the research of IOT (internet of things) technology is the product of the continuous development of the information age. the impact of IOT technology on human production and life is gradually increasing, and IOT encry...
详细信息
Computer systems are vulnerable to information theft as a result of the extensive use of the internet, which has caused an increase in security defence mechanisms. In order to overcome these theft various approaches h...
详细信息
It is needless to mention that the proven capability of cloud computing and digital twin-based monitoring and control systems will play a major role in the implementation of digital twin-based lithium-ion battery mana...
详细信息
Route optimization is a key core technology to optimize network traffic distribution, achieve network load balancing, and improve network performance. Traditional distributed networks widely run shortest-path based ro...
详细信息
Online analytical processing plays a crucial role in data analysis by providing a powerful framework for efficiently exploring and understanding multidimensional data. Withthe increasing complexity and volume of data...
详细信息
distributed Effect Evaluation Algorithm of the computer English online platform based on Hibernate Task-based Data Architecture is studied in this paper. the image file generated by the CIAB method does not store the ...
详细信息
the network structure has evolved into highly complicated and tightly interaction withthe development of new generation information and communication technology. the network becomes untrusted because the malicious at...
详细信息
ISBN:
(纸本)9798350319293
the network structure has evolved into highly complicated and tightly interaction withthe development of new generation information and communication technology. the network becomes untrusted because the malicious attack increasing. In order to realize the reliable data transmission, the concept of zero -trust network is proposed to satisfy the requirements of the secure appliance. this paper, proposed a identify verification method based on blockchain and distributed identify, aims to build the trust data link in zero -trust network. the analysis shows that the proposed trusted identity authentication can solve the security problem of data information interaction in the zero -trust network, and further improve the security protection ability of network system operation.
Analysis of the dissemination topology network and inheritance of Chinese folk music culture based on the deep retrieval algorithm of internet information is the main focus of this paper. distributed network queuing t...
详细信息
the DIAS BD information inquiry platform uses scientific information technology to create a stable cadre archive, reference library and database. Carry out discipline inspection and supervision(DIAS) activities at all...
详细信息
the effectiveness of the paradigm relies on structured approaches for defining and designing SMA applications. Consequently, it is necessary to conduct a thorough examination of the leading SMA methodologies to establ...
详细信息
暂无评论