期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
《计算机网络》实验课程教学现状与教学改革 被引量:3
1
作者 罗莹 《无线互联科技》 2011年第6期68-68,70,共2页
《计算机网络》是计算机相关专业的专业必修课,是一门实践操作能力比较强的课程,课堂的实践教学环节通过实验课的开设来完成。这么多年来,实验课的开放情况并不尽如人意,许多高校开放也是形同虚设,本文认识分析我国高校《计算机网络》... 《计算机网络》是计算机相关专业的专业必修课,是一门实践操作能力比较强的课程,课堂的实践教学环节通过实验课的开设来完成。这么多年来,实验课的开放情况并不尽如人意,许多高校开放也是形同虚设,本文认识分析我国高校《计算机网络》实验课程的开设现状,提出网络实验教学改革的思路,为其它高校的教学改革提供理论依据。 展开更多
关键词 《计算机网络》 实验课程教学 现状 发展对策
在线阅读 下载PDF
计算机网络各层核心协议工作原理与实现——评《计算机网络》
2
作者 陈立 《当代教育科学》 北大核心 2015年第17期I0014-I0014,共1页
一、引言随着计算机技术及网络通讯技术的飞速发展,计算机网络技术逐渐渗透进人类生活的方方面面,在日常学习、企业管理等领域扮演着越来越重要的角色。随着研究范围的不断扩大及技术的不断改造,计算机网络技术的复杂性特征也越来越... 一、引言随着计算机技术及网络通讯技术的飞速发展,计算机网络技术逐渐渗透进人类生活的方方面面,在日常学习、企业管理等领域扮演着越来越重要的角色。随着研究范围的不断扩大及技术的不断改造,计算机网络技术的复杂性特征也越来越明显。《计算机网络》一书的作者总结多年实践研究经验及先进成果,重点立足于计算机网络的基本原理,同时兼顾了Internet体系结构与TCP/IP协议等内容, 展开更多
关键词 《计算机网络》 TCP/IP协议 工作原理 计算机网络技术 INTERNET 网络通讯技术 计算机技术 人类生活
在线阅读 下载PDF
《计算机网络》多媒体网络教学系统
3
作者 罗志高 邓小锋 杨晓兵 《中山大学学报论丛》 1999年第3期134-138,共5页
关键词 多媒体网络 《计算机网络》 教学系统 高等教育自学考试 JAVASCRIPT 远程教学 目标框架 学习者 技术介绍 课堂练习
在线阅读 下载PDF
大数据时代人工智能在计算机网络技术中的应用——评《计算机网络》 被引量:16
4
作者 陈志涛 《现代雷达》 CSCD 北大核心 2021年第7期I0017-I0017,共1页
信息化技术的快速发展,为计算机网络技术的运用提供了更为广阔的施展空间,民众借助计算机网络技术,能够多渠道、不间断获取自己所需信息资源。大数据时代的来临,进一步提升了网络信息的资源,同时提供更为准确以及便捷的咨询服务,为人们... 信息化技术的快速发展,为计算机网络技术的运用提供了更为广阔的施展空间,民众借助计算机网络技术,能够多渠道、不间断获取自己所需信息资源。大数据时代的来临,进一步提升了网络信息的资源,同时提供更为准确以及便捷的咨询服务,为人们在信息的海洋在遨游提供了技术支持。大数据时代下如何做到进一步提升计算机网络技术的服务质量,成为当下越来越受到关注的问题,其中人工智能技术凭借其优势得以快速脱颖而出。 展开更多
关键词 人工智能 入侵检测技术 《计算机网络》 大数据时代
在线阅读 下载PDF
高职《计算机网络》课程教学改革探讨 被引量:2
5
作者 宋利芬 周锋 《濮阳职业技术学院学报》 2007年第1期148-149,共2页
目前,我国正在加紧推进高等教育大众化进程,加速高等职业教育的发展正是实现高等教育大众化的主要途径。如何办出高职教育特色,如何设计课程及教学内容,是目前各高职学校亟待解决的问题。
关键词 高职学校 《计算机网络》 课程教学改革 教育大众化 高等职业教育 教育特色 教学内容 设计课程
在线阅读 下载PDF
书网天下——介绍谢希仁教授编著的《计算机网络》 被引量:2
6
《数字通信世界》 2005年第2期69-69,共1页
如果你想学习和掌握网络技术,我推荐你读一读中国人民解放军理工大学博士生导师谢希仁教授写的《计算机网络》一书。这本书从1989年的第1版到第4版已15年了,一直畅销不衰,电子工业出版社已累计发行了40多万册,是国内高等院校的首选教材... 如果你想学习和掌握网络技术,我推荐你读一读中国人民解放军理工大学博士生导师谢希仁教授写的《计算机网络》一书。这本书从1989年的第1版到第4版已15年了,一直畅销不衰,电子工业出版社已累计发行了40多万册,是国内高等院校的首选教材。谢老师从教40多年,具有丰富的教学经验。对许多高深的知识,他能以简捷、准确、形象、生动的文字表达得十分透彻,启迪学生的思考。他教学严谨、要求严格,他的书总是根据技术发展和教学实践,不断地修订,以求精益求精。《计算机网络》这本教材的文字录入、图例绘制、 展开更多
关键词 《计算机网络》 谢希仁 文字录入 天下
在线阅读 下载PDF
中职《计算机网络》课程线上教学质量评价指标的探究 被引量:1
7
作者 柏琳 李美娟 《中国新通信》 2023年第16期141-143,共3页
随着互联网技术在国内的迅速发展和应用,线上教学正逐步深入到人们的日常生活中,尤其是在疫情时期,更是如此。中职在线教学《计算机网络》课程在许多方面都有优点。本文通过对《计算机网络》的特色和教学流程的分析,探讨了在线教学质量... 随着互联网技术在国内的迅速发展和应用,线上教学正逐步深入到人们的日常生活中,尤其是在疫情时期,更是如此。中职在线教学《计算机网络》课程在许多方面都有优点。本文通过对《计算机网络》的特色和教学流程的分析,探讨了在线教学质量评价指标的选择和确定,并对如何利用在线教学质量评价指标和进一步完善存在的问题进行了探讨。 展开更多
关键词 中职 《计算机网络》课程 线上教学 质量评价指标
在线阅读 下载PDF
中职计算机网络技术有效教学方法的应用 被引量:3
8
作者 胡瑞 《数字技术与应用》 2022年第2期57-59,共3页
计算机网络技术是计算机与通信这两种技术的紧密结合,也是当今智能建筑中的核心技术。计算机网络技术涉及网络通信系统、办公自动化系统和楼宇设备自动化系统,它延伸到建筑的每个楼层和角落。掌握计算机网络技术已然成为当今社会成员在... 计算机网络技术是计算机与通信这两种技术的紧密结合,也是当今智能建筑中的核心技术。计算机网络技术涉及网络通信系统、办公自动化系统和楼宇设备自动化系统,它延伸到建筑的每个楼层和角落。掌握计算机网络技术已然成为当今社会成员在网络化、数字化世界生存的必备条件。为了适应信息型社会的需要,我校开设了《计算机网络技术》这门课程,为社会输送综合型人才。 展开更多
关键词 计算机网络技术 综合型人才 网络通信系统 办公自动化系统 《计算机网络技术》 必备条件 网络 智能建筑
在线阅读 下载PDF
浅谈项目教学法在《计算机网络与维护》教学中的应用 被引量:1
9
作者 陈伟杰 《教育界(高等教育)》 2015年第5期67-67,共1页
近年来随着计算机网络的迅猛发展,计算机网络的应用已遍及社会的各个领域.关于计算机网络的各种教材应运而生,并且被设为中等职业学校计算机类专业学生必修的一门主干专业课.而计算机网络庞大的知识体系对于中职学生来说是一道巨大的坎... 近年来随着计算机网络的迅猛发展,计算机网络的应用已遍及社会的各个领域.关于计算机网络的各种教材应运而生,并且被设为中等职业学校计算机类专业学生必修的一门主干专业课.而计算机网络庞大的知识体系对于中职学生来说是一道巨大的坎,所以在设计教学时选用适当的教学方法显得尤为重要.笔者在教学过程中,发现项目教学法非常适合计算机网络相关课程的教学,其将理论知识与实际操作结合起来,使学生学习时更有针对性和实用性. 展开更多
关键词 《计算机网络与维护》应用 项目教学法
在线阅读 下载PDF
邮政业务中计算机应用的现状与启示
10
作者 饶丽君 《邮政研究》 1995年第2期34-35,共2页
邮政业务中计算机应用的现状与启示石家庄邮政高等专科学校饶丽君一、引言1994年暑假期间,笔者代表石家庄邮政高等专科学校计算机专业,到计算机应用(特别是计算机网)起步较早、搞得较好的一些省邮电管理局,就计算机应用、人才... 邮政业务中计算机应用的现状与启示石家庄邮政高等专科学校饶丽君一、引言1994年暑假期间,笔者代表石家庄邮政高等专科学校计算机专业,到计算机应用(特别是计算机网)起步较早、搞得较好的一些省邮电管理局,就计算机应用、人才需求、教学建议、教材建设等几个方面... 展开更多
关键词 计算机应用 邮政业务 邮政企业 《计算机网络》 启示 网络管理 全国联网 报刊发行 计算机专业 计算机处理
在线阅读 下载PDF
Distributed Computation Models for Data Fusion System Simulation
11
作者 张岩 曾涛 +1 位作者 龙腾 崔智社 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期291-297,共7页
An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advan... An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advanced C3I systems. Two architectures are provided and verified: one is based on pure TCP/IP protocol and C/S model, and implemented with Winsock, the other is based on CORBA (common object request broker architecture). The performance of data fusion simulation system, i.e. reliability, flexibility and scalability, is improved and enhanced by two models. The study of them makes valuable explore on incorporating the distributed computation concepts into radar system simulation techniques. 展开更多
关键词 radar system computer network data fusion SIMULATION distributed computation
在线阅读 下载PDF
Prediction of Injection-Production Ratio with BP Neural Network
12
作者 袁爱武 郑晓松 王东城 《Petroleum Science》 SCIE CAS CSCD 2004年第4期62-65,共4页
Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. First... Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. Firstly, the error between the fitting and actual injection-production ratio is calculated with such methods as the injection-production ratio and water-oil ratio method, the material balance method, the multiple regression method, the gray theory GM (1,1) model and the back-propogation (BP) neural network method by computer applications in this paper. The relative average errors calculated are respectively 1.67%, 1.08%, 19.2%, 1.38% and 0.88%. Secondly, the reasons for the errors from different prediction methods are analyzed theoretically, indicating that the prediction precision of the BP neural network method is high, and that it has a better self-adaptability, so that it can reflect the internal relationship between the injection-production ratio and the influencing factors. Therefore, the BP neural network method is suitable to the prediction of injection-production ratio. 展开更多
关键词 Injection-production ratio (IPR) BP neural network gray theory PREDICTION
在线阅读 下载PDF
HiQoS:An SDN-Based Multipath QoS Solution 被引量:21
13
作者 YAN Jinyao ZHANG Hailong +2 位作者 SHUAI Qianjun LIU Bo GUO Xiao 《China Communications》 SCIE CSCD 2015年第5期123-133,共11页
Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking ... Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking that separates control plane and forwarding planes,and has the advantage of centralized control and programmability.In this paper,we propose HiQoS that provides QoS guarantees using SDN.Moreover,HiQoS makes use of multiple paths between source and destination and queuing mechanisms to guarantee QoS for different types of traffic.Experimental results show that our HiQoS scheme can reduce delay and increase throughput to guarantee QoS.Very importantly,HiQoS recovers from link failure very quickly by rerouting traffic from failed path to other available path. 展开更多
关键词 SDN QOS MULTIPATH OpenFlow
在线阅读 下载PDF
A Novel Packet Marking Algorithm in Context-aware Autonomic QoS Framework 被引量:2
14
作者 Gong Xiangyang Wang Wendong Li Yan 《China Communications》 SCIE CSCD 2009年第4期98-107,共10页
Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a... Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a novel autonomic packet marking(APM) algorithm.In the proposed autonomic QoS framework, APM is capable of collecting various QoS related contexts, and adaptively adjusting its behavior to provide better QoS guarantee according to users' requirements and network conditions.Simulation results show that APM provides better performance than traditional packet marker, and significantly improves user's quality of experience. 展开更多
关键词 autonomic QoS framework DIFFSERV CONTEXT-AWARE packet marking
在线阅读 下载PDF
The design and implementation of web mining in web sites security 被引量:2
15
作者 LI Jian, ZHANG Guo-yin , GU Guo-chang, LI Jian-li College of Computer Science and Technology, Harbin Engineering University, Harbin 150001China 《Journal of Marine Science and Application》 2003年第1期81-86,共6页
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg... The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency. 展开更多
关键词 data mining web log mining web sites security density-based clustering
在线阅读 下载PDF
Research on the Synchronization of Modulation Hopping System:I Synchronization Scheme 被引量:2
16
作者 Tai Nengjian Wu Dewei +1 位作者 Wu Jie Li Ting 《China Communications》 SCIE CSCD 2009年第4期148-154,共7页
In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed i... In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed in detail.According to the system requirements for short code in the properties of time-varying, safety and balance, an algorithm to design wide-gap chaos short code based on TOD is proposed.Synchronization performance analysis shows that the algorithm has good performance, the initial synchronization time and the later entering network synchronization time are short, additionally, maximum synchronization time difference and synchronization maintaining time are long, all of which meet the needs of normal communications, and further verify the synchronization scheme feasible. 展开更多
关键词 secure communication modulation hopping SYNCHRONIZATION
在线阅读 下载PDF
Vulnerability Testing of HTTP based on Vulnerability-testing Oriented Petri Net(VOPN) 被引量:1
17
作者 Li Weihai Ma Yan Huang Xiaohong 《China Communications》 SCIE CSCD 2009年第4期116-120,共5页
Vulnerability-testing Oriented Petri Net (VOPN), a vulnerability testing model for communication protocol is brought forward first, which is combined Petri Net system with protocol Syntax analysis. Then vulnerabilit... Vulnerability-testing Oriented Petri Net (VOPN), a vulnerability testing model for communication protocol is brought forward first, which is combined Petri Net system with protocol Syntax analysis. Then vulnerability testing of implementation of HTTP protocol based on VOPN is made and the process is analyzed to prove the feasibility of the model. 展开更多
关键词 vulnerability testing testing model HTTP Petri net
在线阅读 下载PDF
Towards a Source-Code Oriented Attestation 被引量:1
18
作者 Ruan Anbang Shen Qingni +3 位作者 Wang Li Qin Chao Gu Liang Chen Zhong 《China Communications》 SCIE CSCD 2009年第4期82-87,共6页
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports the attestation for specific patterns of binary codes defined by a trusted party, mostly the software vendor, for a particular version of a software. In this paper, we present a Source-Code Oriented Attestation (SCOA) framework to enable custom built application to be attested to in the TCG attestation architecture. In SCOA, security attributes are bond with the source codes of an application instead of its binaries codes. With a proof chain generated by a Trusted Building System to record the building procedure, the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes. Moreover, with the security attribute certificates assigned to the source codes, they can determine the trustworthiness of the binary. In this paper, we present a TBS implementation with virtualization. 展开更多
关键词 remote attestation trusted building system VIRTUALIZATION source-code
在线阅读 下载PDF
An Early Stage Detecting Method against SYN Flooding Attacks 被引量:1
19
作者 Sun Qibo Wang Shangguang Yan Danfeng Yang Fangchun 《China Communications》 SCIE CSCD 2009年第4期108-115,共8页
Existing detection methods against SYN flooding attacks are effective only at the later stages when attacking signatures are obvious.In this paper an early stage detecting method(ESDM) is proposed.The ESDM is a simple... Existing detection methods against SYN flooding attacks are effective only at the later stages when attacking signatures are obvious.In this paper an early stage detecting method(ESDM) is proposed.The ESDM is a simple but effective method to detect SYN flooding attacks at the early stage.In the ESDM the SYN traffic is forecasted by autoregressive integrated moving average model, and non-parametric cumulative sum algorithm is used to find the SYN flooding attacks according to the forecasted traffic.Trace-driven simulations show that ESDM is accurate and efficient to detect the SYN flooding attacks. 展开更多
关键词 denial-of-service attacks autoregressive integrated moving average model non-parametric cumulative sum algorithm
在线阅读 下载PDF
Application Research of Computer Network Technology in Mining Railway Transport Management System 被引量:2
20
作者 余静 王振军 才庆祥 《Journal of China University of Mining and Technology》 2002年第1期57-60,共4页
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi... This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given. 展开更多
关键词 mining railway transport management computer network SECURITY reliability
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部