[1] |
QI Jun1, 2, QU Ruiting2, JIAO Chuanming2, ZHOU Qiaoni2, GUO Yanliang3, TAN Wenjun3.
Enhanced Big Language Model Dual Carbon Domain Services Based on Knowledge Graph
[J]. Computer and Modernization, 2024, 0(09): 8-14.
|
[2] |
LI Qiming1, YANG Xia1, FANG Wenyu1, SUN Haiyong2.
Two-level Priority Scheduling Algorithm for μC/OS-II
[J]. Computer and Modernization, 2024, 0(06): 33-37.
|
[3] |
LI Shi-yue, MENG Jia-na, YU Yu-hai, LI Xue-ying, XU Ying-ao.
Aspect Based Sentiment Analysis Model Based on Knowledge Enhancement
[J]. Computer and Modernization, 2023, 0(10): 1-8.
|
[4] |
HONG Tao, ZHU Peng-yu, GUO Bo, WANG Jing-Yu.
Communication Fault Diagnosis Knowledge Base Construction and Iteration Based on Semi-supervised Clustering
[J]. Computer and Modernization, 2023, 0(02): 28-33.
|
[5] |
CHU Su-hong, LIU Lei, .
POF Protocol Parser
[J]. Computer and Modernization, 2022, 0(09): 93-98.
|
[6] |
LIU Qiang, LI Qiao, BAO Xiao.
Data Acquisition Architecture Based on Domestic TCM Chip Encryption and Edge Cloud Collaborative Architecture
[J]. Computer and Modernization, 2022, 0(08): 94-98.
|
[7] |
ZHANG Xi, WANG Jian.
A Public Integrity Auditing Scheme Based on Blind Signature for Shared Data in Cloud
[J]. Computer and Modernization, 2020, 0(04): 60-.
|
[8] |
SU Lin-ping, AN Ran, LI Wei, CUI Wen-chao, ZHANG Xiao-liang.
Design of Power Operation and Maintenance Audit System Based on Hadoop
[J]. Computer and Modernization, 2020, 0(01): 49-.
|
[9] |
SHAO Jinwei1, LIN Jun2, LIU Yating3, XIAO Jiali4.
Detection of Potential Audit Doubts Based on Improved Leaders Operator
[J]. Computer and Modernization, 2018, 0(04): 79-.
|
[10] |
GUO Yi, YANG Wei-yong, LIU Wei.
Formal Verification Method of Secure Operating System Based on Isabelle/HOL
[J]. Computer and Modernization, 2017, 0(4): 99-104.
|
[11] |
WANG Can-can1, ZHAO Feng-yu1, WANG Yong2.
Plug-in Type Intelligent Anesthesia System
[J]. Computer and Modernization, 2014, 0(7): 94-97+103.
|
[12] |
GAO Ming, QIU Quan, QI Ji-yun, YU Hong-bo.
Applications of 802.11n Wireless LAN for Building Environment
[J]. Computer and Modernization, 2014, 0(10): 85-91.
|
[13] |
CHEN Gao-feng1, TANG Xiao-ming 2.
Study on Stack Analysis of Safety Critical System
[J]. Computer and Modernization, 2014, 0(1): 226-230.
|
[14] |
XIAO Leilei;SHI Erna.
Design and Implementation of USB Device for Automatically Identifying Operating System
[J]. Computer and Modernization, 2013, 1(6): 236-238.
|
[15] |
XU Liang;.
Modeling of Improved BLP Model and Its Applications
[J]. Computer and Modernization, 2013, 1(4): 193-197.
|