Status quo intelligent evaluation of the network security legal awareness with modeling and simulations is studied in this paper. through the security risk assessment of the network system, various network security is...
详细信息
this study systematically discusses the innovative application of 3D CAD technology in automotive machinery design, and constructs a closed-loop design system from parametric modeling to multi-physics simulation. At t...
详细信息
Home-school collaborative smart system based on video transmission and information compression is designed and implemented in this paper. therefore, designing an objective and accurate video quality evaluation method ...
详细信息
this study constructs an intelligent fault identification system based on the fusion of artificial intelligence and power big data to improve the efficiency and accuracy of fault detection. First, various data from th...
详细信息
English grammatical errors frequently affect the clarity of information transmission, and an effective automatic error correction system is urgently needed. this paper aims to design an English grammar automatic error...
详细信息
作者:
thomas, MerinShetty, Sahana
Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Bangalore India
Blockchain is a technique that allows for the decentralized data storage and coin is a form of trade that operates similarly to fiat money. there in old, government's bankers and the administration acquired posses...
详细信息
ISBN:
(纸本)9798350398267
Blockchain is a technique that allows for the decentralized data storage and coin is a form of trade that operates similarly to fiat money. there in old, government's bankers and the administration acquired possession of and controlled all assets, including money, platinum, and other rare metals, by stealing them from the population. Because of the reasons outlined beneath, crypto aspires to return power to average *** first Bitcoin was released in 2008 by either a man going by the moniker Pseudonym. the foundation of this system is encryption, or concealed reading. the privacy of players and activities is ensured via cryptographic autonomously without interference from a 3rd party Blockchain-based crypto currencies is a decentralized mentoring electronic payments and financial transaction system that is secured and decentralized. Elevated info may be securely stored using bitcoins. Although fiat (written) money is widely utilized nowadays, it has certain drawbacks. these problems, which are being abused by strong groups, concern Him. Banknotes has several disadvantages, including the ability to be copied, misappropriated, and being difficult to transport between locations owing to expensive costs. He created Bitcoins, a kind of electronic money that can fulfil all of those promises. With Bit, the goal was to provide a fee-free, open-source, and user-controlled virtual trading. the primary problem with bank notes is it companies and states, however, supervise and regulate *** are unreliable since they have caused individuals to lose their hard - earned cash. Crypto currencies offers its customers anonymity and returns ownership of their income to ordinary folks. Blockchain technology has the ability to revolutionize many different industries, including voting, medical, estate development, among others. It has the potential to fix system that have been compromised for a long time. However, it is now utilized all over the globe after thirteen years, altho
Centralized traditional electricity trading systems often face many problems such as high maintenance costs, low transaction information transparency, and untimely clearing of funds when faced with massive, high-frequ...
详细信息
the proceedings contain 244 papers. the topics discussed include: research on classification and hierarchical management of industrial data based on entropy method-TOPSIS theory;convergence application of handle platf...
the proceedings contain 244 papers. the topics discussed include: research on classification and hierarchical management of industrial data based on entropy method-TOPSIS theory;convergence application of handle platform for industrial data classification and grading and 5G technology;research on Internet datasecurity and privacy protection;an analytical method for parameter identification based on datasheet values;data preprocessing and quality evaluation for building the power grid supervision knowledge graph;preliminary assessment of beidou navigation satellite system satellite orbit determination accuracy and positioning accuracy;improved aspect-level sentiment analysis method based on multi-head attention mechanism;architecture design of wireless access system in power grid application scenario based on 5th generation mobile communication technology small base station;benefit analysis of hydrothermal processing of biogas slurry applied to biogas power generation project;and research on power flow calculation of distribution network with distributed power based on optimal multiplier.
In this paper we describe a cyberattack against 2 well-known wearable devices. the attacker presented in this paper is an "honest but curious" Internet Service Provider (ISP) sitting somewhere in the path be...
详细信息
ISBN:
(纸本)9789897584909
In this paper we describe a cyberattack against 2 well-known wearable devices. the attacker presented in this paper is an "honest but curious" Internet Service Provider (ISP) sitting somewhere in the path between the device and the cloud. the ISP launches the attack when the smartbands try to synchronize their data withthe permanent cloud storage. By launching its attack, this "honest but curious" ISP is able to learn much personal information about the users of the smartbands, including the frequency of measuring the users' heart rate and weight;the number and duration of workouts;as well as whether (i) sleep or (ii) steps were recorded on a given day. We show that privacy leaks might occur even when the transferred data are fully encrypted, and the representative mobile application utilizes state-of-the-art security mechanisms: certificate pinning, and source code obfuscation.
As a cloud computing model that integrates the advantages of public and private clouds, the hybrid cloud adapts to changing application requirements, allowing users to flexibly lease public cloud resources to expand c...
详细信息
ISBN:
(数字)9798350386776
ISBN:
(纸本)9798350386783
As a cloud computing model that integrates the advantages of public and private clouds, the hybrid cloud adapts to changing application requirements, allowing users to flexibly lease public cloud resources to expand computing capabilities, effectively alleviating the problem of resource scarcity in private clouds during peak periods. However, existing hybrid cloud workflow scheduling inadequately considers the dataprivacy and security risks associated with cross-platform data transmission while meeting deadlines and optimizing costs. therefore, this paper proposes a hybrid cloud workflow scheduling algorithm (HCWSA-IWHO) based on an improved wild horse optimization algorithm. the algorithm combines intelligent optimization algorithms and heuristic algorithms, divided into pre-scheduling and dynamic scheduling stages. In the pre-scheduling stage, by using an adaptive pairing range and selection method for pairing objects, the algorithm ensures the diversity of initial population individuals and the convergence of search space in later stages. In the dynamic scheduling stage, tasks are classified, and tasks that need to be reallocated in the public cloud are identified. When reallocating virtual machines for each task, virtual machines that meet performance requirements and minimize costs are selected to achieve cost minimization. the HCWSA-IWHO algorithm is compared withthe PSSA and FWAPS-VI algorithms. Experimental results demonstrate that the HCWSA-IWHO not only meets deadline requirements but also outperforms PSSA and FWAPS-VI in reducing workflow execution costs.
暂无评论