期刊文献+
共找到45,596篇文章
< 1 2 250 >
每页显示 20 50 100
Influence of Quantum Information Technology on International Security
1
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
下载PDF
Quality of Service and Security on Cisco Network Devices, Coupled with the Development of a Mobile Application Prototype Software for Server Room Temperature Monitoring
2
作者 Desire Mudenda Charles Smart Lubobya 《Journal of Computer and Communications》 2024年第8期123-140,共18页
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge... In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study. 展开更多
关键词 Quality of Service (QoS) Network security Temperature Monitoring Mobile application Cisco Devices
下载PDF
Application Strategy of BIM Technology in the Forward Design of Bridges
3
作者 Jianmin He 《Journal of Architectural Research and Development》 2024年第3期14-19,共6页
Bridge engineering is highly specialized and has spatial characteristics,which puts forward higher requirements for design work.The advancement of information technology has provided ample tools to facilitate bridge d... Bridge engineering is highly specialized and has spatial characteristics,which puts forward higher requirements for design work.The advancement of information technology has provided ample tools to facilitate bridge design work,with building information modeling(BIM)technology being one of them.BIM technology ensures the efficiency and quality of the forward design of bridges,while also reducing construction costs.This article starts with defining the concept of BIM technology,followed by a discussion on its advantages in bridge design and application process,which serves as a reference for other bridge designers. 展开更多
关键词 BIM technology BRIDGE Forward design application strategy
下载PDF
Application Strategies of Virtual Reality Technology in the Teaching Design of Vocational Courses from the Perspective of Learning Transfer Theory
4
作者 Shuyu Gong 《Journal of Contemporary Educational Research》 2024年第7期1-6,共6页
With the rapid development of virtual reality technology,it has been widely used in the field of education.It can promote the development of learning transfer,which is an effective method for learners to learn effecti... With the rapid development of virtual reality technology,it has been widely used in the field of education.It can promote the development of learning transfer,which is an effective method for learners to learn effectively.Therefore,this paper describes how to use virtual reality technology to achieve learning transfer in order to achieve teaching goals and improve learning efficiency. 展开更多
关键词 Learning transfer Virtual reality technology application strategy
下载PDF
Research on the Application of Virtual Simulation Technology in the Safety Management of Coal Mining
5
作者 Siqi Cheng Tianyi Jia +1 位作者 Nana Deng Xiaowen Ma 《Journal of Electronic Research and Application》 2024年第3期249-254,共6页
Safety is paramount in coal mining as it affects efficiency.Thus,it is essential to enhance the management of coal mine safety.With the ongoing advancement of modern technologies,more innovative solutions are being in... Safety is paramount in coal mining as it affects efficiency.Thus,it is essential to enhance the management of coal mine safety.With the ongoing advancement of modern technologies,more innovative solutions are being integrated into the safety management of coal mining,including virtual simulation technology.This paper focuses on analyzing and researching the application of virtual simulation technology in the safety management of coal mining,providing insights for reference. 展开更多
关键词 Virtual simulation technology Coal mine safety management application
下载PDF
Advantages and Development Prospects of Building Information Modelling(BIM)Technology Application in Highway Engineering 被引量:1
6
作者 Hongmei Wang Ying Lin Xiaolin Gan 《Journal of Architectural Research and Development》 2023年第6期1-5,共5页
Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the applica... Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the application of BIM technology in practice,and approaches from the integration of BIM design-construction.This paper also puts forward the integration of cross-stage information based on the BIM+Geographic Information System(GIS)construction information management system to realize the BIM whole life cycle management,and provides directional support for the continuous and efficient application of BIM technology in engineering practice. 展开更多
关键词 BIM technology Highway engineering application advantages Development prospects
下载PDF
Application of Anti-seepage Technology in the Construction of Hydraulic Engineering Projects
7
作者 Huanlin YANG 《Meteorological and Environmental Research》 CAS 2023年第5期31-32,35,共3页
With the development of China's economy,the implementation scale and scope of hydraulic engineering projects are increasing,and the application of anti-seepage technology has an important influence on the construc... With the development of China's economy,the implementation scale and scope of hydraulic engineering projects are increasing,and the application of anti-seepage technology has an important influence on the construction quality of hydraulic engineering.In this paper,the significance and problems of the application of anti-seepage technology in the construction of hydraulic engineering projects were mainly analyzed,and specific application strategies were proposed. 展开更多
关键词 Anti-seepage technology Hydraulic engineering projects application strategy
下载PDF
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
8
作者 Maduhu Mshangi Mlyatu Camilius Sanga 《Journal of Information Security》 2023年第1期1-15,共15页
This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transpo... This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design. 展开更多
关键词 Secure Web applications security Headers Systems security Secure Web Architecture Design
下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
9
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market Transactions Action Smart Contracts ARCHITECTURE security Vulnerability Web applications Blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy
下载PDF
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
10
作者 Li-Woei Chen Kun-Lin Tsai +2 位作者 Fang-Yie Leu Wen-Cheng Jiang Shih-Ting Tseng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2779-2794,共16页
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G... Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices. 展开更多
关键词 Mobile application security AES data encryption time parameter mobile device
下载PDF
AWeb Application Fingerprint Recognition Method Based on Machine Learning
11
作者 Yanmei Shi Wei Yu +1 位作者 Yanxia Zhao Yungang Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期887-906,共20页
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition. 展开更多
关键词 Web application fingerprint recognition unsupervised learning clustering algorithm feature extraction automated testing network security
下载PDF
Application Strategy of BIM Technology in Municipal Road Design
12
作者 Wei Gan Yunqi Ge 《Journal of World Architecture》 2023年第3期15-20,共6页
The development of information technology provides certain convenient conditions in the design of municipal roads,and allow the achievements of high standards and requirements of current road design and construction.A... The development of information technology provides certain convenient conditions in the design of municipal roads,and allow the achievements of high standards and requirements of current road design and construction.Among many information technologies,building information modeling(BIM)technology is more widely used in road design and has achieved good results.BIM technology can realize information sharing,allow the design of virtual models,discover design problems in time,and reduce the rate of design changes later or in late stage.At the same time,through the coordination and standardization of the design of road traffic and underground pipelines,it provides new design ideas for the development of municipal roads.This paper mainly analyzes the application advantages and status of BIM technology in municipal road design,and puts forward the application strategy of municipal road design. 展开更多
关键词 BIM technology Municipal road design Status quo application strategy
下载PDF
A Practical Study of Big Data Technology in Computer Network Information Security Processing
13
作者 Kongduo Xing 《Journal of Electronic Research and Application》 2023年第6期36-41,共6页
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in... In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology. 展开更多
关键词 Big data technology Computer network Information security
下载PDF
Application and Research of 5G Communication Technology in Intelligent Coal Mine
14
作者 Tao Li Chaoqun Zhuo 《Journal of Electronic Research and Application》 2023年第4期31-36,共6页
In recent years,science and technology in China has been developing rapidly,and various industries have begun to undergo changes due to the development.Coal mining i a highly dangerous industry.Therefore,proper techno... In recent years,science and technology in China has been developing rapidly,and various industries have begun to undergo changes due to the development.Coal mining i a highly dangerous industry.Therefore,proper technology is needed to improve the quality and safety of coal mining.The application of 5G communication technology allowed for the developement of intelligent coal mines,with broad appication prospects and research value.This article aims to thoroughly analyze the application of 5G ommunication technology in intelligent coal mines,considering the practical context.The goal is to offer insights and guidance for future endeavors in this domain. 展开更多
关键词 5G communicatio technology Inelligent coal mine application
下载PDF
Carrying Railway 5G Service Application by Multi-technology Convergence
15
作者 YANG Rui GUO Guifang +1 位作者 ZHAO Wuyuan ZHENG Mingda 《Chinese Railways》 2023年第1期35-44,共10页
The application scenarios of railway radio communication are complex,while the existing narrowband communication such as GSM-R and radio train dispatching system fails to meet the requirements of service application d... The application scenarios of railway radio communication are complex,while the existing narrowband communication such as GSM-R and radio train dispatching system fails to meet the requirements of service application development.The carrying capacity of railway 5G-R has been greatly improved,mainly for wide-area train-ground communication services such as dispatching communication,train control and train operation safety monitoring.However,for large passenger stations,freight yards,maintenance bases and other places with densely populated railway operators,it is unable to carry overall railway service applications limited by the spectrum bandwidth of 5G private networks,so it is necessary to consider various radio technologies for supplementation.This paper also elaborates the railway service application scenarios,analyzes the characteristics of radio communication technologies such as 5G mmWave and the 6th-generation wireless LAN technology(Wi-Fi6),and discusses the schemes of multi-technology convergence carrying railway 5G service applications. 展开更多
关键词 5G-R service application technology convergence 5G mm Wave WLAN
下载PDF
AHFO-based soil water content sensing technology considering soil-sensor thermal contact resistance
16
作者 Mengya Sun Peng Wu +6 位作者 Bin Shi Jin Liu Jie Liu Juncheng Yao Yipin Lu Yunqiang Wang Xiaoyan Li 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第7期2715-2731,共17页
The actively heated fiber-optic(AHFO)technology has become emerged as a research focus due to its advantages of distributed,real-time measurement and good durability.These attributes have led to the gradual applicatio... The actively heated fiber-optic(AHFO)technology has become emerged as a research focus due to its advantages of distributed,real-time measurement and good durability.These attributes have led to the gradual application of AHFO technology to the water content measurement of in situ soil.However,all existing in situ applications of AHFO technology fail to consider the effect of soilesensor contact quality on water content measurements,limiting potential for the wider application of AHFO technology.To address this issue,the authors propose a method for determining the soilesensor thermal contact resistance based on the principle of an infinite cylindrical heat source.This is then used to establish an AHFO water content measurement technology that considers the thermal contact resistance.The reliability and validity of the new measurement technology are explored through a laboratory test and a field case study,and the spatial-temporal evolution of the soil water content in the case is revealed.The results demonstrate that method for determining the soilesensor thermal contact resistance is highly effective and applicable to all types of soils.This method requires only the moisture content,dry density,and thermal response of the in situ soil to be obtained.In the field case,the measurement error of soil water content between the AHFO method,which takes into account the thermal contact resistance,and the neutron scattering method is only 0.011.The water content of in situ soil exhibits a seasonal variation,with an increase in spring and autumn and a decrease in summer and winter.Furthermore,the response of shallow soils to precipitation and evaporation is significant.These findings contribute to the enhancement of the accuracy of the AHFO technology in the measurement of the water content of in situ soils,thereby facilitating the dissemination and utilization of this technology. 展开更多
关键词 Soil water content Actively heated fiber-optic(AHFO) technology Soilesensor thermal contact resistance RELIABILITY In situ application
下载PDF
Application of Flipped Classroom Teaching Model Based on Micro-Course in Practical Training Teaching of Contact Lens Fitting Technology
17
作者 Ying Zou 《Journal of Contemporary Educational Research》 2023年第9期98-104,共7页
Objective:This paper aims to study the application of flipped classroom teaching model based on micro-course in the practical training teaching of contact lens fitting technology.Methods:From September 21 to July 23,1... Objective:This paper aims to study the application of flipped classroom teaching model based on micro-course in the practical training teaching of contact lens fitting technology.Methods:From September 21 to July 23,120 students majoring in ophthalmology and optometry were selected and randomly divided into groups.The control group adopted the traditional teaching mode,and the study group adopted the flipped classroom teaching mode based on micro-course.Teaching scores and the skills,observation and judgment,adaptability,and communication skills were compared between the groups.Results:Statistical comparison of teaching scores under different management methods showed that the clinical thinking score and practice work quality in the study group were higher than those of the control group,and the effect of the study group was better(P<0.05).The overall scores of skills,observation and judgment,adaptability,and communication skills of the study group were better than those in the control group,and the comprehensive ability scores in the two groups were significantly different(P<0.05).Conclusion:In practical training teaching of contact lens fitting technology,the application of flipped classroom teaching based on micro-course can improve the skill scores of personnel,and the overall effect is good.This can lay the foundation for advanced ophthalmology and optometry talents with profound theoretical knowledge and professional skills. 展开更多
关键词 Contact lens fitting technology practical training and teaching Micro-course based Flipped classroom teaching application
下载PDF
Security Application of 5G Technology in Industrial Internet 被引量:1
18
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第1期11-14,共4页
The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are req... The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are required to resolve the issues.In this context,the author thoroughly integrated with the present industrial development situation,examined the use of 5G technology in industrial internet security,and desired to leverage the advantageous benefits of 5G technology to boost industrial development.Due to the numerous benefits of 5G technology in security applications,we conducted an in-depth investigation and described it from the perspectives of relevant concepts,security,and security application guarantee measures,with the goal of achieving the goal of safe industrial internet operation. 展开更多
关键词 5G technology Industrial internet SAFETY application measures
下载PDF
Global and International Security Under Spatial Grasp Paradigm
19
作者 Peter Simon Sapaty 《International Relations and Diplomacy》 2024年第2期72-85,共14页
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat... Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems. 展开更多
关键词 global security international security critical infrastructures Spatial Grasp technology Spatial Grasp Language distributed language interpretation self-recovering security scenarios global security awareness and consciousness
下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
20
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK security DATA ENCRYPTION technology application STRATEGY
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部