Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic...Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.展开更多
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
Bridge engineering is highly specialized and has spatial characteristics,which puts forward higher requirements for design work.The advancement of information technology has provided ample tools to facilitate bridge d...Bridge engineering is highly specialized and has spatial characteristics,which puts forward higher requirements for design work.The advancement of information technology has provided ample tools to facilitate bridge design work,with building information modeling(BIM)technology being one of them.BIM technology ensures the efficiency and quality of the forward design of bridges,while also reducing construction costs.This article starts with defining the concept of BIM technology,followed by a discussion on its advantages in bridge design and application process,which serves as a reference for other bridge designers.展开更多
With the rapid development of virtual reality technology,it has been widely used in the field of education.It can promote the development of learning transfer,which is an effective method for learners to learn effecti...With the rapid development of virtual reality technology,it has been widely used in the field of education.It can promote the development of learning transfer,which is an effective method for learners to learn effectively.Therefore,this paper describes how to use virtual reality technology to achieve learning transfer in order to achieve teaching goals and improve learning efficiency.展开更多
Safety is paramount in coal mining as it affects efficiency.Thus,it is essential to enhance the management of coal mine safety.With the ongoing advancement of modern technologies,more innovative solutions are being in...Safety is paramount in coal mining as it affects efficiency.Thus,it is essential to enhance the management of coal mine safety.With the ongoing advancement of modern technologies,more innovative solutions are being integrated into the safety management of coal mining,including virtual simulation technology.This paper focuses on analyzing and researching the application of virtual simulation technology in the safety management of coal mining,providing insights for reference.展开更多
Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the applica...Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the application of BIM technology in practice,and approaches from the integration of BIM design-construction.This paper also puts forward the integration of cross-stage information based on the BIM+Geographic Information System(GIS)construction information management system to realize the BIM whole life cycle management,and provides directional support for the continuous and efficient application of BIM technology in engineering practice.展开更多
With the development of China's economy,the implementation scale and scope of hydraulic engineering projects are increasing,and the application of anti-seepage technology has an important influence on the construc...With the development of China's economy,the implementation scale and scope of hydraulic engineering projects are increasing,and the application of anti-seepage technology has an important influence on the construction quality of hydraulic engineering.In this paper,the significance and problems of the application of anti-seepage technology in the construction of hydraulic engineering projects were mainly analyzed,and specific application strategies were proposed.展开更多
This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transpo...This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design.展开更多
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ...This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case.展开更多
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G...Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices.展开更多
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r...Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.展开更多
The development of information technology provides certain convenient conditions in the design of municipal roads,and allow the achievements of high standards and requirements of current road design and construction.A...The development of information technology provides certain convenient conditions in the design of municipal roads,and allow the achievements of high standards and requirements of current road design and construction.Among many information technologies,building information modeling(BIM)technology is more widely used in road design and has achieved good results.BIM technology can realize information sharing,allow the design of virtual models,discover design problems in time,and reduce the rate of design changes later or in late stage.At the same time,through the coordination and standardization of the design of road traffic and underground pipelines,it provides new design ideas for the development of municipal roads.This paper mainly analyzes the application advantages and status of BIM technology in municipal road design,and puts forward the application strategy of municipal road design.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
In recent years,science and technology in China has been developing rapidly,and various industries have begun to undergo changes due to the development.Coal mining i a highly dangerous industry.Therefore,proper techno...In recent years,science and technology in China has been developing rapidly,and various industries have begun to undergo changes due to the development.Coal mining i a highly dangerous industry.Therefore,proper technology is needed to improve the quality and safety of coal mining.The application of 5G communication technology allowed for the developement of intelligent coal mines,with broad appication prospects and research value.This article aims to thoroughly analyze the application of 5G ommunication technology in intelligent coal mines,considering the practical context.The goal is to offer insights and guidance for future endeavors in this domain.展开更多
The application scenarios of railway radio communication are complex,while the existing narrowband communication such as GSM-R and radio train dispatching system fails to meet the requirements of service application d...The application scenarios of railway radio communication are complex,while the existing narrowband communication such as GSM-R and radio train dispatching system fails to meet the requirements of service application development.The carrying capacity of railway 5G-R has been greatly improved,mainly for wide-area train-ground communication services such as dispatching communication,train control and train operation safety monitoring.However,for large passenger stations,freight yards,maintenance bases and other places with densely populated railway operators,it is unable to carry overall railway service applications limited by the spectrum bandwidth of 5G private networks,so it is necessary to consider various radio technologies for supplementation.This paper also elaborates the railway service application scenarios,analyzes the characteristics of radio communication technologies such as 5G mmWave and the 6th-generation wireless LAN technology(Wi-Fi6),and discusses the schemes of multi-technology convergence carrying railway 5G service applications.展开更多
The actively heated fiber-optic(AHFO)technology has become emerged as a research focus due to its advantages of distributed,real-time measurement and good durability.These attributes have led to the gradual applicatio...The actively heated fiber-optic(AHFO)technology has become emerged as a research focus due to its advantages of distributed,real-time measurement and good durability.These attributes have led to the gradual application of AHFO technology to the water content measurement of in situ soil.However,all existing in situ applications of AHFO technology fail to consider the effect of soilesensor contact quality on water content measurements,limiting potential for the wider application of AHFO technology.To address this issue,the authors propose a method for determining the soilesensor thermal contact resistance based on the principle of an infinite cylindrical heat source.This is then used to establish an AHFO water content measurement technology that considers the thermal contact resistance.The reliability and validity of the new measurement technology are explored through a laboratory test and a field case study,and the spatial-temporal evolution of the soil water content in the case is revealed.The results demonstrate that method for determining the soilesensor thermal contact resistance is highly effective and applicable to all types of soils.This method requires only the moisture content,dry density,and thermal response of the in situ soil to be obtained.In the field case,the measurement error of soil water content between the AHFO method,which takes into account the thermal contact resistance,and the neutron scattering method is only 0.011.The water content of in situ soil exhibits a seasonal variation,with an increase in spring and autumn and a decrease in summer and winter.Furthermore,the response of shallow soils to precipitation and evaporation is significant.These findings contribute to the enhancement of the accuracy of the AHFO technology in the measurement of the water content of in situ soils,thereby facilitating the dissemination and utilization of this technology.展开更多
Objective:This paper aims to study the application of flipped classroom teaching model based on micro-course in the practical training teaching of contact lens fitting technology.Methods:From September 21 to July 23,1...Objective:This paper aims to study the application of flipped classroom teaching model based on micro-course in the practical training teaching of contact lens fitting technology.Methods:From September 21 to July 23,120 students majoring in ophthalmology and optometry were selected and randomly divided into groups.The control group adopted the traditional teaching mode,and the study group adopted the flipped classroom teaching mode based on micro-course.Teaching scores and the skills,observation and judgment,adaptability,and communication skills were compared between the groups.Results:Statistical comparison of teaching scores under different management methods showed that the clinical thinking score and practice work quality in the study group were higher than those of the control group,and the effect of the study group was better(P<0.05).The overall scores of skills,observation and judgment,adaptability,and communication skills of the study group were better than those in the control group,and the comprehensive ability scores in the two groups were significantly different(P<0.05).Conclusion:In practical training teaching of contact lens fitting technology,the application of flipped classroom teaching based on micro-course can improve the skill scores of personnel,and the overall effect is good.This can lay the foundation for advanced ophthalmology and optometry talents with profound theoretical knowledge and professional skills.展开更多
The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are req...The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are required to resolve the issues.In this context,the author thoroughly integrated with the present industrial development situation,examined the use of 5G technology in industrial internet security,and desired to leverage the advantageous benefits of 5G technology to boost industrial development.Due to the numerous benefits of 5G technology in security applications,we conducted an in-depth investigation and described it from the perspectives of relevant concepts,security,and security application guarantee measures,with the goal of achieving the goal of safe industrial internet operation.展开更多
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat...Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.展开更多
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network...In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security.展开更多
文摘Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
文摘Bridge engineering is highly specialized and has spatial characteristics,which puts forward higher requirements for design work.The advancement of information technology has provided ample tools to facilitate bridge design work,with building information modeling(BIM)technology being one of them.BIM technology ensures the efficiency and quality of the forward design of bridges,while also reducing construction costs.This article starts with defining the concept of BIM technology,followed by a discussion on its advantages in bridge design and application process,which serves as a reference for other bridge designers.
文摘With the rapid development of virtual reality technology,it has been widely used in the field of education.It can promote the development of learning transfer,which is an effective method for learners to learn effectively.Therefore,this paper describes how to use virtual reality technology to achieve learning transfer in order to achieve teaching goals and improve learning efficiency.
文摘Safety is paramount in coal mining as it affects efficiency.Thus,it is essential to enhance the management of coal mine safety.With the ongoing advancement of modern technologies,more innovative solutions are being integrated into the safety management of coal mining,including virtual simulation technology.This paper focuses on analyzing and researching the application of virtual simulation technology in the safety management of coal mining,providing insights for reference.
基金Chongqing Engineering Institute 2023 Intramural Research Fund Grant Project:Highway Engineering Construction Process Management and Technological Innovation Research Based on BIM Technology(Project number:2023xzky04)。
文摘Based on the advantages of the application of Building Information Modelling(BIM)technology in highway engineering,this paper analyzes the difficulties of its in-depth application,grasps the pain points of the application of BIM technology in practice,and approaches from the integration of BIM design-construction.This paper also puts forward the integration of cross-stage information based on the BIM+Geographic Information System(GIS)construction information management system to realize the BIM whole life cycle management,and provides directional support for the continuous and efficient application of BIM technology in engineering practice.
文摘With the development of China's economy,the implementation scale and scope of hydraulic engineering projects are increasing,and the application of anti-seepage technology has an important influence on the construction quality of hydraulic engineering.In this paper,the significance and problems of the application of anti-seepage technology in the construction of hydraulic engineering projects were mainly analyzed,and specific application strategies were proposed.
文摘This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design.
文摘This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case.
基金This work was supported by the National Science and Technology Council,Taiwan,under Project NSTC 112-2221-E-029-015.
文摘Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices.
基金supported in part by the National Science Foundation of China under Grants U22B2027,62172297,62102262,61902276 and 62272311,Tianjin Intelligent Manufacturing Special Fund Project under Grant 20211097the China Guangxi Science and Technology Plan Project(Guangxi Science and Technology Base and Talent Special Project)under Grant AD23026096(Application Number 2022AC20001)+1 种基金Hainan Provincial Natural Science Foundation of China under Grant 622RC616CCF-Nsfocus Kunpeng Fund Project under Grant CCF-NSFOCUS202207.
文摘Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.
文摘The development of information technology provides certain convenient conditions in the design of municipal roads,and allow the achievements of high standards and requirements of current road design and construction.Among many information technologies,building information modeling(BIM)technology is more widely used in road design and has achieved good results.BIM technology can realize information sharing,allow the design of virtual models,discover design problems in time,and reduce the rate of design changes later or in late stage.At the same time,through the coordination and standardization of the design of road traffic and underground pipelines,it provides new design ideas for the development of municipal roads.This paper mainly analyzes the application advantages and status of BIM technology in municipal road design,and puts forward the application strategy of municipal road design.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
文摘In recent years,science and technology in China has been developing rapidly,and various industries have begun to undergo changes due to the development.Coal mining i a highly dangerous industry.Therefore,proper technology is needed to improve the quality and safety of coal mining.The application of 5G communication technology allowed for the developement of intelligent coal mines,with broad appication prospects and research value.This article aims to thoroughly analyze the application of 5G ommunication technology in intelligent coal mines,considering the practical context.The goal is to offer insights and guidance for future endeavors in this domain.
文摘The application scenarios of railway radio communication are complex,while the existing narrowband communication such as GSM-R and radio train dispatching system fails to meet the requirements of service application development.The carrying capacity of railway 5G-R has been greatly improved,mainly for wide-area train-ground communication services such as dispatching communication,train control and train operation safety monitoring.However,for large passenger stations,freight yards,maintenance bases and other places with densely populated railway operators,it is unable to carry overall railway service applications limited by the spectrum bandwidth of 5G private networks,so it is necessary to consider various radio technologies for supplementation.This paper also elaborates the railway service application scenarios,analyzes the characteristics of radio communication technologies such as 5G mmWave and the 6th-generation wireless LAN technology(Wi-Fi6),and discusses the schemes of multi-technology convergence carrying railway 5G service applications.
基金supported by the National Natural Science Foundation of China(Grant Nos.42307189 and 42030701)the China Postdoctoral Science Foundation(Grant No.2023M740974).
文摘The actively heated fiber-optic(AHFO)technology has become emerged as a research focus due to its advantages of distributed,real-time measurement and good durability.These attributes have led to the gradual application of AHFO technology to the water content measurement of in situ soil.However,all existing in situ applications of AHFO technology fail to consider the effect of soilesensor contact quality on water content measurements,limiting potential for the wider application of AHFO technology.To address this issue,the authors propose a method for determining the soilesensor thermal contact resistance based on the principle of an infinite cylindrical heat source.This is then used to establish an AHFO water content measurement technology that considers the thermal contact resistance.The reliability and validity of the new measurement technology are explored through a laboratory test and a field case study,and the spatial-temporal evolution of the soil water content in the case is revealed.The results demonstrate that method for determining the soilesensor thermal contact resistance is highly effective and applicable to all types of soils.This method requires only the moisture content,dry density,and thermal response of the in situ soil to be obtained.In the field case,the measurement error of soil water content between the AHFO method,which takes into account the thermal contact resistance,and the neutron scattering method is only 0.011.The water content of in situ soil exhibits a seasonal variation,with an increase in spring and autumn and a decrease in summer and winter.Furthermore,the response of shallow soils to precipitation and evaporation is significant.These findings contribute to the enhancement of the accuracy of the AHFO technology in the measurement of the water content of in situ soils,thereby facilitating the dissemination and utilization of this technology.
基金Baicheng Medical College 2020 school-based project.2020 General Topic“Practical Research on Project-Based Teaching in the Course of Contact Lens Fitting Technology”(Project number:BYZB2020031)。
文摘Objective:This paper aims to study the application of flipped classroom teaching model based on micro-course in the practical training teaching of contact lens fitting technology.Methods:From September 21 to July 23,120 students majoring in ophthalmology and optometry were selected and randomly divided into groups.The control group adopted the traditional teaching mode,and the study group adopted the flipped classroom teaching mode based on micro-course.Teaching scores and the skills,observation and judgment,adaptability,and communication skills were compared between the groups.Results:Statistical comparison of teaching scores under different management methods showed that the clinical thinking score and practice work quality in the study group were higher than those of the control group,and the effect of the study group was better(P<0.05).The overall scores of skills,observation and judgment,adaptability,and communication skills of the study group were better than those in the control group,and the comprehensive ability scores in the two groups were significantly different(P<0.05).Conclusion:In practical training teaching of contact lens fitting technology,the application of flipped classroom teaching based on micro-course can improve the skill scores of personnel,and the overall effect is good.This can lay the foundation for advanced ophthalmology and optometry talents with profound theoretical knowledge and professional skills.
文摘The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are required to resolve the issues.In this context,the author thoroughly integrated with the present industrial development situation,examined the use of 5G technology in industrial internet security,and desired to leverage the advantageous benefits of 5G technology to boost industrial development.Due to the numerous benefits of 5G technology in security applications,we conducted an in-depth investigation and described it from the perspectives of relevant concepts,security,and security application guarantee measures,with the goal of achieving the goal of safe industrial internet operation.
文摘Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.
文摘In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security.