Cyber-attacks are becoming more sophisticated and frequent[2] in today's environment of growing connectivity. To safeguard networks and systems, it is essential to establish efficient and effective security soluti...
详细信息
To address the problem that the DV-Hop localization model for wireless sensor networks can no longer meet the current localization accuracy requirements, this paper proposes the concept of beacon node trustworthiness ...
详细信息
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due ...
详细信息
The factors affecting the transmission performance of LORA technology are further studied to deepen the analysis and understanding of the quality of the communication links of LOAR technology. In this paper, we study ...
详细信息
Lithium-ion batteries are a crucial component of new energy. Studying the fault diagnosis method of the batteries can ensure the safety of the system during operation. In this paper, a diagnosis method is studied base...
详细信息
The DC resistivity method uses the inherent conductive differences of subsurface materials as the basis for exploration to observe the earth's electric field, while human activities, nature and solar storms can ca...
详细信息
Aiming at the problems of insufficient feature extraction and inaccurate prediction in existing aircraft engines remaining useful life prediction algorithms, a fusion model based on feature attention mechanism, stacke...
详细信息
Image degradation due to fog and haze is a common problem in the field of life and image research. This article will be designed and implemented of image haze removal algorithm. The traditional methods have some probl...
详细信息
Deep Learning and its techniques have reformed the fields of NLP, Image Processing, computer vision, speech recognition, and many other fields. Day by day, the evolutionary changes have been made in deep learning arch...
详细信息
In this paper, the introduction of big data technology, from the hardware and software two aspects of communication security protection system design research. With the support of hardware equipment, the secure commun...
详细信息
暂无评论