期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An Efficient Security Solution for Industrial Internet of Things Applications 被引量:1
1
作者 Alaa Omran Almagrabi 《Computers, Materials & Continua》 SCIE EI 2022年第8期3961-3983,共23页
The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual need... The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual needs for new functionality,such as foresight,the number of linked devices in the industrial environment increases.Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments.Hence this blockchain-based endpoint protection platform(BCEPP)has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.A resolver supports the encoded model as an input;network functions can be optimized as an output in an infrastructure network.The configuration of the virtual network functions(VNFs)involved fulfills network characteristics.The output ensures that the final service is supplied at the least cost,including processing time and network latency.According to the findings of this comparison,our design is better suited to simplified trust management in IIoT devices.Thus,the experimental results show the adaptability and resilience of our suggested confidence model against behavioral changes in hostile settings in IIoT networks.The experimental results show that our proposed method,BCEPP,has the following,when compared to other methods:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%. 展开更多
关键词 Industrial internet of things(IIoT) blockchain trusted third parties endpoint verification
下载PDF
Referring to Third-Persons in English Interaction: A Single Case Analysis
2
作者 Clare Jackson 《外国语》 CSSCI 北大核心 2018年第4期12-29,共18页
Talking about and referring to others is a fundamentally human activity that relies on the meaningful use of referring expressions for interlocuters to be able to identify the specific individual( s) being spoken of. ... Talking about and referring to others is a fundamentally human activity that relies on the meaningful use of referring expressions for interlocuters to be able to identify the specific individual( s) being spoken of. With a primary focus on practices for referring to third parties,the broad aim of this paper is to show that whilst the selection of referring expression is based on complex,deeply social and cultural conventions,it is also a highly systematic and orderly activity. More specifically,this paper explores an interactional 'puzzle' contained in a single piece of data,in which a daughter — in conversation with her mother — refers to her father( her mother's ex-husband) in three different ways in quick succession. In doing so,we illustrate the potential interactional import of referring expressions for accomplishing social action beyond indexing an individual. In analysing this single case,one procedure for doing conversation analytic work is also illustrated. That is,in contrast to building and analysing collections,this paper draws on and applies what is already known from previous conversation analytic literature about practices for referring to persons. In analysing one fragment in which reference to a third party is made,we will review the fundamentals of the organisation of person reference in English. 展开更多
关键词 conversation analysis person reference referring to third parties analysing single cases
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部