The proceedings contain 82 papers. The topics discussed include: rogue nodes detection using idle parking resources;analysis of node importance of satellite network based on triangular motif;research on web configurat...
ISBN:
(纸本)9798400716683
The proceedings contain 82 papers. The topics discussed include: rogue nodes detection using idle parking resources;analysis of node importance of satellite network based on triangular motif;research on web configuration software interactivity enhancement technology based on Vue and component library;design and implementation of power communication protocol plug-in based on hot loading;cross polarization interference cancellation algorithm based on maximum likelihood for satellite communication;research on machinelearning and state grid business risk prevention and control based on the Internet;design and implementation of intelligent radar anti-jamming simulation system;application of artificial bee colony algorithm in power communicationnetwork routing optimization simulation;and research on intelligent recommendation model for application systems.
Although encrypted traffic ensures information security, it can also be exploited by malicious actors, leading to security risks. This paper addresses the limitations of existing behavior recognition technologies, par...
详细信息
In the digital age, the protection of data assets in the enterprise cybersecurity space has become critical. This paper explores a deep learning-based data asset protection technique that aims to solve the challenges ...
详细信息
In recent years, the rapid development of the Internet industry has made the network traffic show a diversified trend. Different application services have different characteristics and have different requirements on n...
详细信息
The proceedings contain 27 papers. The topics discussed include: a load prediction method for data transmission in optical communicationnetworks based on LSTM model;Bayesian-LightGBM classification prediction model o...
ISBN:
(纸本)9798400711688
The proceedings contain 27 papers. The topics discussed include: a load prediction method for data transmission in optical communicationnetworks based on LSTM model;Bayesian-LightGBM classification prediction model of tennis match situation change;supplement to decomposition of mean squared error of weighted geometric mean combined forecasting method;reconstructing cosmic observations with artificial neural networks: a test of Hubble constant;a routing method for flying ad hoc networks based on node degree estimation and game-theoretic forwarding strategy;the study of a distributed networking method based on an improved raft protocol;research on network security spatial data asset protection technology based on deep learning;and introduction to integration technology based on dispatch telephone and human machine workstation.
The massive transmission of data in optical communicationnetworks leads to an increase in the load of optical communication channels, making it more difficult to predict data transmission loads. A data transmission l...
详细信息
Submarines are vital for military defense and national security in strategic communication systems. Power Spectral Density (PSD) characterizes signal spectrum frequency dependence and is crucial for analyzing broadban...
详细信息
Considering that UAV, serving as base stations, can enhance the flexibility of communication system transmission, reduce transmission delays, and provide temporary communication, this paper proposes a NOMA-assisted UA...
详细信息
In order to solve the problem of independence and cannot linkage between the traditional dispatching telephone and dispatching control system, better meet the uploading and issuing of dispatching instructions, as well...
详细信息
The identification of communication jamming is a pivotal aspect of cognitive electronic warfare, which is of paramount importance for the advancement of jammer and radar capabilities. Traditional methodologies are sig...
详细信息
暂无评论