This study explores the application of artificial intelligence in financial accounting, focusing on the technical implementation and performance evaluation of intelligent financial prediction models. The research firs...
详细信息
In this paper, a technical solution for the integration of vehicle-road cooperation and advanced emergency braking system is proposed. Firstly, the problems existing in the practical application of the system are anal...
详细信息
In the exhibition space, the guidance system is the link to sort out the complex space environment, so that visitors can get better communication with exhibits and space environment. The research goal of this paper is...
详细信息
The research on the application of machine vision platform based on ant colony algorithm and software engineering is aimed at the application of machine vision platform based on ant colony algorithm and software engin...
详细信息
As the power system undergoes continuous digitization and networking, the associated network security challenges have become increasingly prominent. Addressing these issues, the zero trust framework emerges as a cutti...
详细信息
Nowadays, the situation of data security is ever-increasing severity, however, the most damaging security threats do not originate from malicious outsiders but from malfeasant and negligent insiders. Generally, inside...
详细信息
ISBN:
(纸本)9798350349184;9798350349191
Nowadays, the situation of data security is ever-increasing severity, however, the most damaging security threats do not originate from malicious outsiders but from malfeasant and negligent insiders. Generally, insider threats are prone to cause incalculable losses and serious issues due to that the insiders have the authority to access sensitive information. Therefore, how to effectively prevent and respond to insider threats is a significant challenge. Undoubtedly, the key to defending against insider threats is restricting access permissions and optimizing access control policies in real-time. To enhance data security, we propose MLCAC, a multi-layered collaborative access control model, which focuses on protecting sensitive data. A key insight is the design of a decentralized optimization for domain and authority. MLCAC prohibits unauthorized behavior and continuously monitors access logs which are analyzed by using the co-occurrence matrix to make intelligent decisions and dynamically adjust the access control policy in real time. In experiments, we collected 12574 access logs about 1753 system software and analyzed the correlation between software by using the co-occurrence matrix algorithm, including 824 groups co-occurring software of which the highest frequency is 12. The experiments indicate that the accuracy of the policy generated by intelligent decision-making is 89.55%. Therefore, the algorithm is significantly efficient for intelligent decision-making, which is the foundation of automatically generating policies and dynamic authorization.
This paper focuses on the research and development of intelligent traffic toll data system based on blockchain, aiming to improve the accuracy and efficiency of highway toll inspection. The system integrates blockchai...
详细信息
In order to remote monitor and control the natural gas valves, the design and implementation of an intelligent remote control system for natural gas valves based on the Internet of Things is proposed in this paper. Th...
详细信息
As power systems become more intricate, traditional fault detection methods have difficulty keeping pace, especially in terms of accuracy and real-time performance. The recent advancements in deep learning technology ...
详细信息
The power system is undergoing a transition from the traditional to new power system,the business middle platform acts as a pivotal element within the digital architecture of grid *** integrating data and services acr...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
The power system is undergoing a transition from the traditional to new power system,the business middle platform acts as a pivotal element within the digital architecture of grid *** integrating data and services across the entire "generation-transmission-load-storage" process,it has facilitated centralized management and efficient utilization of corporate ***, with the burgeoning number of services provided by the business middle platform and its extensive application, the complexity of service invocation chains within the business middle platform has escalated dramatically. Ensuring the healthy and stable operation of services, pinpointing performance bottlenecks in service chains, and achieving an intuitive overview of the business middle platform's overall status have become paramount issues. As a new phase in the evolution of monitoring systems, observable theories and technological practices offer fresh insights and strategies to enhance the quality of the business middle platform services. This research, based on observability technologies and principles, aims to implement a comprehensive, observable monitoring system tailored to the operational status of the business middle platform services. This system serves to observe and analyze the state of the business middle platform services effectively, thereby improving the quality of middleware services
暂无评论