Federated learning has been widely researched and applied in various scenarios. In the context of mobile computing, federated learning protects users from exposing their private data while enabling collaborative train...
详细信息
In the cloud computing environment, network terminal data has the characteristics of large quantity and real-time changes. In order to ensure the security of network terminal data, a network terminal data security pro...
详细信息
This paper describes problems of improving security cameras' video footage for forensic investigation. When processing records, one encounters problems with low resolution, poor lighting, or excessive distance of ...
详细信息
The paper describes the process of the information objects classification in e-learning systems using the mathematical background of fuzzy logic. This approach can be used to improve the process of searching and organ...
详细信息
Rapid developments in digital technology have expedited the dissemination of information on social media platforms like as Twitter, Facebook, and Weibo. Unverified information can create protests and mislead the publi...
详细信息
Neural networks have become a cornerstone of modern machine learning, powering advances in numerous domains. In distributed computing environments, leveraging large batch sizes is crucial for the efficient training of...
详细信息
In Dempster-Shafer evidence theory, basic probability assignment (BPA) plays a important role in representing uncertain and unknown information. How to generate highquality BPA is essential, which can promote further ...
详细信息
The article presents traditional data transfer technologies, the reasons for the creation and implementation of SDN technology in cloud data centers. A comparative analysis of cloud data centers based on TCP/IP and SD...
详细信息
In this paper, we present a new convolution form based on dictionary learning and study its sparse version based on convolution dictionary learning (CDL). An effective algorithm for learning sparse convolution feature...
详细信息
In recent years, with the development of cloud computing and Internet of Things technology, earthquake observation technology has made tremendous *** earthquake agency developed a low-cost local magnetic field observa...
详细信息
ISBN:
(纸本)9798350389913;9798350389906
In recent years, with the development of cloud computing and Internet of Things technology, earthquake observation technology has made tremendous *** earthquake agency developed a low-cost local magnetic field observation system based on cloud architecture to carry high-density deployed sensors. With the increasing deployment of sensors and the richness of application scenarios, existing access control models couldn't meet the needs of actual business *** original access control technology was based on physical network security protocols and IoT device security *** it could eliminate some security risks during the access process, there were still shortcomings that couldn't be well adapted to the needs of large-scale IoT device deployment ***, using complex access control models may result in neglecting the low local computing power of IoT geomagnetic field observation *** order to solve the above problems, the project team conducted research and analysis on access control between geomagnetic observation devices based on fog computing and combined with blockchain *** IoT access control model suitable for geomagnetic observation network systems was designed based on research *** model uses fog node agents to place the main work on the blockchain for completion and solve the problem of low computing power in some IoT *** smart contracts, the model has achieved control over device access permissions,it provided an effective and secure method for IoT access control.
暂无评论