The development of terminology is the greatest and also most significant job of 12 learners. Four fundamental linguistic ability, such as speech, attending, thinking, and written, play a vital part in developing langu...
详细信息
In this paper, an augmented Lagrange method is constructed to solve the second-order cone constrained variational inequality problem. From the perspective of practical application, the Lagrange iterative formula is tr...
详细信息
In order to realize on-line real-time monitoring of vehicle running status in enterprises, improve vehicle running supervision ability and vehicle mileage calculation accuracy, and improve vehicle compliance travel le...
In order to realize on-line real-time monitoring of vehicle running status in enterprises, improve vehicle running supervision ability and vehicle mileage calculation accuracy, and improve vehicle compliance travel level, vehicle position positioning and track data collection are realized based on GPS positioning technology by installing vehicle intelligent terminal, and the positioning data are transmitted to the management platform through data communication service, real-time viewing and track playback of vehicle position and track are carried out through Siji map service through data receiving, processing and optimization processes. After filtering abnormal trajectory points, completing missing trajectory points and correcting trajectory, the vehicle trajectory can be fitted effectively, and the quality of vehicle trajectory data can be enhanced. Based on this, the purpose of vehicle mileage calculation optimization can be realized [1].
In this paper, a model of active distribution network safety monitoring system based on big data mining platform is established. This model combines multiple detection techniques and uses three-stage detection methods...
In this paper, a model of active distribution network safety monitoring system based on big data mining platform is established. This model combines multiple detection techniques and uses three-stage detection methods in the analysis equipment engine. A fuzzy encryption processing model of power flow information is proposed, which can improve the computing efficiency of static security analysis of power system under cloud computing environment on the premise of ensuring power flow information security. Through the simulation analysis of the fault diagnosis example, the results show that the proposed fault diagnosis algorithm is fast, accurate and effective.
To understand the role of the human rating and automatic writing evaluator (AWE), we compared their scores. There was a notable score difference in Focus and Purposes as a metric. This result indicated the need to val...
详细信息
This study addresses the issue of sensitive data protection in cloud computing environments and proposes a solution that combines Attribute-Based Encryption with the Rivest-Shamir-Adleman encryption algorithm to safeg...
This study addresses the issue of sensitive data protection in cloud computing environments and proposes a solution that combines Attribute-Based Encryption with the Rivest-Shamir-Adleman encryption algorithm to safeguard the data. The proposed solution enables efficient two-way encrypted communication using this two-level encryption approach. The advantages of this solution include enhanced access control, ensuring that only users with appropriate attributes can access the data, and strong security achieved through the combination of Attribute-Based Encryption (ABE) and Rivest-Shamir-Adleman (RSA) algorithms, effectively defending against man-in-the-middle (MITM) attacks and data leakage risks.
In promoting diversified education and interdisciplinary learning, the traditional education method has gradually changed from using textbooks to multimedia teaching with videos and pictures. STEAM interdisciplinary e...
详细信息
many organizations such as online organizations, hospitals, and universities use massive amounts of customer information and use database systems to enter their data. Many services and benefits are provided by these o...
详细信息
In this paper, we propose a new method for image encryption based on a modified RC4 stream cipher algorithm that scrambles image pixels before applying the XOR encryption function. We compare the performance of the pr...
详细信息
Healthcare services save the life of human beings by making timely effective decisions. The use of data mining tools is crucial for decision making, forecasting, and disease prediction. In this study, data mining algo...
详细信息
暂无评论