CINXE.COM
Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology-Electronic Engineering and Applications-Hill Publishing Group
<!doctype html> <html lang="en"> <head> <meta charset="utf-8" /> <title>Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology-Electronic Engineering and Applications-Hill Publishing Group</title> <meta content="width=device-width, initial-scale=1" name="viewport" /> <meta content="Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology-Electronic Engineering and Applications-Hill Publishing Group" name="description"/> <meta content="Electronic Engineering and Applications-Hill Publishing Group" name="keywords" /> <meta name="title" content="Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology" /> <meta name="author" content="Chang Liu" /> <meta name="description" content="In our modern society, computer has been widely used in People's Daily life and work, and then the computer electronic information engineering technology (ECET) produced to promote the development of its role, will effectively reduce communication distance, people in modern society to promote the efficiency of people and the working efficiency is significantly increased. It brings color to people's life and all walks of life. However, although the development of ECET and its neck for our social and economic development has played a driving role, at the same time the influence is great, but to ensure the safety of the network and information also need to consider and discuss the safety and advantages of ECET application. This paper is mainly to study the characteristics of ECET, so as to in-depth discussion and analysis of its application in engineering safety situation and advantages." /> <meta name="DOI" content="http://dx.doi.org/10.26855/eea.2024.12.004"/> <meta name="dc.title" content="Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology" /> <meta name="dc.source" content="Electronic Engineering and Applications" /> <meta name="dc.creator" content="Chang Liu" /> <meta name="dc.type" content="Article"/> <meta name="dc.date" content="2024/11/26 0:00:00" /> <meta name="dc.identifier" content="DOI:http://dx.doi.org/10.26855/eea.2024.12.004" /> <meta name="dc.publisher" content="Hill Publishing Group Inc" /> <meta name="dc.rights" content="http://creativecommons.org/licenses/by/3.0/" /> <meta name="dc.format" content="text/html" /> <meta name="dc.language" content="en" /> <meta name="dc.description" content="In our modern society, computer has been widely used in People's Daily life and work, and then the computer electronic information engineering technology (ECET) produced to promote the development of its role, will effectively reduce communication distance, people in modern society to promote the efficiency of people and the working efficiency is significantly increased. It brings color to people's life and all walks of life. However, although the development of ECET and its neck for our social and economic development has played a driving role, at the same time the influence is great, but to ensure the safety of the network and information also need to consider and discuss the safety and advantages of ECET application. This paper is mainly to study the characteristics of ECET, so as to in-depth discussion and analysis of its application in engineering safety situation and advantages." /> <meta name="dc.subject" content="Computer" /> <meta name="dc.subject" content="Application" /> <meta name="dc.subject" content="Electronic Information and Engineering Technology" /> <meta name="dc.subject" content="Security" /> <meta name="dc.copyright" content="Electronic Engineering and Applications" /> <meta name="dc.rightsAgent" content="EEA@hillpublish.com" /> <meta name="prism.publicationName" content="Electronic Engineering and Applications" /> <meta name="prism.publicationDate" content="2024/11/26 0:00:00" /> <meta name="prism.volume" content="1" /> <meta name="prism.issue" content="1" /> <meta name="prism.rightsAgent" content="EEA@hillpublish.com" /> <meta name="prism.copyright" content="Electronic Engineering and Applications" /> <meta name="prism.url" content="https://www.hillpublisher.com/ArticleDetails/4050" /> <meta name="prism.doi" content="http://dx.doi.org/10.26855/eea.2024.12.004" /> <meta name="prism.section" content="Article" /> <meta name="prism:pdfurl" content="https://www.hillpublisher.com/UpFile/202411/20241127113351.pdf" /> <meta name="og:url" content="https://www.hillpublisher.com/ArticleDetails/4050" /> <meta name="og:type" content="Article" /> <meta name="og:site_name" content="HillPublisher" /> <meta name="og:title" content="Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology" /> <meta name="og:description" content="In our modern society, computer has been widely used in People's Daily life and work, and then the computer electronic information engineering technology (ECET) produced to promote the development of its role, will effectively reduce communication distance, people in modern society to promote the efficiency of people and the working efficiency is significantly increased. It brings color to people's life and all walks of life. However, although the development of ECET and its neck for our social and economic development has played a driving role, at the same time the influence is great, but to ensure the safety of the network and information also need to consider and discuss the safety and advantages of ECET application. This paper is mainly to study the characteristics of ECET, so as to in-depth discussion and analysis of its application in engineering safety situation and advantages." /> <meta name="citation_title" content="Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology" /> <meta name="citation_description" content="In our modern society, computer has been widely used in People's Daily life and work, and then the computer electronic information engineering technology (ECET) produced to promote the development of its role, will effectively reduce communication distance, people in modern society to promote the efficiency of people and the working efficiency is significantly increased. It brings color to people's life and all walks of life. However, although the development of ECET and its neck for our social and economic development has played a driving role, at the same time the influence is great, but to ensure the safety of the network and information also need to consider and discuss the safety and advantages of ECET application. This paper is mainly to study the characteristics of ECET, so as to in-depth discussion and analysis of its application in engineering safety situation and advantages." /> <meta name="citation_author" content="Chang Liu" /> <meta name="citation_publication_date" content="2024/11/26 0:00:00" /> <meta name="citation_journal_title" content="Electronic Engineering and Applications" /> <meta name="citation_volume" content="1" /> <meta name="citation_issue" content="1" /> <meta name="citation_doi" content="http://dx.doi.org/10.26855/eea.2024.12.004" /> <meta name="citation_id" content="4050" /> <meta name="citation_fulltext_html_url" content="https://www.hillpublisher.com/ArticleDetails/4050" /> <meta name="citation_pdf_url" content="https://www.hillpublisher.com/UpFile/202411/20241127113351.pdf" /> <link href="/css/hillpub.css" type="text/css" rel="stylesheet"> <script type="text/ecmascript" src="/js/tab.js"></script> <script type="text/javascript" src="/js/jquery1.3.2.js"></script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Article", "name": "Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology", "author": "Chang Liu", "datePublished": "2024/11/26 0:00:00", "url": "https://www.hillpublisher.com/ArticleDetails/4050", "identifier": "http://dx.doi.org/10.26855/eea.2024.12.004", "abstract": "In our modern society, computer has been widely used in People's Daily life and work, and then the computer electronic information engineering technology (ECET) produced to promote the development of its role, will effectively reduce communication distance, people in modern society to promote the efficiency of people and the working efficiency is significantly increased. It brings color to people's life and all walks of life. However, although the development of ECET and its neck for our social and economic development has played a driving role, at the same time the influence is great, but to ensure the safety of the network and information also need to consider and discuss the safety and advantages of ECET application. This paper is mainly to study the characteristics of ECET, so as to in-depth discussion and analysis of its application in engineering safety situation and advantages.", "publisher": "Hill Publishing Group Inc" }</script> <script type="text/javascript"> $(document).ready(function () { $('.menutitle').click(function () { if ($(this).siblings('ul').css('display') == 'none') { $(this).parent('li').siblings('li').removeClass('active'); $(this).addClass('active'); $(this).siblings('ul').slideDown(100).children('li'); if ($(this).parents('li').siblings('li').children('ul').css('display') == 'block') { $(this).parents('li').siblings('li').children('ul').parent('li').children('a').removeClass('active'); $(this).parents('li').siblings('li').children('ul').slideUp(100); } } else { $(this).removeClass('active'); $(this).siblings('ul').slideUp(100); $(this).siblings('ul').children('li').children('ul').parent('li').children('a').addClass('active'); $(this).siblings('ul').children('li').children('ul').slideUp(100); $(this).siblings('ul').children('li').children('a').removeClass('active'); } }) }); </script> <script type="text/javascript"> var browser = { versions: function () { var u = navigator.userAgent, app = navigator.appVersion; return { trident: u.indexOf('Trident') > -1, presto: u.indexOf('Presto') > -1, webKit: u.indexOf('AppleWebKit') > -1, gecko: u.indexOf('Gecko') > -1 && u.indexOf('KHTML') == -1, mobile: !!u.match(/AppleWebKit.*Mobile.*/), ios: !!u.match(/\(i[^;]+;( U;)? CPU.+Mac OS X/), android: u.indexOf('Android') > -1 || u.indexOf('Linux') > -1, iPhone: u.indexOf('iPhone') > -1, iPad: u.indexOf('iPad') > -1, webApp: u.indexOf('Safari') == -1, weixin: u.indexOf('MicroMessenger') > -1, qq: u.match(/\sQQ/i) == " qq" }; } (), language: (navigator.browserLanguage || navigator.language).toLowerCase() } var myUrl = window.location.href; var id = 0; if (myUrl.indexOf('cid') > -1) { id = getQueryString("cid"); } if (browser.versions.mobile || browser.versions.ios || browser.versions.android || browser.versions.iPhone || browser.versions.iPad) { window.location = "https://wap.hillpublisher.com/ArticleDetails.aspx?cid=" + 4050; } // var myUrl = window.location.href; // var ishttps = 'www.' == document.location.protocol ? true : false; // if (ishttps) { // window.location = "https://hillpublisher.com/ArticleDetails/" + 4050 // } function getQueryString(name) { var reg = new RegExp("(^|&)" + name + "=([^&]*)(&|$)", "i"); var r = window.location.search.substr(1).match(reg); if (r != null) return unescape(r[2]); return null; } </script> </head> <body> <form name="form1" method="post" action="4050?cid=4050" id="form1"> <div> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> <input type="hidden" name="__EVENTARGUMENT" id="__EVENTARGUMENT" value="" /> <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="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" /> </div> <script type="text/javascript"> //<![CDATA[ var theForm = document.forms['form1']; if (!theForm) { theForm = document.form1; } function __doPostBack(eventTarget, eventArgument) { if (!theForm.onsubmit || (theForm.onsubmit() != false)) { theForm.__EVENTTARGET.value = eventTarget; theForm.__EVENTARGUMENT.value = eventArgument; theForm.submit(); } } //]]> </script> <div> <input type="hidden" name="__EVENTVALIDATION" id="__EVENTVALIDATION" value="/wEdAAN/vLeYfvddVWmmNQOugf90IRYTnsGeR3S+QL5KOqHt2QjiAw6kesu0yD5DciVvI1epazcw+pjPNn39ozDYWalvZi+Rd7FTKcfV6sP3IZfTnQ==" /> </div> <div class="main_box"> <div class="nav_box nav_boxny"> <div class="nav"> <div class="logo"> <img src="/images/logo.png" alt="hilllogo"> </div> <a href="https://www.hillpublisher.com/Index">Home</a> <a href="https://www.hillpublisher.com/Journals">Journals</a> <a href="https://www.hillpublisher.com/Books">Books</a> <a href="https://www.hillpublisher.com/ForAuthors">For Authors and Reviewers</a> <a href="https://www.hillpublisher.com/OnlineSubmission">Online Submission</a> <a href="https://www.hillpublisher.com/NewsList">News</a> <a href="https://www.hillpublisher.com/AboutUs">About Us</a> <a href="https://www.hillpublisher.com/ContactUs">Contact Us</a> <div class="spacer"></div> <a class="search" href="/ArtucleSearch">Search</a> </div> <!--end nav--> </div> <!--end nav_box--> <div class="qkheadbox"> <div class="qkhead"> <div class="qkmc_tp"> <div class="qktp"><img src="https://www.hillpublisher.com//UpFile/202408/20240802182130.jpg" alt="magazinelogo"></div> <div class="qkgk"> <h2><a href="https://www.hillpublisher.com/Journals/eea/">Electronic Engineering and Applications</a></h2> <table class="qkgktab"> <tr> <td style="color: #2267c7;">Downloads: 395</td> <td style="color: #2267c7;">Total View: 6039</td> </tr> <tr> <td>Frequency: Annunally</td> <td>ISSN Online: 3066-3172</td> <td>CODEN: </td> </tr> <tr> <td>Email: <a style="color:#2267c7 ; text-decoration:underline" href="mailto:EEA@hillpublish.com">EEA@hillpublish.com</a></td> </tr> </table> </div> <div class="spacer"></div> </div> <!--end qkmc_tp--> </div> <!--end qkhead--> <div class="searchbox"> <div class="searchnr"> <span>Search articles within this journal</span> <input name="MagaHead$keywords" type="text" id="MagaHead_keywords" class="sear_text" placeholder="Keywords" /> <input onclick="__doPostBack('MagaHead$ctl00','')" name="MagaHead$ctl00" type="button" class="sear_bnt" value="Search" /> <a class="submit_art" href="/OnlineSubmission">Submit an article</a> </div> </div> <!--end searchbox--> </div> <!--end qkheadbox--> <div class="qkcont_box"> <div class="qk_left_container left"> <div class="qkmenu"> <h2>Journal Menu</h2> <ul> <li ><a href="/Journals/eea/">Home</a></li> <li ><a href="/Journals/AimsScope/629">Aims & Scope</a></li> <li ><a href="/Journals/EditorBoard/629">Editorial Board</a></li> <li ><a href="/Journals/AuthorGuidelines/629">Authors' Guidelines</a></li> <li ><a href="/Journals/SpecialIssue/629">Special Issue</a></li> <li ><a href="/Journals/ProcessingFees/629">Processing Fees</a></li> <li ><a href="/Journals/Indexing/629">Indexing</a></li> <li ><a href="/Journals/Copyright/629">Copyright</a></li> </ul> </div> <!--end qkmenu--> <div class="Vol_Iss"> <h2>Volumes & Issues</h2> <h3 class="curiss"><a target="_blank" href="/ArticleList.aspx?select=629&year=2024&issue=1&magid=629">Current Issue</a></h3> <ul class="isslist"> <dl class="leftmenu"> <dd> <div class="menutitle"> <span></span>Volume 1 (2024) </div> <ul class="menuson" style="display:none"> <li><a target="_blank" href="/ArticleList.aspx?select=629&year=2024&issue=1&magid=629">Issue 1</a></li> </ul> </dd> </dl> </ul> </div> <!--end Vol_Iss--> </div> <!--end qk_left_container--> <div class="qk_contnr"> <div class="wzqtxx right"> <div class="wzcz"> <p><a class="down" href="/ArticleDetails.aspx?type=PDF&cid=4050">Download PDF</a></p> <p><a class="htsite" href="#fu">How to cite this paper</a></p> <div class="views"> <p class="title-number">301</p> <p class="title-text">TOTAL VIEWS</p> </div> </div> <!--end wzcz--> <div class="more_art"> <h2>More Articles</h2> <ul> <li><a href="/ArticleDetails/4051" target="_blank">Application of Electronic Communication Technology in Instant Communication</a></li> <li><a href="/ArticleDetails/4050" target="_blank">Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology</a></li> <li><a href="/ArticleDetails/4049" target="_blank">Application of Computer Engineering Network Technology in Electronic Engineering</a></li> <li><a href="/ArticleDetails/4048" target="_blank">Research on the Application of Electronic Information Technology in Power Automation Systems</a></li> <li><a href="/ArticleDetails/4047" target="_blank">The Path to Cultivating High-quality Talents in Mechanical and Electronic Engineering in the New Era</a></li> </ul> </div> </div> <!--end wzqtxx--> <div class="wzxqbox"> <div class="type_doi"><i>Article</i> <i style="color: #8e1530">Open Access</i> <span>http://dx.doi.org/10.26855/eea.2024.12.004</span></div> <h1 class="art_title">Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology</h1> <div class="art-authors"> <p>Chang Liu</p><p>Jilin Institute of Electronic Information Products Inspection, Changchun 130021, Jilin, China.</p><p><b>*Corresponding author:</b> Chang Liu</p> </div> <div class="art-affiliations"> </div> <div class="art-pubhistory"> Published: November 26,2024 </div> <ul class="wzzhbox1"> <li id="left" class="preAfter" style="display:block;"> <a href="/ArticleDetails/4047"> <span>Previous article in journal</span> </a> </li> <li id="right" class="next" style="display:block;"> <a href="/ArticleDetails/4049"> <span>Next article in journal</span> </a> </li> </ul> <div class="abt"> <h2>Abstract</h2> <p><p>In our modern society, computer has been widely used in People's Daily life and work, and then the computer electronic information engineering technology (ECET) produced to promote the development of its role, will effectively reduce communication distance, people in modern society to promote the efficiency of people and the working efficiency is significantly increased. It brings color to people's life and all walks of life. However, although the development of ECET and its neck for our social and economic development has played a driving role, at the same time the influence is great, but to ensure the safety of the network and information also need to consider and discuss the safety and advantages of ECET application. This paper is mainly to study the characteristics of ECET, so as to in-depth discussion and analysis of its application in engineering safety situation and advantages.</p></p> </div> <div class="re" > <h2>References</h2> <p>[1] Yu Wuyan, Shi Yehong, Lei Yu, et al. Application and security analysis of computer electronic information engineering technology[J]. Wireless Internet Technology, 2021, 18(13): 85-86.</p><p>[2] Guo Peng. Research on the application and security of computer technology in electronic information engineering[J]. Electronic Components & Information Technology, 2021, 5(9): 9-10.</p><p>[3] Xu Zhongping. Research on the application and security management of computer electronic information engineering technology[J]. Science and Wealth, 2020(6): 174.</p><p>[4] Liu Yizhen. Research on the application and security of computer electronic information engineering technology in my country[J]. Information Recording Materials, 2021, 22(1): 46-47.</p><p>[5] Zhang Zhenning. Research on the application and security of computer electronic information engineering technology in my country[J]. Digital Design (Part 2), 2021, 10(3): 50.</p><p>[6] Tong Lan, Deng Guiyuan. Research on the application of computer network technology in electronic information engineering[J]. Computer Knowledge and Technology, 2021, 17(28): 173-174.</p><p>[7] Xu Dongbin. The legal status and practical application of food safety standards and food testing standards. Food Safety Guide, 2020(15):13.</p><p>[8] Liu Jianan. Application of computer network technology in hospital information management. Health Care Guide, 2018 (49): 227.</p> </div> <div class="ftex" id="fu"> <h2>How to cite this paper</h2> <p><b>Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology</b></p><p><b>How to cite this paper:</b> Chang Liu. (2024) Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology. <i>Electronic Engineering and Applications</i>, <b>1</b>(<b>1</b>), 15-18.</p><p>DOI: http://dx.doi.org/10.26855/eea.2024.12.004</p> </div> </div> <!--end wzxqbox--> </div> <!--end qk_contnr--> </div> <!--end qkcont_box--> <div class="footer"> <div class="foot_nav"><a href="/Index" title="Home">Home</a> | <a href="/Journals" title="Journals">Journals</a> | <a href="/Books" title="Books">Books</a> | <a href="/ForAuthors" title="For Authors and Reviewers">For Authors and Reviewers</a> | <a href="/OnlineSubmission" title="Online Submission">Online Submission</a> | <a href="ContactUs" title="Contact Us">Contact Us</a> | <a href="/AboutUs" title="About Us">About Us</a></div> <p>Copyright © 2023 Hill Publishing Group Inc. All Rights Reserved.</p> </div> <!--end footer--> </div> <!--end main_box--></form> </body> </html>