On computer paper model 1: the application of artificial intelligence in computer network technology
This paper first briefly introduces the common problems in computer network, and then combines the characteristics and advantages of artificial intelligence to emphasize the important position of artificial intelligence in the development of computer network technology.
Keywords: artificial intelligence; Computer network technology; App application
First, the problems of computer network technology
With the continuous development of computer technology, whether in daily life or at work, computer network technology is widely used, and people's references to computer network technology are more and more extensive, which means that people pay more and more attention to computer network security, that is to say, computer network monitoring and network control have become two aspects that people pay more attention to now, and people all think that computer network management system should have these two problems. However, because we want to better realize the functions of network monitoring and network control in the computer network security management system, we must obtain and process the information in the network in time. Now, when we transmit information through the network, there are often discontinuous or irregular situations. Moreover, in the early stage of the development of computer network technology, people can only use computers to simply process the data, but can't analyze and judge the authenticity of the data through computers, and at the same time, they can't achieve the purpose of quickly screening effective information from the massive network information. In addition, the information security management of computer network users should also provide them with better protection. At present, the development of computer software is very rapid, and computer network crimes are also very rampant. If the computer network security system itself does not have enough sensitivity and fast response speed, it will not be able to deal with all kinds of illegal network crimes that frequently occur in the computer network, such as infringing on user information security. In order to better realize the security management of computer network, we must establish a complete, intelligent and responsive management system. This intelligent management system can automatically analyze data, diagnose faults in time, deal with them in time and restore the normal operation of computer network system.
Second, the characteristics and advantages of artificial intelligence technology
In the process of using artificial intelligence, we can effectively deal with some uncertain information through artificial intelligence, we can predict the local or global state of the whole system and track its changes through artificial intelligence, we can process the information in the system in time by ourselves, and we can also provide the information needed by users in time. In addition to these abilities, we can also use artificial intelligence to write, that is to say, artificial intelligence itself has very good writing ability, which can handle all kinds of information and resources that have been obtained through artificial intelligence itself, and can realize the mutual threading and * * * enjoyment of these information among different users. Now we apply artificial intelligence to computer network intelligence. Mainly to make our country's computer network system have enough learning ability and better reasoning ability. If artificial intelligence is used in the process of network management, it can not only increase the sales of information processing, but also store information with the memory ability of artificial intelligence. By storing these information, artificial intelligence can automatically use these stored information to establish a perfect information base, and then summarize and end the information on the basis of this information base, and then form a high-level information through the process of summary and explanation, and then provide this high-level information to the network administrator. Therefore, if we use artificial intelligence in the process of computer network management, the administrator of the computer network is actually equivalent to hiring a very smart and diligent secretary. He not only says that he can obey his instructions unconditionally, but also can flexibly innovate the tasks he is about to complete according to the wishes of the administrator, and automatically seek faster and more effective ways to complete the tasks, thus continuously improving the efficiency of network information management in China.
Third, the application of artificial intelligence in computer network technology
(A) the application of artificial intelligence in computer network security management
The first aspect is the intelligent anti-spam system. In the current computer network, we can effectively protect the current customer's mailbox through such a system. The so-called intelligent anti-spam system is a system developed by using artificial intelligence technology. Through this system, we can protect users' letters. And in the process of monitoring and protecting e-mail, this system will not pose any threat to our users' information security. We can automatically form a classified information of sending and receiving e-mail, and deliver this information to customers in time, and then customers can deal with spam in their mailboxes according to this classified information. The second aspect, intelligent firewall technology. The artificial intelligence firewall system is very different from many firewall systems we use now. This firewall system can take advantage of its own artificial intelligence to automatically collect and process all kinds of data that need to be processed, which can effectively improve the speed and efficiency of information processing, thus better improving the firewall's ability to find all kinds of harmful behaviors in the current computer network and better organizing the spread of all kinds of viruses in the current computer network system in China. The third aspect, intrusion monitoring technology. Intrusion strategy is the first and most critical link in computer network security management, and it is the core part of the whole computer firewall system.
(B) the application of artificial intelligence in network management and system evaluation
In the process of applying artificial intelligence technology, we can not only apply his artificial intelligence, but also apply the expert knowledge base in artificial intelligence. Expert system is actually a functional computer system, which summarizes the knowledge and experience of experts in a certain field, transforms these knowledge and experience into effective resources and inputs them into the system to help the system deal with problems in this field.
Four. Concluding remarks
To sum up, with the continuous development of computer technology and network information technology, artificial intelligence technology began to appear and enter people's lives. This paper mainly introduces the problems existing in computer network and the application of artificial intelligence technology in computer network.
References:
[1] Zhang Bin. On the application of artificial intelligence in computer network technology [J]. Software, 20 12, 1 1: 265-266.
[2] Ma Yue. Discussion on the application of artificial intelligence in computer network technology [J]. Computer CD-ROM software and application, 20 14, 22:43-44.
On Computer Paper Model 2: Research on Computer Network Security Technology in E-commerce
With the rapid development of society, computer network has gradually penetrated and developed into various fields, especially the representative e-commerce industry, which is closely connected with the application of computer network all the time. However, with the network environment becoming more and more complex, network security technology has become a topic of general concern. Only by using network security technology reasonably in e-commerce can the whole network environment not be destroyed, thus making the e-commerce industry develop more stably and rapidly.
Computer network; Security technology; Electronic technology; App application
order
In the process of continuous development and exploration of e-commerce industry, the application of computer network security technology plays a vital role. Only by systematically, comprehensively and scientifically managing the network environment can we build a reliable network protection barrier and effectively protect and develop the network system of e-commerce industry.
1 computer network security technology of e-commerce
In e-commerce transactions, the support and application of computer network is essential. At the same time, in the extremely complex network environment, there are many potential threats to the e-commerce network operation system. Only by understanding and mastering the computer network security technology in e-commerce can we be more helpful to the application of network security technology in e-commerce. E-commerce network security is divided into two parts, namely computer network security and business transaction security. Computer network security refers to the security performance of the internal network environment of the computer system, which mainly includes the security of several important organizations such as computer network equipment security and computer network system security, mainly aiming at the security of the computer network itself; Business security focuses on the traditional business network and studies the security of the Internet in e-commerce applications. On the basis of computer network security, it ensures the smooth progress of e-commerce transactions and realizes the confidentiality and integrity of e-commerce.
2 e-commerce network security issues
According to the understanding of e-commerce, its development and transactions are mainly realized through computer networks, so there are many security problems, especially in the extremely diverse network environment of e-commerce, which will surely bury many security risks for the network system.
(1) virus invasion
For the whole e-commerce network system, the biggest threat is the virus. Due to the limitation of its work nature, it has a greater chance of contact with the external environment. When information resources are in a semi-closed and semi-open state, it is easy to bring opportunities to viruses. Once the virus invades the whole network system, all the functions and a large amount of data in the computer will be greatly destroyed, and the virus can reproduce and copy very quickly. In a short time, the whole network system can be paralyzed, and Internet resources will be eroded automatically, which will eventually lead to the collapse of e-commerce network environment.
(2) information theft
When the network environment is in the process of resource transmission or * * * sharing, if the information is not protected by encryption, the transmitted information will be displayed to everyone in clear text. Some lawless elements may intercept or extract information on the route through which the data passes, and then obtain valuable resources through research. In severe cases, important information such as personal information, account number and password can be disclosed, which brings immeasurable losses to individuals and enterprises.
(3) information tampering
In the process of e-commerce transactions, both parties must ensure that personal information is true and effective, and provide complete personal information, so that the interests of both parties will be well protected and their rights and interests will be avoided. If personal information is inadvertently revealed during the transaction, criminals will master the information, and after stealing the user's information, they will publish and modify the information through technical means, making the information untrue, and then criminals will relocate the information to the transmission location, leading to misjudgment by decision makers and ultimately causing huge economic losses.
3 the application of computer network security technology in e-commerce
In order to ensure the normal development and operation of e-commerce industry, and to improve and upgrade the e-commerce network environment, it is necessary to take some necessary measures or ways to effectively manage the whole network environment, so as to reduce and eliminate security risks under the control of network security technology.
(1) Install a firewall
Everyone who uses computing knows that a firewall is usually set in the computer protection system to intercept or remove interference factors, and the firewall is also suitable for the establishment and protection of e-commerce network security system. Because the firewall has strong identification ability and regional division ability, it can not only provide a strong guarantee for the e-commerce network system, but also make the whole internet transaction process safer and more reliable through effective reconnaissance, filtering and screening of data. Many large enterprises use independent network systems, so they need to use firewalls to connect with independent external network systems, and at the same time, they need centralized and unified network services, so as to protect enterprise networks in the process of information transmission.
(2) Personal identity authentication
Personal identity authentication refers to a detection method for individuals who conduct information transactions in order to ensure the authenticity and integrity of parameters or data in the transaction. Through identity comparison and verification, the information holder is verified to prevent criminals from stealing, modifying or even forging user data. At present, the most commonly used authentication methods are fingerprint identification, human scanning identification and so on. These identification methods mainly use personal characteristics and compare system data to verify identity, which has high recognition and operability. Using this authentication method in e-commerce transactions can greatly enhance the security of information, help the network system to save and extract information, and promote the development and growth of e-commerce network market to a certain extent.
4 conclusion
Through the description of this article, it is obvious that e-commerce and computer network system are inseparable. However, due to the particularity of e-commerce system, it is easily threatened by security problems. Only by reasonably arranging and applying computer network security technology in e-commerce can we ensure that the e-commerce network system is not infringed and better play its due role in the development of state-owned economy.
refer to
[1] research on the application of computer technology and the development of e-commerce [J]. Journal of Taiyuan City Vocational and Technical College, 20 13(08).
[2] Shen Guoxiang. Application of computer security technology in e-commerce [J]. Computer CD-ROM software and application, 20 12( 15).
Jia yajuan Discussion on the application of computer security technology in electronic commerce [J]. Journal of changchun university of science and technology, 20 1 1(03).
?
Related articles about computer papers:
1. Computer paper
2. There are papers about computers.
3. Computer technology papers
4. Computer Grade Examination Paper
5. Computer-related graduation thesis
6. A short article about computers