The traditional job recruitment process is time consuming and also undergoes certain difficulties such as data privacy, lack of transparency, and inefficient credential verification. These difficulties lead to mistrus...
详细信息
This paper examines a novel online retail application optimized for local commerce via a location-based matching system. The application supports the sale of new and secondhand items, home goods, and vegetables, requi...
详细信息
In an infrastructure cloud environment, task scheduling should focus on optimizing execution time and saving energy. The data center consumes a large amount of energy during the execution of the task. Energy-saving te...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
The heart is indispensable for body. Diagnosis of heart disease must be complete and accurate. Heart disease is a dangerous disease. This disease is caused by many problems such as excessive stress, diabetes, high blo...
详细信息
Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electro...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriv...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriving from the opponents’best response(BR),is technically the optimal strategy for the ***,computing an SSE strategy may be difficult since it needs to solve a mixed-integer program and has exponential complexity in the number of *** this end,the authors propose an equalizer ZD strategy,which can unilaterally restrict the opponent’s expected *** authors first study the existence of an equalizer ZD strategy with one-to-one situations,and analyze an upper bound of its performance with the baseline SSE *** the authors turn to multi-player models,where there exists one player adopting an equalizer ZD *** authors give bounds of the weighted sum of opponents’s utilities,and compare it with the SSE ***,the authors give simulations on unmanned aerial vehicles(UAVs)and the moving target defense(MTD)to verify the effectiveness of the proposed approach.
The burgeoning discipline of affective computing, which sits at the nexus of AI and psychology, aims to improve our capacity to comprehend and analyze human emotions as they manifest themselves in visual data. This ab...
详细信息
People’s demand for vehicles has been increasing day by day over the last few decades. A survey tells us that over 50,000 vehicles run on the roads per day. Such a large number of vehicles causes traffic. A survey te...
详细信息
By presenting an improved Intrusion Detection System (IDS) that combines deep learning with support vector machines (SVM), this research increases network security. The main goal is to increase the accuracy of SVM det...
详细信息
暂无评论