quality of education,the application of various forms of teaching and learning tools supported by technology is becoming increasingly widespread in education.Especially the internet communication and technology are changing the education era swiftly with the advent of fifth-generation technology.Research about blended learning(BL)based on 5G networks is emerging.However,few studies have explained how 5G network technology helps the BL teaching model be better applied to teaching.Therefore,this paper tries to sort out the development process of BL teaching mode,summarize the challenges of BL learning in teaching,and explore how the development of the 5G era will positively impact BL teaching mode. 展开更多
关键词 blended learning 5G network technology teaching model online learning
下载PDF
Cognition Based Reconfigurable Wireless Network Technology
18
作者 Feng Zhiyong, Su Meiyu, Zhang Qixun (Wireless Technology Innovation Institute of Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期1-5,共5页
The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technolog... The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technology and cognitive theory, the evolution from existing radio networks to future reconfigurable radio networks with the cognitive ability becomes possible. Nowadays the research aspects of E2R include the system architecture of reconfigurable radio networks and some key technologies for their evolution. 展开更多
关键词 REAL Cognition Based Reconfigurable Wireless network technology
下载PDF
Key MAC Layer Technologies of Cognitive Radio Network
19
作者 Zeng Zhimin, Guo Caili (School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期21-26,共6页
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro... As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization. 展开更多
关键词 MAC Key MAC Layer Technologies of Cognitive Radio network RADIO
下载PDF
Key Technologies of 3G WCDMA Network Sharing
20
作者 Zhang Jian (Mobile Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2005年第2期5-8,共4页
Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio ac... Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio access network sharing. It also analyzes the key network sharing technologies, including the lu-Flex function in Release 5, the UTRAN sharing mechanism in the connected mode in Release 5 and the mechanism of network sharing support enhancement in Release 6. 展开更多
关键词 WCDMA SGSN UTRAN PLMN Key Technologies of 3G WCDMA network Sharing
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部