Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (7): 56-58    DOI:
Current Issue | Archive | Adv Search |
Research on the Data Acquisition Network Model Based on Communication Accounting
Luo Haibo
China Telecom co., LTD Hechi Branch
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  There are many kinds of communication accounting methods, so the data acquisition becomes the most important work in the modern communication enterprise. This paper mainly analyzes on the the status quo of the data acquisition and transmission system of communication network accounting, and the data collection network model. Through the elaboration of this paper, we can provide some references for the application of data acquisition network mode of communication accounting.
Key wordscommunication accounting      data collection      network      mode     
Published: 13 November 2017
:  TN923  

Cite this article:

Luo Haibo. Research on the Data Acquisition Network Model Based on Communication Accounting. Computer & Telecommunication, 2016, 1(7): 56-58.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I7/56

[1] LI Gai GUO Ze-hao. TrustOCCR: Social One Class Collaborative Ranking Recommendation Algorithm by Trust[J]. 电脑与电信, 2024, 1(6): 7-10.
[2] JIN Yan. Research on DDoS Attack Detection Technology based on SDN [J]. 电脑与电信, 2024, 1(6): 26-30.
[3] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[4] ZHAO Han-qing CHEN Xin-fang YANG Li-jia WANG Shi-wei LIU Yi-qing. LSTM-based Groundwater Level Prediction and Anomaly Analysis of Earthquake Precursors [J]. 电脑与电信, 2024, 1(6): 68-72.
[5] XU Jian-lin JIANG Jing WANG Kai-gui ZHAO Ping-zhong. Research on the Optimization Measures and Application of High-speed Railway Private Network [J]. 电脑与电信, 2024, 1(6): 85-94.
[6] XIE Shu-min  ZHUO Wen-hao. Construction and Application of Blended Learning Mode Supported by Intelligent Technology[J]. 电脑与电信, 2024, 1(5): 26-.
[7] YAN Mei. Research on the Closed-loop Management Model of Vocational Courses --Take Windows Server Operating System Management for Example[J]. 电脑与电信, 2024, 1(5): 31-.
[8] WANG Yu-lin WANG Jin-heng ZHAO Yu-qi XIE Xiao-hui. Teaching Innovation and Practice of "Triple Optimization and Innovation" in the Course of Database Principle and Application in Private Universities under the Background of Information Technology Innovation[J]. 电脑与电信, 2024, 1(5): 42-.
[9] REN Hao. Expression Recognition Method Combined with Attention Feature Fusion[J]. 电脑与电信, 2024, 1(5): 71-.
[10] WANG Jin WANG Rui. Facial Expression Recognition Algorithm Based on Multi-scale Feature Deep Learning[J]. 电脑与电信, 2024, 1(5): 75-.
[11] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[12] YUAN Li-ning, XING Zhong-yu, YANG Guo-yi LUO Heng-yu.
Crime Organization Member Relationship Prediction Based on Graph Embedding Model
[J]. 电脑与电信, 2024, 1(4): 1-5.
[13] LI Chun-ping CHEN Xiao-wen ZHANG Shu-rong ZHANG Xiang-min.
Research on the Evaluation of Teaching Quality of Online Courses on Chaoxing Platform
Based on Big Data Analysis
[J]. 电脑与电信, 2024, 1(4): 14-19.
[14] RU Chun-rui  DANG Xiao-chao. CSI-based Indoor Localization Method Using IDW Interpolation and Amplitude-phase Fusion Network[J]. 电脑与电信, 2024, 1(3): 1-6.
[15] WU Guo-song. The Implementation of IPv6 Network Deployment and IPv4 Network Security Reinforcement for Web Application Systems Based on Intelligent DNS and Reverse Proxy[J]. 电脑与电信, 2024, 1(3): 7-.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd