Pub Date : 1900-01-01DOI: 10.4135/9781483381503.n610
Li Zhen-yu
This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.
{"title":"On Information Security","authors":"Li Zhen-yu","doi":"10.4135/9781483381503.n610","DOIUrl":"https://doi.org/10.4135/9781483381503.n610","url":null,"abstract":"This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1016/j.egypro.2011.11.585
Sun Hong-bin
{"title":"Heuristic Searching Straegy Based on Genetic Algorithm and Simulated Annealing Algorithm in Parsimony Tree Construction","authors":"Sun Hong-bin","doi":"10.1016/j.egypro.2011.11.585","DOIUrl":"https://doi.org/10.1016/j.egypro.2011.11.585","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article mainly introduces the concept of the Internet of things,present situation and prospect of the Internet of things devel-opment,focuses on the application of RFID technology and the advantages of the Internet of things technology,and pointed out that the current the Internet of things technology security,high reliability and cost issues.
{"title":"Study on The Internet of Things","authors":"Gu Peng","doi":"10.21172/1.72.574","DOIUrl":"https://doi.org/10.21172/1.72.574","url":null,"abstract":"This article mainly introduces the concept of the Internet of things,present situation and prospect of the Internet of things devel-opment,focuses on the application of RFID technology and the advantages of the Internet of things technology,and pointed out that the current the Internet of things technology security,high reliability and cost issues.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Data Mining","authors":"Fang Yuan-kang","doi":"10.1007/0-306-47012-8_2","DOIUrl":"https://doi.org/10.1007/0-306-47012-8_2","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119658795.ch3
Ji Cheng
The thesis elaborates the guiding idea about designing enterprise network system fort of Jiangsu industry enterprise.It stresses on network efficiency,security,infomationization platform.
本文阐述了江苏工业企业网络系统堡垒设计的指导思想。它强调网络效率、安全性、信息化平台。
{"title":"Enterprise Network Design","authors":"Ji Cheng","doi":"10.1002/9781119658795.ch3","DOIUrl":"https://doi.org/10.1002/9781119658795.ch3","url":null,"abstract":"The thesis elaborates the guiding idea about designing enterprise network system fort of Jiangsu industry enterprise.It stresses on network efficiency,security,infomationization platform.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.25236/icebmca.2017.23
Jiang Wei
That the data mining a technology is that one is young and is full of the go into field hoping, commerce benefit driving force big and powerful will may keep on promoting development of it. Applicative ceaselessness deepens with the data base, the data base scale expands rapidly , the data mining the hot spot already becoming a nowadays studying , the new data mining of it both method and the model every year coming out, Classification problem especially among them, has aroused more and more attention.
{"title":"Research the Classification Algorithm of Data Mining","authors":"Jiang Wei","doi":"10.25236/icebmca.2017.23","DOIUrl":"https://doi.org/10.25236/icebmca.2017.23","url":null,"abstract":"That the data mining a technology is that one is young and is full of the go into field hoping, commerce benefit driving force big and powerful will may keep on promoting development of it. Applicative ceaselessness deepens with the data base, the data base scale expands rapidly , the data mining the hot spot already becoming a nowadays studying , the new data mining of it both method and the model every year coming out, Classification problem especially among them, has aroused more and more attention.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chinese information processing will be one has the broad prospects scientific research domain in the future. From Chinese information processing's research content,the mainstream technology and so on several aspects discussed shallowly to the computer Chinese information processing understanding.
{"title":"Chinese information processing","authors":"Yucheng Liu","doi":"10.25669/AZDZ-QSIK","DOIUrl":"https://doi.org/10.25669/AZDZ-QSIK","url":null,"abstract":"Chinese information processing will be one has the broad prospects scientific research domain in the future. From Chinese information processing's research content,the mainstream technology and so on several aspects discussed shallowly to the computer Chinese information processing understanding.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}