首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 82 毫秒
1.
计算机安全技术广泛应用于各行各业,网络安全问题越来越重要。本文讲述了计算机安全问题如黑客攻击、计算机病毒、计算机系统本身的安全漏洞等,以及计算机安全问题的解决策略:数据加密、数据集中存储、双硬盘、病毒检查、数据备份、防火墙安全技术等。  相似文献   

2.
随着计算机网络技术的不断发展,计算机互联网在人们的生活中应用越来越广泛,网络安全问题也随之而来。目前的计算机安全存在着诸多因素的威胁,研究人员也在致力于这方面的研究与发展,应用先进的技术来保证计算机安全,为计算机用户的信息安全提供更高的保障。本文将针对计算机安全问题进行分析,探讨数据加密技术在计算机安全中的应用。  相似文献   

3.
李宁 《软件》2022,(2):160-162
计算机在安全管理中发挥重要作用,而云计算技术的发展和利用能够改善和增强计算机安全管理效率,表现出来的生产数据可靠性高。因此,简述云计算在计算机安全管理中的作用和面临的问题,针对性采取措施,强化云计算技术在计算机安全管理作用全面提高。  相似文献   

4.
文章简介了计算机安全的基本概念和流行的国际标准,一方面从硬件角度探讨了电磁攻击和电磁泄露带来的计算机安全问题,另一方面也从软件角度归纳了病毒、网络攻击、非法入侵等各种造成计算机安全问题的各种原因,描述了通过电磁屏蔽加固技术、加密技术和认证技术等方法提高计算机安全的措施。  相似文献   

5.
计算机普及之后,成为个人或者企业存放信息的工具,而在利益的驱使下,黑客通过各种形式来攻击这些电脑获得信息,因此计算机安全问题受到广泛重视.通过探讨数据加密技术在计算机安全中的应用,来引导计算机使用者重视计算机的数据加密,维护计算机安全,保卫自己利益不受侵犯,为提升计算机安全技术而贡献力量.  相似文献   

6.
9月21日至9月25日,第13次全国计算机安全技术交流会在安徽省黄山市召开。中国计算机安全专业委员会主任缪道期先生详细阐述了计算机安全问题所涉及的领域,我国计算机安全采取的措施及防范和打击计算机犯罪等问题。  相似文献   

7.
针对计算机安全课程对学生实践动手能力要求高,技术更新快等需求,分析思科公司的教学评估云平台NetAcad. com特点,提出基于思科网络技术学院教学评估云平台的计算机安全课程教改方案,最后以数据说明将计算机安全课程建设和思科公司新技术新产品进行产教融合,可以有效提高学生的实操能力。  相似文献   

8.
随着社会的发展,计算机技术对人们的生活和工作产生了较大的影响.与早期的计算机技术相比,数据传播和应用发生了重大变化.现代社会不仅是信息时代,也是网络时代.科学技术的发展正在不断地改革和创新,数字信息技术、计算机网络安全技术也变得更加成熟.在大数据时代,需要开展信息技术网络安全创新研究,不断提高计算机处理水平,满足不同人群对网络安全的需求,介绍了网络时代的主要特征,分析了信息处理的安全问题,包括数据泄露和计算机安全等问题.分析了现代计算机安全技术的概念及现有的问题.在此基础上,重点介绍了加密技术、防火墙技术和入侵检测技术的应用.  相似文献   

9.
黎冰  吴松  曾凡涛 《计算机工程》2006,32(7):272-274
人脸识别技术,是近几年在全球范围内迅速发展起来的计算机安全技术。该文以高端智能手机的安全应用为载体,展示了在嵌入式系统之上完成图像数据的采集、传输与人脸识别处理等功能相对应的系统架构、模块设计及实现过程。  相似文献   

10.
随着大数据技术的迅速发展,已经在我们生活中的方方面面开始广泛应用,但大数据及时在促进我们生活的同时,也引发了一系列的安全问题,通过网络安全防御系统保护计算机网络的问题也引起了人们的关注.本文着眼于大数据时代计算机安全防御系统设计的现状,分析了相关问题并提出了适当的解决方案,希望对我国计算机安全防御系统设计具有一定的参考...  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号