this paper proposes a thai Question-Answering System, specifically developed by using the Computer Engi-neering curriculum at Srinakharinwirot University, thailand. the proposed system integrates the OpenthaiGPT model...
详细信息
Accurate acquisition of displacement signals is of great importance in the field of engineering research, but displacement transducers have harsh requirements for testing conditions, which cannot be implemented in man...
详细信息
In this paper, the design of a patch array of antennas consisting of four and five patches with left-handed circular polarization for unmanned aerial vehicle systems is presented. In the first stage, a four-patch ante...
详细信息
the seasonal-mean profiles of ozone content and temperature in the stratosphere and lower layers of the mesosphere above Moscow for autumn, winter, and spring seasons of the decades of 1996-2006 and 2007-2017 were cal...
详细信息
Bioinspired algorithms have gained relevance in Search-basedsoftware Testing (SBST) mainly because they can find multiple solutions to difficult-to-solve problems. Exploring the usage trends and elements of its imple...
详细信息
In a Cyber-Physical Power System (CPPS), cyber attackers can invade the cyber equipment through communication weak points, resulting in the illegal removal of equipment in the physical layer, forming a cross-domain at...
详细信息
Coding is an integral aspect of programming. A programmer can automatically complete a code fragment after writing a few tokens and the process of automatically completing a code fragment is known as code completion. ...
详细信息
this paper conducts a comparative analysis of human torso posture estimation methodologies, focusing on an inertial measurement unit (IMU) sensor coupled with an Arduino UNO as a wearable approach, and Kinect V2, util...
详细信息
Due to the advantages of privacy-preserving, Federated Learning (FL) is widely used in distributed machine learning systems. However, existing FL methods suffer from low-inference performance caused by data heterogene...
详细信息
Withthe continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments. Solving...
详细信息
Withthe continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments. Solving security issues such as telecommuting based on Zero Trust architecture become a focus of attention. the core of a Zero Trust architecture is "continuous verification, never trust", which means that by default, both internal and external personnel, terminals, and businesses are considered untrustworthy, and their access to the network and business resources will be continuously verified and evaluated. the paper first expounds the historical evolution, basic characteristics, and key technologies of Zero Trust, and then proposes a telecommuting security solution based on Zero Trust architecture. the solution can effectively solve problems such as identity trustworthiness discrimination, device trustworthiness discrimination and behavior trustworthiness discrimination, to achieve secure and reliable business access for telecommuting workers and intelligent terminals. the solution has reference significance for further optimization and implementation of Zero Trust framework in relevant application scenarios.
暂无评论