Computer Knowledge and Technology最新文献

筛选
英文 中文
On Information Security 有关资讯保安
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.4135/9781483381503.n610
Li Zhen-yu
{"title":"On Information Security","authors":"Li Zhen-yu","doi":"10.4135/9781483381503.n610","DOIUrl":"https://doi.org/10.4135/9781483381503.n610","url":null,"abstract":"This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heuristic Searching Straegy Based on Genetic Algorithm and Simulated Annealing Algorithm in Parsimony Tree Construction 简约树构造中基于遗传算法和模拟退火算法的启发式搜索策略
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.1016/j.egypro.2011.11.585
Sun Hong-bin
{"title":"Heuristic Searching Straegy Based on Genetic Algorithm and Simulated Annealing Algorithm in Parsimony Tree Construction","authors":"Sun Hong-bin","doi":"10.1016/j.egypro.2011.11.585","DOIUrl":"https://doi.org/10.1016/j.egypro.2011.11.585","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speaker Recognition Overview 说话人识别概述
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.1007/springerreference_70945
Yuang Bao-ling
{"title":"Speaker Recognition Overview","authors":"Yuang Bao-ling","doi":"10.1007/springerreference_70945","DOIUrl":"https://doi.org/10.1007/springerreference_70945","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123304995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Detection Technology of Image Spam 垃圾图像检测技术研究
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.1007/978-1-4471-4796-1_98
Lixin Tao, Hean Liu, Zhang Tao, Ning Zhong, Shuguang Wu
{"title":"Research on Detection Technology of Image Spam","authors":"Lixin Tao, Hean Liu, Zhang Tao, Ning Zhong, Shuguang Wu","doi":"10.1007/978-1-4471-4796-1_98","DOIUrl":"https://doi.org/10.1007/978-1-4471-4796-1_98","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133753477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on The Internet of Things 物联网研究
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.21172/1.72.574
Gu Peng
{"title":"Study on The Internet of Things","authors":"Gu Peng","doi":"10.21172/1.72.574","DOIUrl":"https://doi.org/10.21172/1.72.574","url":null,"abstract":"This article mainly introduces the concept of the Internet of things,present situation and prospect of the Internet of things devel-opment,focuses on the application of RFID technology and the advantages of the Internet of things technology,and pointed out that the current the Internet of things technology security,high reliability and cost issues.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Overview of Data Mining 数据挖掘概述
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.1007/0-306-47012-8_2
Fang Yuan-kang
{"title":"An Overview of Data Mining","authors":"Fang Yuan-kang","doi":"10.1007/0-306-47012-8_2","DOIUrl":"https://doi.org/10.1007/0-306-47012-8_2","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Aspect-Oriented Programming 面向方面的编程
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.1007/978-1-4302-0500-5_3
H. Lan
{"title":"Aspect-Oriented Programming","authors":"H. Lan","doi":"10.1007/978-1-4302-0500-5_3","DOIUrl":"https://doi.org/10.1007/978-1-4302-0500-5_3","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise Network Design 企业网络设计
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.1002/9781119658795.ch3
Ji Cheng
{"title":"Enterprise Network Design","authors":"Ji Cheng","doi":"10.1002/9781119658795.ch3","DOIUrl":"https://doi.org/10.1002/9781119658795.ch3","url":null,"abstract":"The thesis elaborates the guiding idea about designing enterprise network system fort of Jiangsu industry enterprise.It stresses on network efficiency,security,infomationization platform.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research the Classification Algorithm of Data Mining 研究数据挖掘的分类算法
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.25236/icebmca.2017.23
Jiang Wei
{"title":"Research the Classification Algorithm of Data Mining","authors":"Jiang Wei","doi":"10.25236/icebmca.2017.23","DOIUrl":"https://doi.org/10.25236/icebmca.2017.23","url":null,"abstract":"That the data mining a technology is that one is young and is full of the go into field hoping, commerce benefit driving force big and powerful will may keep on promoting development of it. Applicative ceaselessness deepens with the data base, the data base scale expands rapidly , the data mining the hot spot already becoming a nowadays studying , the new data mining of it both method and the model every year coming out, Classification problem especially among them, has aroused more and more attention.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese information processing 中文信息处理
Computer Knowledge and Technology Pub Date : 1900-01-01 DOI: 10.25669/AZDZ-QSIK
Yucheng Liu
{"title":"Chinese information processing","authors":"Yucheng Liu","doi":"10.25669/AZDZ-QSIK","DOIUrl":"https://doi.org/10.25669/AZDZ-QSIK","url":null,"abstract":"Chinese information processing will be one has the broad prospects scientific research domain in the future. From Chinese information processing's research content,the mainstream technology and so on several aspects discussed shallowly to the computer Chinese information processing understanding.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信