Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240500045-8.doi: 10.11896/jsjkx.240500045
• Big Data & Data Science • Previous Articles Next Articles
WANG Yun1,2, ZHAO Jianming2, GUO Yifeng2, ZHOU Huanhuan2, ZHOU Wuai2, ZHANG Wanzhe2, FENG Jianhua1
CLC Number:
[1]WANG Q,SHENG Y.Establishment of enterprise IT service management system based on ITIL practice [J].Scientific Research,2016(6):283. [2]GU J,WANG Z.Evaluation and practice of provincial digitalgovernment construction index in China [J].Shanghai Economy,2023,37(3):14-15 [3]CUI X F,FAN H Q.Outlook on the development trend of China’s digital government construction in the new era [J].Digital Economy,2023,4(1):28-100. [4]MA J,ZHOU J,LI Z W,et al.Research on operation and maintenance mode of information system in cloud computing environment [J] Power Information and Communication Technology,2015,13(8):140-144. [5]FENG D G,ZHANG M,LI H.Big Data security and privacyprotection [J].Chinese Journal of Computer,2014,37(1):12-246. [6]LI Z S.Security threat analysis of cloud computing [J].Communications Technology,2012,29(4):132-280. [7]LI H,SUN W H,LI F H,et al.Review on data security and privacy protection technology of public Cloud Storage services [J].Journal of Computer Research and Development,2014,7(4):3-68. [8]WEST D.Digital Government:Technology and Public DomainPerformance[M].Science Press,2011. [9]XU Y J,HU Y,SHANGGUAN X L.Overview of data security standardization in China [J].China Information Security,2019,9(3):1-25. [10]WEI S Y.The responsibility of network operators for the security management of third-party applications from the Facebook data breach [J].Cyberspace Security,2018,4(3):1-12. [11]GUO ZN,MENG F R.Research on performance optimization of relational Database [J].Computer Engineering and Design,2006,27(23):4-32. [12]WU Z Q,GUO J,WEI C Q,et al.A database operation and maintenance method and its device:CN2021112 54912.8[P].CN211 1254912.8[2023-08-26]. [13]AN J P.Solution of Oracle Database Optimization Design and automated operation and maintenance [J].Electronic World,2018,2(17):17-112. [14]WANG F,ZHANG X J.Design of database security policy based on Virtual User Management [J].Network Security Technology and Application,2012,5(7):235-438. [15]HUANG L S,ZHANG F,ZHANG X F,et al.Heterogeneousdatabase security synchronization system based on network gate [J].Journal of Dali University,2022,7(12):25-30. [16]WANG Z L.How to optimize SQL statements to improve database efficiency [J].Consumer Electronics,2014(24):196-196. [17]LI M,TIAN H.Management and operation strategy of database in cloud computing environment [J].Information Technology,2017,21(5):56-60. [18]ZHAO G H,YANG X L.Research on Database operation and Maintenance Automation for Big Data [J].Electronic Science and Technology,2018,30(4):112-116. [19]ZHANG Q,SUN W.Performance optimization Method in Database operation and Maintenance [J].Computer Engineering,2016,42(9):23-29. [20]LIU J H,CHENG Y Q.Exploration of automatic mode of database operation and maintenance based on AI technology [J].Electronic Technology and Software Engineering,2020,38(8):7-12. |
[1] | LIANG Binghao, ZHANG Chuangang, YUAN Mingming. Large Model Driven AI Application Service Platform [J]. Computer Science, 2025, 52(6A): 240900022-4. |
[2] | LIU Qingyun, YOU Xiong, ZHANG Xin, ZUO Jiwei, LI Jia. Review of Path Planning Algorithms for Mobile Robots [J]. Computer Science, 2025, 52(6A): 240900074-10. |
[3] | SU Zhiyuan, ZHAO Lixu, HAO Zhiheng, BAI Rufeng. Suvery of Artificial Intelligence Ensuring eVTOL Flight Safety in the Context of Low-altitudeEconomy [J]. Computer Science, 2025, 52(6A): 250200050-13. |
[4] | YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8. |
[5] | TU Ji, XIAO Wendong, TU Wenji, LI Lijian. Application of Large Language Models in Medical Education:Current Situation,Challenges and Future [J]. Computer Science, 2025, 52(6A): 240400121-6. |
[6] | TAN Zhengyuan, ZHONG Jiaqing, CHEN Juan. AI+HPC:An Overview of Supercomputing System Software and Application Technology Development Driven by “AI+” [J]. Computer Science, 2025, 52(5): 1-10. |
[7] | WANG Yifei, ZHANG Shengjie, XUE Dizhan, QIAN Shengsheng. Self-supervised Backdoor Attack Defence Method Based on Poisoned Classifier [J]. Computer Science, 2025, 52(4): 336-342. |
[8] | WANG Yuan, HUO Peng, HAN Yi, CHEN Tun, WANG Xiang, WEN Hui. Survey on Deep Learning-based Meteorological Forecasting Models [J]. Computer Science, 2025, 52(3): 112-126. |
[9] | ZHANG Tao. Coherent Legal Governance of Synthetic Data in AI Training [J]. Computer Science, 2025, 52(2): 20-32. |
[10] | JIANG Rui, YANG Kaihui, WANG Xiaoming, LI Dapeng, XU Youyun. Attentional Interaction-based Deep Learning Model for Chinese Question Answering [J]. Computer Science, 2024, 51(6): 325-330. |
[11] | GUO Shangzhi, LIAO Xiaofeng, XIAN Kaiyi. Logical Regression Click Prediction Algorithm Based on Combination Structure [J]. Computer Science, 2024, 51(2): 73-78. |
[12] | WANG Wentong, ZHANG Zhijun, ZHANG Mingyang. Review of Key Technologies,Research Progress and Applications of Metaverse [J]. Computer Science, 2024, 51(12): 2-11. |
[13] | RAO Yi, YUAN Bochuan, YUAN Yubo. Recognition Method of Online Classroom Interaction Based on Learner State [J]. Computer Science, 2024, 51(11A): 231200133-9. |
[14] | JIN Xinhao, CHI Kaikai. Lightweight and Efficient Recognition Method for Chinese Character Click-based CAPTCHA [J]. Computer Science, 2024, 51(11A): 240100031-9. |
[15] | XU Jun, ZHOU Peijin, ZHANG Haijing, ZHANG Hao, XU Yuzhong. Analysis of User Evaluation Indicator for AIGC Digital Illustration Design Principles [J]. Computer Science, 2024, 51(11): 47-53. |
|