期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Research on the Application of Virtual Network Technology in Computer Network Security 被引量:1
1
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 Virtual network technology computer network security Application research
在线阅读 下载PDF
A Study on the Reform of Computer Network Security Technology Teaching Based on Task-driven in Vocational Education
2
作者 WANG Wei 《外文科技期刊数据库(文摘版)教育科学》 2021年第8期123-125,共5页
With the continuous development of science and technology and economic level in our country, especially in recent years, the development of Internet technology has brought great convenience to people's work and li... With the continuous development of science and technology and economic level in our country, especially in recent years, the development of Internet technology has brought great convenience to people's work and life. The application of computer network technology is more and more extensive, and it plays a huge role in all walks of life, so the importance of network security is highlighted. Therefore, in vocational education, a group of talents with professional knowledge of computer network security technology will be trained by reforming the teaching mode. This paper is a discussion based on the task-driven teaching reform of computer network security technology in vocational education. 展开更多
关键词 vocational education TASK-DRIVEN computer network security technology the teaching reform
在线阅读 下载PDF
Research on the Measures for Securing the Information Stored on the Computer Network in the Era of Big Data
3
作者 JI Ye 《外文科技期刊数据库(文摘版)教育科学》 2020年第1期088-090,共3页
The development of science and technology has created a good foundation for the development and expansion of various industries. The development of computer network technology has promoted the progress of big data tec... The development of science and technology has created a good foundation for the development and expansion of various industries. The development of computer network technology has promoted the progress of big data technology, which has been applied to many fields and delivered very good results. The computer network information security is closely related to the application effectiveness of big data. However, the computer network information is extremely vulnerable to the influence of various external factors, which will not only lead to information leakage, but also cause serious economic losses. In order to effectively solve the problems above, the most important thing is to improve people’s awareness of protecting their computer network information from all aspects, and to develop prevention programs based on the actual situation, thus fundamentally ensuring the security and accuracy of network information. 展开更多
关键词 the era of big data information security of computer network protection measures
在线阅读 下载PDF
A New Adaptive Regularization Parameter Selection Based on Expected Patch Log Likelihood
4
作者 Jianwei Zhang Ze Qin Shunfeng Wang 《Journal of Cyber Security》 2020年第1期25-36,共12页
Digital images have been applied to various areas such as evidence in courts.However,it always suffers from noise by criminals.This type of computer network security has become a hot issue that can’t be ignored.In th... Digital images have been applied to various areas such as evidence in courts.However,it always suffers from noise by criminals.This type of computer network security has become a hot issue that can’t be ignored.In this paper,we focus on noise removal so as to provide guarantees for computer network security.Firstly,we introduce a well-known denoising method called Expected Patch Log Likelihood(EPLL)with Gaussian Mixture Model as its prior.This method achieves exciting results in noise removal.However,there remain problems to be solved such as preserving the edge and meaningful details in image denoising,cause it considers a constant as regularization parameter so that we denoise with the same strength on the whole image.This leads to a problem that edges and meaningful details may be oversmoothed.Under the consideration of preserving edges of the image,we introduce a new adaptive parameter selection based on EPLL by the use of the image gradient and variance,which varies with different regions of the image.Moreover,we add a gradient fidelity term to relieve staircase effect and preserve more details.The experiment shows that our proposed method proves the effectiveness not only in vision but also on quantitative evaluation. 展开更多
关键词 computer network security image denoising EPLL adaptive parameter EDGES
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部