Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Liqin Tian"'
Publikováno v:
Meitan kexue jishu, Vol 51, Iss 11, Pp 104-118 (2023)
Underground coal seam mining causes the deformation, failure, and collapse of the overlying rock mass of the coal seam. Suppose the monitoring and early warning of overburden deformation and failure during mining or the emergency response are inappro
Externí odkaz:
https://doaj.org/article/d20df6b89c3a4d52aa04b04406273db8
Publikováno v:
PLoS ONE, Vol 19, Iss 1, p e0297066 (2024)
With the development of the Internet of Things (IoT), the use of UAV-based data collection systems has become a very popular research topic. This paper focuses on the energy consumption problem of this system. Genetic algorithms and swarm algorithms
Externí odkaz:
https://doaj.org/article/b682d5294fdc45bd8dab6c1ec6e0ce27
Publikováno v:
网络与信息安全学报, Vol 8, Pp 175-182 (2022)
The open cloud computing environment is facing security challenges and the traditional user behavior evaluation mechanism cannot guarantee the security of the cloud.In order to scientifically and quantitatively evaluate the user’s behavior trust, e
Externí odkaz:
https://doaj.org/article/dd249fe2915e402387dde1facf462a80
Publikováno v:
Journal of Advanced Transportation, Vol 2023 (2023)
With the continuous renewal and rise of various flight equipment, this article designs a method of water data collection, which is realized through the coordination of an unmanned surface vehicle (USV) carrying unmanned aerial vehicles (UAVs, commonl
Externí odkaz:
https://doaj.org/article/d4bf05f8042b49e6b4e77328c5d348aa
Publikováno v:
IEEE Access, Vol 8, Pp 43277-43288 (2020)
Internet of things (IoT) monitoring systems have been extensively applied in smart homes, underwater monitoring, volcano monitoring, and health monitoring. In IoT applications, a wireless sensor network (WSN) is deployed to collect data. Hierarchical
Externí odkaz:
https://doaj.org/article/e77547e91e5f4b15b23158a9a87bd162
Publikováno v:
IEEE Access, Vol 7, Pp 52266-52276 (2019)
Reputation evaluation plays an important role in determining the credibility of online entities. Especially in e-commerce systems, consumers usually give priority to this indicator when choosing vendors. Reputation bootstrapping, which can determine
Externí odkaz:
https://doaj.org/article/f56a4be0c446406e823cd0f8f5c4e564
Publikováno v:
网络与信息安全学报, Vol 4, Pp 45-51 (2018)
According to the security problem of Web user information,the user behavior was analyzed and authenticated by the method of machine learning.First of all,through the principal component analysis to reduce the dimension of the original data set,then u
Externí odkaz:
https://doaj.org/article/3e11895473e64f65b2e12ba89da27c01
Publikováno v:
Symmetry, Vol 13, Iss 8, p 1487 (2021)
With the development of society and information technology, people’s dependence on the Internet has gradually increased, including online shopping, downloading files, reading books, and online banking. However, how to ensure the safety and legitima
Externí odkaz:
https://doaj.org/article/147a0826726d4c3092229023872e17ca
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 14 (2018)
In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective.
Externí odkaz:
https://doaj.org/article/bb17142a24fe4ce2b6ff59b1076dad8b
Publikováno v:
Information, Vol 10, Iss 4, p 132 (2019)
Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current res
Externí odkaz:
https://doaj.org/article/8be10188770641acb5ae727543aa62b6