{"title":"On Information Security","authors":"Li Zhen-yu","doi":"10.4135/9781483381503.n610","DOIUrl":"https://doi.org/10.4135/9781483381503.n610","url":null,"abstract":"This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heuristic Searching Straegy Based on Genetic Algorithm and Simulated Annealing Algorithm in Parsimony Tree Construction","authors":"Sun Hong-bin","doi":"10.1016/j.egypro.2011.11.585","DOIUrl":"https://doi.org/10.1016/j.egypro.2011.11.585","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on The Internet of Things","authors":"Gu Peng","doi":"10.21172/1.72.574","DOIUrl":"https://doi.org/10.21172/1.72.574","url":null,"abstract":"This article mainly introduces the concept of the Internet of things,present situation and prospect of the Internet of things devel-opment,focuses on the application of RFID technology and the advantages of the Internet of things technology,and pointed out that the current the Internet of things technology security,high reliability and cost issues.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Data Mining","authors":"Fang Yuan-kang","doi":"10.1007/0-306-47012-8_2","DOIUrl":"https://doi.org/10.1007/0-306-47012-8_2","url":null,"abstract":"","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Network Design","authors":"Ji Cheng","doi":"10.1002/9781119658795.ch3","DOIUrl":"https://doi.org/10.1002/9781119658795.ch3","url":null,"abstract":"The thesis elaborates the guiding idea about designing enterprise network system fort of Jiangsu industry enterprise.It stresses on network efficiency,security,infomationization platform.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research the Classification Algorithm of Data Mining","authors":"Jiang Wei","doi":"10.25236/icebmca.2017.23","DOIUrl":"https://doi.org/10.25236/icebmca.2017.23","url":null,"abstract":"That the data mining a technology is that one is young and is full of the go into field hoping, commerce benefit driving force big and powerful will may keep on promoting development of it. Applicative ceaselessness deepens with the data base, the data base scale expands rapidly , the data mining the hot spot already becoming a nowadays studying , the new data mining of it both method and the model every year coming out, Classification problem especially among them, has aroused more and more attention.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chinese information processing","authors":"Yucheng Liu","doi":"10.25669/AZDZ-QSIK","DOIUrl":"https://doi.org/10.25669/AZDZ-QSIK","url":null,"abstract":"Chinese information processing will be one has the broad prospects scientific research domain in the future. From Chinese information processing's research content,the mainstream technology and so on several aspects discussed shallowly to the computer Chinese information processing understanding.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}