ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2: BDCPS 2022, December 16–17, Bangkok, Thailand

دانلود کتاب مجموعه مقالات چهارمین کنفرانس بین المللی تجزیه و تحلیل داده های بزرگ برای سیستم سایبری-فیزیکی در شهر هوشمند - جلد 2: BDCPS 2022، 16–17 دسامبر، بانکوک، تایلند

Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2: BDCPS 2022, December 16–17, Bangkok, Thailand

مشخصات کتاب

Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2: BDCPS 2022, December 16–17, Bangkok, Thailand

ویرایش:  
نویسندگان: , ,   
سری: Lecture Notes on Data Engineering and Communications Technologies, 168 
ISBN (شابک) : 9819911567, 9789819911561 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 748
[749] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 24 Mb 

قیمت کتاب (تومان) : 50,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2: BDCPS 2022, December 16–17, Bangkok, Thailand به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات چهارمین کنفرانس بین المللی تجزیه و تحلیل داده های بزرگ برای سیستم سایبری-فیزیکی در شهر هوشمند - جلد 2: BDCPS 2022، 16–17 دسامبر، بانکوک، تایلند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات چهارمین کنفرانس بین المللی تجزیه و تحلیل داده های بزرگ برای سیستم سایبری-فیزیکی در شهر هوشمند - جلد 2: BDCPS 2022، 16–17 دسامبر، بانکوک، تایلند




توضیحاتی درمورد کتاب به خارجی

This book gathers a selection of peer-reviewed papers presented at the 4th Big Data Analytics for Cyber-Physical System in Smart City (BDCPS 2022) conference held in Bangkok, Thailand, on December 16–17. The contributions, prepared by an international team of scientists and engineers, cover the latest advances and challenges made in the field of big data analytics methods and approaches for the data-driven co-design of communication, computing, and control for smart cities. Given its scope, it offers a valuable resource for all researchers and professionals interested in big data, smart cities, and cyber-physical systems.



فهرست مطالب

Preface
Organization
Contents
Big Data Direct Search Algorithm Based on Linear Programming
	1 Introduction
	2 Research on the Solution of Big Data Direct Search Algorithm Based on Linear Programming
		2.1 Linear Programming
		2.2 Direct Search Algorithm
		2.3 Processing of Linear Constraints by Direct Search Filtering Algorithms
		2.4 Portfolio
	3 Investigation and Research on the Solution of Big Data Direct Search Algorithm Based on Linear Programming
		3.1 Research Methods
		3.2 Direct Search Algorithm for Linear Integer Programming
	4 Analysis and Research on the Solution of Big Data Direct Search Algorithm Based on Linear Programming
		4.1 Portfolio Optimization with Cardinality Constraints
		4.2 Portfolio Optimization Under Linear Transaction Costs
	5 Conclusions
	References
Intelligent Traffic Signal Control System Based on Machine Learning Algorithm
	1 Introduction
	2 Research Method of ITSCS Based on Machine Learning Algorithm
		2.1 Support Vector Machine Algorithm
		2.2 Advantages and Disadvantages of Support Vector Machines
	3 Experiment on the Research of ITSCS Based on Machine Learning Algorithm
		3.1 Hardware Structure of ITSCS
		3.2 Communication Process Between ITSCS Devices
	4 ITSCS Based on Machine Learning Algorithm
		4.1 Vehicle Flow Data Collection Tasks
		4.2 Research Investigation and Analysis of ITSCS Based on Machine Learning Algorithm
	5 Conclusions
	References
Traffic Spatial Data Management System Based on Data Mining
	1 Introduction
	2 Design of Traffic Spatial Data Management System Based on Data Mining
		2.1 Implementation Framework of Software System for Short-Term Traffic Flow Prediction Based on Data Mining
		2.2 Data Mining Technology in Intelligent Transportation
		2.3 Spatial Data Mining Technology
		2.4 Traffic Flow Spatial Data Mining Clustering Algorithm
	3 Experimental Research on Traffic Spatial Data Management Based on Data Mining
		3.1 Improved Gm(1, 1) Model Based on Generalized Data Level Ratio
		3.2 Experimental Steps
	4 Experimental Research and Analysis of Traffic Spatial Data Management Based on Data Mining
		4.1 Prediction Error Analysis of Traffic Data in the Morning Time Period
		4.2 Prediction Error Analysis of Traffic Data in the Afternoon
	5 Conclusions
	References
Design of Intelligent Prefabricated Building Real-Time Safety Management Monitoring Platform Based on Optimization Algorithm
	1 Introduction
	2 Related Theoretical Overview and Research
		2.1 Application Examples of Intelligent Prefabricated Buildings
		2.2 Features of Bim Implementation
	3 Experiment and Research
		3.1 Experimental Method
		3.2 Experimental Requirements
	4 Analysis and Discussion
		4.1 Analysis of Platform Test Case Execution Results
		4.2 Analysis of Platform Monitoring and Early Warning Response Time
	5 Conclusions
	References
Design of Automatic Call-Test System for Charging Pile IoT Data Based on NB-IoT
	1 Introduction
	2 Design of an Automatic Test System for Charging Pile IoT Data Based on NB-IoT
		2.1 Hardware Design of the Data Collection End of the Charging Pile Internet of Things Based on NB-IoT
		2.2 Charging Pile IoT Data Communication Transmission Design
		2.3 Charging Pile Fault Monitoring and Early Warning Based on NB-IoT
	3 System Test Design
		3.1 Experiment Preparation
		3.2 Prediction Test of Charging Pile Over-Temperature Fault
		3.3 Monitoring of Point Voltage, Current and Power Data of Charging Piles
	4 Analysis of Test Results of Charging Pile IoT Data Automatic Call Test System
		4.1 Prediction and Analysis of Overheating Faults of Charging Piles
		4.2 Charging Pile Data Monitoring
	5 Conclusions
	References
Using Deep Neural Network Learning Technology to Design of Intelligent Network Crawler on Big Data Platform
	1 Introduction
	2 Research on Smart Network Crawler by Big Data Platform
	3 Combination of Deep Learning and Convolutional Neural Networks
	4 Using Deep Neural Network Learning Technology to Design of Intelligent Network Crawler on Big Data Platform
	5 Conclusion
	References
Machine Translation Quality Evaluation Model Based on Data Mining Algorithm
	1 Introduction
	2 Introduction to Data Mining Technology
		2.1 Significance and Function of Data Mining
		2.2 Basic Algorithm of Decision Tree Generation
	3 Experiments
		3.1 Experimental Steps
		3.2 Experimental Simulation
	4 Discussion
	5 Conclusions
	References
A Framework of Computer Network Security (NS) System and Its Application
	1 Background Significance
	2 Concept and Construction of Computer NS System
		2.1 Concept of NS
		2.2 Significance of NS
		2.3 Project Risk Management Process
		2.4 General Construction Principles of Computer NS
		2.5 Risk Assessment Method
		2.6 Risk Response Methods
	3 Algorithm for Intelligent Mining of Massive Digital Archives
	4 Research on Intelligent Mining Method of Massive Digital Archives
	5 Conclusions
	References
Application of Computer Technology (CT) in 5G Communication Network
	1 Introduction
	2 Application of CT in 5G Communication Network
		2.1 User Interface Layer
		2.2 Sonac Management
		2.3 General Control Interface Layer
		2.4 Physical Resource Layer
		2.5 System Architecture Design
	3 5G Communication Network Transmission Rate Algorithm
	4 Experimental Analysis of CT Applied to 5G Communication Network
	5 Conclusions
	References
Application of Mobile Virtual Reality to Computer Graphics and Image Processing Technology
	1 Introduction
	2 Overview of Relevant Algorithms
		2.1 Mobile Virtual Reality
		2.2 Features of Mobile Virtual Reality
		2.3 Computer Graphics and Image Processing Technology
	3 Experiments on Computer Graphics and Image Processing Technology in Mobile Virtual Reality
		3.1 Selection of Subjects s
		3.2 Data Acquisition and Processing
	4 Experimental Analysis of Mobile Virtual Reality on Computer Graphics and Image Processing Technology
		4.1 Analysis of Experimental Results
	5 Conclusions
	References
Online Teaching System of French on Demand Based on Streaming Media Technology
	1 Introduction
	2 Composition of Video on Demand System
	3 Composition of Nginx Server
	4 H.265 Video Coding
	5 Architecture of French On-Demand Online Teaching System Based on Streaming Media Technology
	6 Application of French On-Demand Online Teaching System Based on Streaming Media Technology
	7 Conclusion
	References
Development of Industry-University-Research Institute Collaborative Innovation Information Platform Based on Spring MVC Framework
	1 Introduction
	2 Principle of Spring MVC Framework
	3 3D Model of Industry-University-Research Institute Collaborative Innovation
	4 Use Case Diagram of Industry-University-Research Institute Collaborative Innovation Information Platform
	5 Implementation of Industry-University-Research Institute Collaborative Innovation Information Platform Based on Spring MVC Framework
	6 Conclusion
	References
Design of Public Health Incident Warning System Based on Decision Tree Model ID3 Algorithm
	1 Introduction
	2 Proposed Method
		2.1 Data Mining
		2.2 Decision Tree Concept and Generation Algorithm
		2.3 ID3 Algorithm Idea
		2.4 Description of the ID3 Algorithm
		2.5 Definition of Public Health Emergencies
	3 Experiments
		3.1 Experimental Subjects
		3.2 Experimental Methods
	4 Discussion
		4.1 Comparison Experiment Between Classical ID3 and FW-ID3 Algorithms
		4.2 Analysis of the Necessity of the Transfer of “Early Warning Right” for Public Health Emergencies
	5 Conclusions
	References
Vehicle Engineering Smart Device Based on Wearable Technology
	1 Analysis of the Status Quo of Wearable Smart Equipment Industry Chain
		1.1 Development Status of International Wearable Equipment
		1.2 Market Expectation of Intelligent Wearable Equipment
	2 Development Trend of Wearable Intelligent Equipment Technology
		2.1 Operating System for Wearable Smart Devices
		2.2 Mobile Chips for Wearable Intelligent Devices
		2.3 Wearable Equipment is Expected to Become the Remote Control Center of Smart Cars in the Future
		2.4 The Application of Wearable Equipment and Automobile Interactive System Will Enhance the Safety of Driving Vehicles
		2.5 The Integration of Wearable Technology and Automobiles is an Indispensable Place for Businessmen
	3 Application of Intelligent Technology in Vehicle Engineering
		3.1 Application of Intelligent Technology in Vehicle Anti-collision System
		3.2 Application of Intelligent Technology in Power Plant
		3.3 Application of Intelligent Technology in Vehicle Body
		3.4 Application of Intelligent Technology in Vehicle Taillights
	4 Conclusion
	References
Algorithm Design of Online Education Platform Based on Simulation Experiment
	1 Introduction
	2 The Demonstration of the Necessity of Designing Online Simulation Experiment
		2.1 Cost Considerations Based on Experiments
		2.2 Based on the Objective Needs of Online Teaching of Epidemic Situation
		2.3 The Design Goal of Online Education Platform for Simulation Experiment
	3 The Functional Design of Online Education Platform
		3.1 It has the Functions of User Registration and Account Cancellation
		3.2 It has the Function of Cloud Synchronization
		3.3 It has the Functions of Simulation Experiment and Knowledge Teaching
		3.4 Learning Effect Evaluation Function
		3.5 Process Recording and Playback Functions
		3.6 Teaching Resources Online to Provide and Share Function
	4 Subsystem Module and Operation Logic of Online Education Platform
		4.1 User Management and Cloud Service Module
		4.2 Online Communication Module
		4.3 Experimental Teaching Resource Database Module
		4.4 Simulation Experiment Teaching Module
		4.5 Online Evaluation Module
	5 The Development and Design of the Basic Components of Online Education Platform
		5.1 Basic Database
		5.2 Simulation Experiment Component
		5.3 Online Video Editing Component
		5.4 Communication Components
		5.5 Human Machine Interaction Component
	6 Deployment Design of Online Education Platform
		6.1 Platform Operation Efficiency
		6.2 Platform Security
		6.3 Platform Usability
		6.4 Platform Operation and Maintenance Costs
	7 Conclusion
	References
Bridge Structure Reinforcement and Reconstruction Technology Based on Mobile Navigation BIM
	1 Introduction
	2 Bridge Structure Reinforcement and Reconstruction Technology of Mobile Navigation BIM
		2.1 Overall Design of Navigation System
		2.2 Digital Construction Based on BIM Technology
		2.3 Design of Construction Simulation Process Based on BIM
		2.4 Basic Principles of Bridge Reinforcement
	3 Bridge Evaluation Method
	4 Bridge Evaluation Test Analysis
	5 Conclusions
	References
Construction of Operation and Maintenance System of 5G New Media Platform Big Data System
	1 Background
	2 Analysis of Operation and Maintenance System of Big Data System
		2.1 New Media Big Data Demand
		2.2 Operation and Maintenance System Design
		2.3 Support Tool
	3 Construction of Operation and Maintenance System of Big Data
		3.1 Operation and Maintenance Monitoring Construction
		3.2 System Operation and Maintenance Construction
		3.3 Data Operation and Maintenance
	4 Conclusion
	References
Urban Electric Vehicle Public Charging Network Based on 5G and Big Data
	1 Introduction
	2 Research on 2.5G and Big Data Urban Electric Vehicle Public Charging Network
		2.1 Relevant Indicators of Pure Electric Vehicle
		2.2 5G Network
		2.3 Public Charging Network Planning Scheme
	3 Experimental Background and Design
		3.1 Experimental Ideas
		3.2 Experimental Design
	4 Discussion
		4.1 Comparative Analysis of User Travel Time
		4.2 User Parking Distribution
		4.3 Social Significance of Public Power Grid Construction Based on 5G Big Data Network Architecture
		4.4 Research Problems and Measures of Setting Up Electric Vehicle Charging Network
	5 Conclusions
	References
Voice Compression Coding Scheme of Ground Penetrating Wireless Communication in Mines Based on Fuzzy Delta Modulation
	1 Introduction
	2 Voice Signal Model
	3 Compression Coding Scheme
		3.1 Fuzzy Delta Modulation
		3.2 Anti-noise Performance Analysis
	4 Design of Fuzzy Controller
		4.1 Selection of Input and Output Signals and Determination of Membership Degree
		4.2 Fuzzy Control Rule Design and Fuzzy Reasoning of Quantized Interval
	5 Simulation Model and Result Analysis
	6 Conclusion
	References
Peak-Type Markov Chain and Its Application Research in Electrical Predictionn
	1 Introduction
	2 Traditional Markov Chain
	3 Peak-Type Markov Chain
		3.1 The Derivation of Peak-Type Markov Chain
		3.2 The Definition of Peak-Type Markov Chain
	4 Example Modeling
	5 Conclusion
	References
Research on Optimization of Power Logistics Tracking System Based on Smart Supply Chain
	1 Introduction
	2 Smart Supply Chain Model
	3 Power Logistics Tracking System
		3.1 Overview of Power Logistics Tracking System
		3.2 Power Logistics Supply Chain Characteristic Data Processing
	4 RFID Equipment for Power Materials
	5 Application and Effect
		5.1 Logistics Location Tracking
		5.2 Path Planning
		5.3 The Relationship Between Electronic Material Card and Multimedia Data
		5.4 Data Query
		5.5 Information Sharing
	6 Conclusion
	References
Intensive Management of Distribution Network Scheduling Operation Based on Artificial Intelligence
	1 Introduction
	2 Research on Intensive Management of Distribution Network Scheduling Operation Based on Artificial Intelligence
		2.1 Intensive Operation Management of Power Grid Dispatching
		2.2 Algorithms Related to Power Dispatching Operation Management of Distribution Network
		2.3 Distributed Distribution Network
	3 Investigation and Research on Intensive Management of Distribution Network Scheduling Operation Based on Artificial Intelligence
		3.1 Application Status of Distribution Network Automation
		3.2 Power Dispatching Operation Management Model
	4 Analysis and Application of Intensive Management of Distribution Network Scheduling Operation Based on Artificial Intelligence
		4.1 Improved Genetic Algorithm M Area Distribution Network Power Dispatch Management
		4.2 Application Effect Analysis
	5 Conclusions
	References
Personalized Teaching Knowledge Recommendation System Based on Artificial Intelligence Algorithm
	1 Introduction
	2 Overview of Relevant Algorithms
		2.1 Artificial Intelligence (AI)
		2.2 Personalized Recommendation System
	3 System Design
		3.1 System Functional Requirements
		3.2 System Function Design
	4 Experimental Analysis
		4.1 Data Sources
	5 Conclusions
	References
Target Detection and Tracking Technology of Aerobics Sports Training Based on Hybrid Algorithm
	1 Introduction
	2 Research on MTD and Tracking Algorithm
		2.1 MTD Algorithm
		2.2 Moving Target Tracking(MTT) Algorithm
	3 A Hybrid Algorithm of MTD and Tracking Based on BDM and Kalman Filter Method
	4 Algorithm Test
		4.1 Algorithm Performance Test
		4.2 Comparison of Detection and Tracking Results of Each Algorithm
	5 Conclusion
	References
Research on Power Material Supply Method Based on Smart Contract System
	1 Introduction
	2 Related Work
	3 Blockchain-Based Dower Material Supply System
		3.1 Security Assessment of Blockchain Power Supply
		3.2 Smart Contract Design for Power Supply Chain
	4 Smart Contracts for Electricity Supply
	5 Experimental Results
	6 Summarize
	References
Short-Time Prediction Analysis Algorithm of Traffic Flow in Transportation Hubs Based on Cell Phone Signaling Data
	1 Introduction
	2 Short-Term Traffic Prediction of Rail Transit Based on Mobile Phone Signaling Big Data
		2.1 Phone Signaling Data Generation Principle
		2.2 Cell Phone Signaling and Rail Route Acquisition
		2.3 Road Matching and User Determination
		2.4 Analysis of the Characteristics of Short-Time Rail Passenger Flow
	3 Prediction of Pedestrian Flow in Urban Traffic Hubs Based on K-value Adaptation
	4 Conclusion
	References
Population Prediction Analysis Based on Convolutional Neural Network Algorithm
	1 Introduction
	2 Research on Population Prediction Based on Convolutional Neural Network Algorithm
		2.1 Convolutional Neural Networks
		2.2 Network Model Based on Full Convolution
		2.3 Crowd Counting Based on Density Map
		2.4 Density Map Generation Method
	3 Investigation and Research on Population Prediction Based on Convolutional Neural Network Algorithm
		3.1 Experimental Environment
		3.2 Datasets
		3.3 Network Training Parameters
	4 Comparative Analysis of Population Prediction Based on Fully Convolutional Network Model and MCNN
	5 Conclusions
	References
Clothing Style Design Based on Image Processing Technology and Psychology
	1 Introduction
	2 Research on Clothing Style Design Based on Image Processing Technology and Psychology
		2.1 Psychological Research
		2.2 Clothing Psychology
		2.3 The Concept of Images
		2.4 Overview of Image Processing Technology
	3 Take Miniskirt as an Example of Clothing Style Design Process
		3.1 Basic Specifications of Miniskirt
		3.2 Extraction of the Uniformity Index
		3.3 Data Processing
	4 Analysis and Research of Clothing Style Design Based on Image Processing Technology and Psychology
		4.1 Appearance and Form Image Collection of Miniskirt
		4.2 Extraction of Length Index and Angle Index
	5 Conclusions
	References
An Algorithm for New Energy Battery SOH Prediction Based on Deep Learning
	1 Introduction
	2 Battery State of Health and Charge-Discharge Characteristics
		2.1 Definition of Battery State of Health(SOH)
		2.2 Charge and Discharge Characteristics of Power Battery Under Different Health States
	3 Battery State of Health Prediction Algorithm
		3.1 Encoding Layer
		3.2 Self-Attention Layer
		3.3 Full-Connection Layer
	4 Experiment and Result Analysis
		4.1 Algorithm Key Parameters and Structure
		4.2 Model Prediction Accuracy Verification Based on Nasa Battery Data Set Experimental Database.
	5 Conclusion
	References
Anti-lock Braking System of New Energy Vehicle Based on Online Algorithm Perspective
	1 Introduction
	2 Research Method of New Energy Vehicle ABS Based on Online Algorithm Perspective
		2.1 Function of ABS
		2.2 Working Principle of the ABS
		2.3 Main Performance of the New Energy Vehicle ABS
	3 Experiments on the Research on the ABS of New Energy Vehicles Based on the Perspective of Online Algorithms
		3.1 Wheel Braking Force
		3.2 Determination of Simulation Parameters
		3.3 Anti Lock Coordinated Control Strategy
	4 ABS of New Energy Vehicles Based on the Perspective of Online Algorithm
		4.1 Evaluation Index of Braking Performance
		4.2 Simulation Result
		4.3 Investigation and Analysis of Research on New Energy Vehicle Anti-lock Brake System Based on Online Algorithm Perspective
	5 Conclusions
	References
Fatigue Life Prediction of Road Beams Based on Artificial Bee Colony Algorithm and Traffic Simulation
	1 Introduction
	2 A Method for Predicting Fatigue Life of Road Beams Based on ABCA and Traffic Simulation
		2.1 Theory of ABCA
		2.2 Characteristics of ABCA
		2.3 Basic Process of ABCA
		2.4 Fatigue Life Prediction Based on CAE
	3 Experiment of Road Beam Fatigue Life Prediction Based on ABCA and Traffic Simulation
		3.1 Vehicle Road Durability Test
		3.2 Performance Analysis of Bee Colony Algorithm
	4 Road Beam Fatigue Life Prediction Based on ABCA and Traffic Simulation
		4.1 Experimental Analysis
	5 Conclusions
	References
Prediction and Realization of Brand Loyalty by Brand Community Content Marketing Based on Digital-Intelligent Algorithm System
	1 Introduction
	2 Related Theoretical Overview and Research
		2.1 Prediction and Realization of Brand Loyalty
		2.2 Introduction to the Theory of Digital Marketing
	3 Experiment and Research
		3.1 Experimental Method
		3.2 Experimental Requirements
	4 Analysis and Discussion
		4.1 Reliability Analysis of the Scale of Brand Attachment
		4.2 Brand Value Scale Factor Analysis
	5 Conclusion
	References
Fast-ICA Algorithm in Industrial Control Network Anomaly Detection System
	1 Introduction
	2 Design and Exploration of the Application of FAST-ICA Algorithm in Industrial Control Network Anomaly Detection System
		2.1 Fast ICA Algorithm
		2.2 FastICA Algorithm Description
		2.3 Application of Fast-ICA Algorithm in Industrial Control Network Anomaly Detection System
	3 Research on the Application Effect of FAST-ICA Algorithm in Abnormal Detection System of Industrial Control Network
		3.1 Network Threats
	4 Investigation and Analysis of the Application of FAST-ICA Algorithm in Industrial Control Network Anomaly Detection System
	5 Conclusions
	References
A Quantitative Evaluation Model of Computer Audit Risk in Network Environment
	1 Introduction
	2 Design and Research of Computer Audit Risk Assessment Model
		2.1 Features of Computer Auditing
		2.2 Common Quantitative Risk Assessment Methods
		2.3 Algorithm Research
	3 Experimental Research on Quantitative Evaluation Model of Computer Audit Risk
		3.1 Comparison of Evaluation Methods
		3.2 Modern Risk-Oriented Auditing
	4 Experiment Analysis of Quantitative Evaluation Model of Computer Audit Risk
		4.1 Audit Risk Assessment
	5 Conclusion
	References
Python Data Analysis Techniques in Administrative Information Integration Management System
	1 Introduction
	2 Design and Exploration of the Application of Python Data Analysis Technology in Administrative Information Integration Management System
		2.1 Python Data Analysis Techniques
		2.2 Advantages of Python in Data Analysis
		2.3 Application of Python Data Analysis Technology in Administrative Information Integration Management System
	3 Explore the Application Effect of Python Data Analysis Technology in Administrative Information Integration Management System
		3.1 Functional Requirement Analysis
	4 Investigation and Research on the Application of Python Data Analysis Technology in Administrative Information Integration Management System
	5 Conclusions
	References
Artificial Psychology Modeling System Based on Interactive Genetic Algorithm
	1 Introduction
	2 AP Modeling Based on IGA
		2.1 IGA
		2.2 AP
		2.3 AP Modeling System Based on IGA
	3 IGA
	4 Experimental Test and Analysis
	5 Conclusions
	References
Optimization System of Rural Landscape Environment Based on Interactive Genetic Algorithm
	1 Introduction
	2 Optimization Method of Landscape Design Based on IGA
		2.1 Visual Sampling and Fusion of Rural Landscape Space Environment Design Images
		2.2 Image Feature Fusion and Reconstruction Model
		2.3 Planning Optimization Process Based on IGA in This Mode
		2.4 Parameter Setting of IGA
	3 The Optimization of Rural Landscape Design
		3.1 Vision of Rural Landscape Space Environment
	4 Conclusion
	References
Electric Power Marketing Measurement Management System Based on Computer and Internet Technology
	1 Introduction
	2 System Function Introduction
		2.1 Functions of Electricity Marketing Metering Management System Based on Advanced Technology
		2.2 ID3 Decision Tree Algorithm
	3 System Design
		3.1 Component-Based Development Mode
		3.2 Database Design
	4 System Testing and Implementation
		4.1 Analysis of System Test Results
		4.2 System Implementation
	5 Conclusion
	References
Model Design of Digital Economy Management System Based on Neural Network Algorithm
	1 Introduction
	2 Research on the Model of Digital Economy Management System Based on Neural Network Algorithm
		2.1 Status Quo of Digital Economy Management System Model
		2.2 Algorithm Characteristics of BP Neural Network
		2.3 System Feasibility Analysis
	3 The Construction of Digital Economy Management System Model Based on Neural Network
		3.1 Neural Network Structure Design
		3.2 Data Preprocessing
		3.3 Neural Network Model
	4 Application Example of Digital Economy Management System Model Based on Neural Network Algorithm
		4.1 Data Collection and Preprocessing
		4.2 Building and Training the Network Model
	5 Conclusions
	References
Research on Speech Adversarial Sample Attack Based on APA
	1 Introduction
	2 Background
		2.1 Deepspeech Model
		2.2 Counter Sample Attack
	3 Voice Countermeasure Sample Attack
		3.1 Speech Counter Sample Attack based on APA
		3.2 Attack Condition Setting
		3.3 Evaluating Indicator
	4 Experimental Results and Analysis
	5 Conclusions
	References
2D/3D Visualization Realization of Power Grid Operation Monitoring System Based on Big Data
	1 Introduction
	2 Research on 2D/3D Visualization of Power Grid Operation Monitoring System Based on Big Data
		2.1 Visualization Technology
		2.2 The Data Collection Method of the System
		2.3 Non-functional Requirements
		2.4 System Design Principles
	3 Investigation and Research on 2D/3D Visualization of Power Grid Operation Monitoring System Based on Big Data
		3.1 Overall Architecture Design of Operation Monitoring System
		3.2 Visualization Module Functional Structure
		3.3 Visualization of Alarm Information Preprocessing Results
	4 Realization and Analysis of 2D/3D Visualization of Power Grid Operation Monitoring System Based on Big Data
		4.1 System Visualization Implementation
		4.2 System Test
	5 Conclusions
	References
Campus Culture Intelligent Communication System Based on Improved Genetic Algorithm
	1 Introduction
	2 Design of CC ICS Based on Improved GA
		2.1 CC Communication Function
		2.2 Problems in CC Communication Under Traditional Media
		2.3 Construction of CC ICS Based on Improved GA
	3 Improvement of GA
		3.1 Disadvantages of GA
		3.2 Improvement of GA
	4 Data Analysis of CC Intelligent Communication Effect Based on Improved GA
	5 Conclusions
	References
Three-Pillar Model of HR in the Context of Digital Transformation
	1 Introduction
	2 Related Theoretical Overview and Research
		2.1 Human Resource Management System and Three-Pillar Model
		2.2 Problems Existing in Enterprise Human Resource Management System Under the Background of Digital Transformation
	3 Experiment and Research
		3.1 Experimental Method
		3.2 Experimental Requirements
	4 Analysis and Discussion
		4.1 Analysis of Digital Economy Scale Growth
		4.2 Analysis of the Comprehensive Quality of HR Personnel Under the Three-Pillar Model
	5 Conclusions
	References
Sports Video Image Analysis System Based on SIFT Algorithm
	1 Introduction
	2 Discussion on Sports Video Image Analysis System Based on SIFT Algorithm
		2.1 General
		2.2 SIFT Algorithm
		2.3 Main Problems of Current Moving Video Image Multiple Processing Technology System
	3 Experiments
		3.1 Experimental Steps
		3.2 Experimental Simulation
	4 Discussion
	5 Conclusions
	References
Ultra-Short-Term Wind Speed Prediction for Wind Farms Based on Multi-objective Optimization Algorithm in the Context of Smart Grid
	1 Introduction
	2 Introduction to Model Methods
		2.1 Time Varying Filter Approach for Empirical Mode Decomposition (TVF-EMD)
		2.2 Multi-objective Aquila Optimization Algorithm (MOAOA)
		2.3 Convolutional Factorization Machine (CFM)
	3 Design of Wind Speed Prediction Experiment
		3.1 Description of Experimental Data
		3.2 Evaluation Metrics of the Prediction Model
		3.3 Comparative Analysis of Predictive Models
	4 Conclusion
	References
Key Technologies of Dynamic Network Virtual Simulation
	1 Introduction
	2 Related Theoretical Overview and Research
		2.1 Analysis of the Status Quo of Dynamic Network Defense
		2.2 Theories Related to Key Technologies of Virtual Simulation
	3 Experiment and Research
		3.1 Experimental Method
		3.2 Experimental Requirements
	4 Analysis and Discussion
		4.1 Analysis of Dynamic Strategy Adopted by Defenders
		4.2 Parameter Setting and Corresponding Optimal Jump Period Analysis
	5 Conclusions
	References
Research on Probe Preparation and Control Circuit Design of Thermal Anemometer Based on Neural Network
	1 Introduction
	2 Overview of Neural Networks
		2.1 Artificial Neuron Structure
		2.2 Artificial Neural Network Model
	3 Thermal Anemometer Probe System Preparation
		3.1 Thermal Sensor Preparation
		3.2 Hot Film Sensor Preparation
		3.3 Probe and Holder Preparation
	4 Neural Network Based Thermal Anemometer Control Circuit Design
	5 Conclusion
	References
Development of Intelligent Garbage Classification System Based on WeChat Applets
	1 Introduction
	2 Analysis of System Functional Requirements
	3 System Design and Implementation
		3.1 Cloud Development and Architecture Design
		3.2 Database Table Design
		3.3 System Function Module Design
		3.4 System Function Realization
		3.5 System Testing
	4 Conclusions
	References
Safety Analysis and Design of Artificial Intelligence System Based on Sensor and AI Technology
	1 Introduction
	2 Related Theoretical Overview and Research
		2.1 Overview of AI System
		2.2 Introduction to Sensor Network Technology
		2.3 Sensor-Based Artificial Intelligence Security System
	3 Experiment and Research
		3.1 Experimental Method
		3.2 Experimental Requirements
	4 Analysis and Discussion
		4.1 Analysis of Operation Accuracy of Intelligent System
		4.2 Security Analysis of AI System
	5 Conclusions
	References
Construction of E-Commerce Logistics Management Mode Based on VR Technology in the Background of 5G
	1 Introduction
	2 Application Analysis of VR Technology in E-commerce in 5G era
	3 Research on the Impact of 5G Technology on the Logistics Industry
	4 Construction of E-Commerce Logistics Management Mode Based on VR Technology in the Background of 5G
	5 Conclusion
	References
Multi-temporal Land Cover Segmentation Via Trans-ConvLSTM
	1 Introduction
	2 Literature Review
		2.1 Spatiotemporal Analysis
		2.2 Image Semantic Segmentation
	3 Preliminaries
		3.1 Problem Definition
		3.2 Self-Attention ConvLSTM
	4 Proposed Method
		4.1 Overall Architecture
		4.2 Spatial Aspect
		4.3 Temporal Aspect
		4.4 Loss Function
	5 Evaluation
		5.1 Dataset Description
		5.2 Implementation and Training
	6 Results
	7 Conclusion
	References
Construction of Library Database Security System Supported by SQL Server Technology
	1 Introduction
	2 Basic Concepts of SQL Server Technology and Current Situation of Library Database Security
		2.1 Basic Concepts
		2.2 Current Situation of Library Database Security
	3 Library Database Security System Design
		3.1 Design Requirements
		3.2 Design Method
	4 Conclusion
	References
Clustering Mining Method Analysis of Human Resources Big Data Driven by Swarm Intelligence Algorithm
	1 Introduction
	2 Overview of Cluster Analysis
		2.1 Basic Model of Cluster Analysis
		2.2 Optimization Design of Wolf Colony Algorithm
	3 The Significance of Big Data Mining Technology for Enterprise Human Resource Management
		3.1 Content of Data Mining
		3.2 Promote the Accuracy of Enterprise Recruitment
		3.3 Promote the Personalized Development of Enterprise Training
		3.4 Help to Achieve Comprehensive Assessment of Employees
		3.5 More Humanized Handling of Employee Relations
	4 Implementation of Enterprise Manpower Dispatching System in the Age of Big Data
		4.1 Actively Change the Concept of Manpower Dispatching
		4.2 Actively Build a Modern Manpower Dispatching System
		4.3 Build a Professional Manpower Dispatching Team
		4.4 Ensuring the Effectiveness of Performance Appraisal
	5 Conclusion
	References
Application of Mathematical Modeling in Preventing Computer Virus Infection
	1 Introduction
	2 Relationship Between Mathematical Modeling and Computer Technology
		2.1 Mathematical Modeling
		2.2 Computer Technology
		2.3 Connection Between Computer Technology and Mathematical Modeling
	3 Analyzing the Vector of Virus Infection from the Angle of Mathematical Abstraction -- Computer Network
	4 Mathematical Abstract Description of Computer Virus Infection Mode
	5 Application of Mathematical Modeling in Virus Infection
		5.1 Mathematical Expectation Definition of Virus Infection Probability Model
		5.2 Analysis of Virus Infection Time of Target Node in Computer Topology Network
	6 Conclusion
	References
Intelligent Vulnerability Association Algorithm Based on Association Rule Mining
	1 Introduction
	2 Data Association Analysis Method in Decompiled Results
		2.1 Definition of Data Association
		2.2 Data Relevance Information Extraction
		2.3 Data Association Information Assisted Vulnerability Mining
	3 Description of Hit Graph Generation Algorithm
	4 Result Analysis
	5 Conclusion
	References
Integrated Monitoring System of Substation Operation and Maintenance Security State Based on Cloud Computing
	1 Introduction
	2 Application of Substation Operation and Maintenance Safety State
		2.1 Application of Active Comprehensive Error Prevention Technology for Operation and Maintenance
		2.2 Application of Hard Pressing Plate Error Prevention Technology
		2.3 Application of Device Isolation and Error Prevention Technology During Operation and Maintenance
	3 Operation and Maintenance Error Prevention Technology of Relay Protection in Intelligent Substation
		3.1 Calculate the Dynamic Baseline of Relay Protection Operation and Maintenance in Intelligent Substation
		3.2 Data Management for Operation, Maintenance and Error Prevention of Relay Protection in Intelligent Substation
		3.3 Realize the Visualization of Operation, Maintenance and Error Prevention of Relay Protection in Intelligent Substations
	4 Example Analysis
		4.1 Experimental Preparation
		4.2 Result Analysis
	5 Conclusion
	References
Communication Boundary Stealth Technology of Power Internet of Things Terminal Network
	1 Introduction
	2 Network Stealth Technology
		2.1 SDP Network Stealth Design
		2.2 SPA Stealth Service
	3 Network Stealth Security Capability
	4 Conclusion
	References
Secure Access of IoT Terminals in Special Scenarios
	1 Introduction
	2 Power Satellite Internet of Things
		2.1 Features of Power Satellite Internet of Things
		2.2 Power Satellite IoT System Structure
	3 Secure Access of Power Satellite Internet of Things
		3.1 Power Satellite Internet of Things Access Terminal Equipment
		3.2 IPK Based Power Satellite Internet of Things Edge Security Access
		3.3 Generation of IPK Based Digital Signature for Edge Security Access of Power Satellite Internet of Things
	4 Security Analysis of IPK Based Power Satellite Internet of Things Edge Security Access
	5 Conclusion
	References
Research on Security Encryption Algorithm of Marketing Service Data in Rural Areas of State Grid Corporation
	1 Introduction
	2 Current Situation and Main Risk Types of Data Information Security Protection of Rural Power Grid Marketing Services
		2.1 Security Protection Status
		2.2 Main Risk Types
	3 Application Method of Data Information Security Encryption Algorithm
		3.1 Selecting an Encryption Mode
		3.2 Encryption Algorithm
	4 Simulation Test
	5 Conclusion
	References
Data Transmission Technology of Internet of Things Based on ISSA Algorithm
	1 Introduction
	2 Existing Problems and Dilemmas of the Basic Concept of the Internet of Things and Its Data Transmission Technology
		2.1 Basic Concepts
		2.2 Problems and Difficulties
	3 Improvement of Internet of Things Data Transmission Technology Based on ISSA Algorithm
		3.1 Introduction to ISSA Algorithm
		3.2 Improvement Methods
	4 Simulation Analysis
	5 Conclusion
	References
Design and Application of 3D Geographic Information Visualization System Based on Skyline
	1 Introduction
	2 Skyline Software Description
	3 General Process and Key Technologies of 3D Geographic Information Visualization System Design
		3.1 General Process
		3.2 Key Technologies
	4 System Framework Building and Application Testing
		4.1 Frame Building
		4.2 Application Test
	5 Conclusion
	References
Internet Information Processing Technology Based on Big Data Analysis
	1 Introduction
	2 The Basic Concept of Big Data and Its Relationship with Internet Information Processing
		2.1 Basic Concepts
		2.2 Relationship
	3 Design Scheme of Internet Information Processing Technology System
		3.1 Design Framework
		3.2 Implementation Method
	4 Conclusion
	References
Distribution Route Optimization Method of Chain Convenience Store Based on Improved Genetic Algorithm
	1 Introduction
	2 Basic Concepts and Improvement Measures of Genetic Algorithm
		2.1 Basic Concepts
		2.2 Improvement Measures
	3 Chain Convenience Store Distribution Route Optimization Method
		3.1 Optimization Conditions
		3.2 Optimization Method
	4 Conclusion
	References
Intellectual Property Protection Method Based on Block Chain Technology
	1 Introduction
	2 Basic Concepts of Blockchain Technology and Its Advantages in Intellectual Property Protection
		2.1 Basic Concepts
		2.2 Advantage
	3 Design of Blockchain Intellectual Property Protection Platform
		3.1 Platform Framework Construction
		3.2 Contract Design
	4 Conclusion
	References
Computer Network Security Evaluation Based on Neural Network Algorithm
	1 Introduction
	2 Current Situation of Computer Network Security
	3 Concept of Neural Network Algorithm and Establishment of Computer Network Security Evaluation System
		3.1 Algorithm Concept
		3.2 Establishment of Evaluation System
	4 Simulation Analysis and Protection Suggestions
		4.1 Simulation Analysis
		4.2 Protection Suggestions
	5 Conclusion
	References
Research and Application of Performance Management System in Higher Vocational Colleges Based on Data Mining
	1 Introduction
	2 Basic Concepts of Data Mining and Performance Management
		2.1 Data Mining
		2.2 Performance Management
	3 Design of Higher Vocational Performance Management System
		3.1 System Framework
		3.2 System Design
	4 Conclusion
	References
Tourist Flow Forecast Based on Data Mining Technology
	1 Introduction
	2 Basic Concepts of Data Mining Technology
	3 The Necessary Premise of Tourist Flow Prediction
		3.1 Construction of Prediction Basis
		3.2 Systematic
		3.3 Accuracy Guarantee
	4 Design of Data Mining and Forecasting System for Tourist Attractions
		4.1 System Framework
		4.2 System Implementation Method
	5 Conclusion
	References
Security Classification Algorithm Analysis of State Grid Power Data Based on Internet of Things
	1 Introduction
	2 Main Security Risk Sources and Operation Process of the Internet of Things Power Data Acquisition System
		2.1 Main Sources of Security Risks
		2.2 Operation Process
	3 Application Analysis of Data Security Classification Algorithm
		3.1 Algorithm Introduction
		3.2 Algorithm Application
	4 Establishment of O-SVM Support Vector Machine Classification Model
		4.1 Kernel Function Extraction
		4.2 Kernel Function Improvement
	5 Simulation Analysis
		5.1 Raw Data
		5.2 Simulation Results
	6 Conclusion
	References
Optimization Strategy of Machine Translation Algorithm for English Long Sentences Based on Semantic Relations
	1 Introduction
	2 Literature Review
	3 Status Quo and Semantic Connotation of Machine Translation of English Long Sentences
		3.1 The Status Quo
		3.2 The Connotation
	4 Optimization Strategy of English Long Sentence Machine Translation Algorithm
		4.1 General Idea
		4.2 Algorithm
	5 Conclusion
	References
Application of Computer Aided Design in Mechanical Design and Manufacture
	1 Introduction
	2 Basic Concepts of Computer-Aided Design and Its Relationship with Mechanical Design and Manufacturing
		2.1 Basic Concepts
		2.2 Relationships
	3 Application of Computer Aided Design in Mechanical Design and Manufacturing
		3.1 Design and Application
		3.2 Manufacturing Application
	4 Conclusion
	References
Internet of Things Services Based on Genetic K-Means Clustering Algorithm
	1 Introduction
	2 Basic Concepts
		2.1 Genetic Algorithm
		2.2 K-Means Clustering Algorithm
		2.3 Comprehensive Concept
	3 Internet of Things Service Development
		3.1 Development Background
		3.2 Development Scheme
	4 Conclusion
	References
Two-Dimensional Dynamic Graphics and Its Application in Computer Graphic Design
	1 Introduction
	2 Related Works
	3 Analysis of the Concept and Characteristics of Two-Dimensional Dynamic Graphics
		3.1 Concept
		3.2 The Characteristics of Two-Dimensional Dynamic Graphics
	4 Application Mode and Application Field of 2D Dynamic Graphics
		4.1 Application Mode
		4.2 Application Areas
	5 Conclusion
	References
Research on Library Distributed Big Data Storage Technology
	1 Introduction
	2 Current Situation of Modern Library Data Storage, Basic Concepts and Application Advantages of Distributed Big Data Storage Technology
		2.1 The Status Quo
		2.2 Basic Concepts
		2.3 Application Advantages
	3 Design Scheme of Distributed Storage System of Big Data in Library
		3.1 Storage Space Planning
		3.2 Function Development
		3.3 Backing up Database Settings
		3.4 Configuring the Distributed Manager
	4 Conclusion
	References
Application of Internet of Things Technology in Intelligent Building
	1 Introduction
	2 Basic Concepts of Internet of Things Technology and Its Relationship with Intelligent Buildings
		2.1 Basic Concepts
		2.2 Relationship
	3 Application of Internet of Things in Intelligent Buildings
	4 Design and Application of Intelligent Building Networking System
		4.1 System Design
		4.2 Application Mode
	5 Conclusion
	References
Application of Ant Colony Algorithm in Power Grid Data Management
	1 Introduction
	2 Basic Concept, Characteristics and Advantages of Ant Colony Algorithm
		2.1 Basic Concepts
		2.2 Features and Advantages
	3 Application Ideas and Methods of Ant Colony Algorithm in Power Grid Data Management
		3.1 Application Roadmap
		3.2 Application Mode
	4 Application Testing
	5 Conclusion
	References
E-Commerce Credit Evaluation Method Based on Bayesian Algorithm
	1 Introduction
	2 Basic Concepts and Application Advantages of Bayesian Algorithm
		2.1 Basic Concepts
		2.2 Application Advantages
	3 A New E-Commerce Credit Evaluation Method Based on Bayesian Algorithm
		3.1 Algorithm Improvement
		3.2 New Methods
	4 Method Testing
		4.1 Test Preparations
		4.2 Test Results
	5 Conclusion
	References
Analysis of English Machine Translation Methods Based on Intelligent Fuzzy Decision Tree Algorithm
	1 Introduction
	2 Current Situation of English Machine Translation and Basic Concepts of Intelligent Fuzzy Decision Tree Algorithm
		2.1 Status Quo
		2.2 Concepts
		2.3 Application Advantages
	3 English Machine Translation Method and Application Test
		3.1 Methods
		3.2 Application Test
	4 Conclusion
	References
Trusted Identity Access Authentication Based on Spa Single Packet Authentication Technology
	1 Introduction
	2 An Overview of Trusted Identity Authentication Systems
	3 Research Content of Key Technologies of Trusted Identity Authentication for Power Grid Core Business
		3.1 Demand Analysis of Key Technologies of Trusted Identity Authentication for Power Grid Service
		3.2 Design of Key Technologies of Trusted Identity Authentication for Power Grid Service
		3.3 SPA Single Package Authorization
	4 Research and Implementation Scheme of Key Technologies of Trusted Identity Authentication for Power Grid Core Business
		4.1 Breakthrough Identity Information Privacy Protection Technology
		4.2 Research Result
	5 Conclusion
	References
Investigation on Data Cleaning and Analysis Technology for Power Industry Big Data
	1 Introduction
	2 Overview of Big Data
		2.1 Concepts of Big Data
		2.2 Big Data Development
		2.3 Analysis of Big Data Technology Features
		2.4 Data Storage
		2.5 Data Migration
	3 Data Cleaning Requirements Analysis
		3.1 Context
		3.2 Functional Requirements
		3.3 Data Access
		3.4 Data Analysis
		3.5 Data Cleaning
	4 Conclusion
	References
Application of Cloud Computing in Data Processing of Audit System
	1 Introduction
	2 The Impact of Cloud Computing on Audit System Data Processing
		2.1 Development of Audit Methods
		2.2 Overall Audit Mode
		2.3 Application of Audit Results
	3 Measures to Strengthen the Application Efficiency of Cloud Computing Technology Audit
		3.1 Prepare Long-Term Development Plan
		3.2 Promote the Construction Process of Audit Regulations for Cloud Computing Technology Applications
	4 Audit Operation Process of Cloud Computing Audit System
		4.1 Architecture of Audit System Data
	5 Conclusion
	References
Baseline Model of High-Sensitivity Data Transfer in Power Grid Business
	1 Introduction
	2 Literature Review
	3 Research Methods
		3.1 Current Situation of Power Grid Business Data Security
	4 Research Methods
		4.1 Data Security Risk Assessment
		4.2 Data Types
	5 Conclusion
	References
Short - Term Power Load Forecasting Algorithm Based on Combination Forecasting Method
	1 Introduction
	2 Concept and Forecasting Principle of Short-Term Power Load
		2.1 Concepts
		2.2 Forecasting Principles
	3 Combined Prediction Model Construction and Simulation Test
		3.1 Construction of Combinatorial Prediction Model
		3.2 Simulation Test
	4 Conclusion
	References
Research on Data Security and Encryption Technology in Network Transmission
	1 Introduction
	2 Related Work
		2.1 Symmetric Encryption Algorithm
		2.2 Asymmetric Encryption Algorithms
		2.3 Virtual Network Encryption Technology (VPN)
	3 Methods
		3.1 RSA
		3.2 Multi-level Key Management System
	4 Conclusion
	References
A Novel Hierarchical Storage System for Different Types of Data
	1 Introduction
	2 Related Work
		2.1 Hierarchy Generation
		2.2 Hierarchy Modification
	3 Architecture
		3.1 Object Definition Service Module
		3.2 Data Acquisition Service Module
		3.3 Object Conversion Service Module
		3.4 Universal Object Storage Service Module
		3.5 Data Access Path Service Module
	4 Function
		4.1 Data Collection
		4.2 Object Storage
		4.3 Data Access Path Model Design
	5 Conclusion
	References
Deep Learning-Based Malicious Illegal Traffic Identification
	1 Introduction
	2 Related Work
		2.1 Deep Packet Inspection DPI-Based Recognition
		2.2 Classical Machine Learning-Based Recognition
		2.3 Deep Learning-Based Recognition
	3 Method
		3.1 Modeling the Malicious Traffic Detection Problem
		3.2 Malicious Traffic Feature Extraction Algorithm
	4 Function
		4.1 Data Pre-processing Module
		4.2 Parallel Buffer Module
		4.3 Malicious Traffic Recognition Module
		4.4 Data Persistence Module
		4.5 Page Display Module
	5 Conclusion
	References
Data Transmission Security Strategy of Management System Based on Dual Chain Architecture
	1 Introduction
	2 Related Work
		2.1 Current Research Level Abroad
		2.2 Domestic Research Status
		2.3 Development Trend
	3 Double Chain Structure Transmission Model
		3.1 Interactive Transport Protocol Model with Double-Chain Structure
		3.2 Interactive Transport Protocol Model with Double-Chain Structure
		3.3 Transmission Security Design
		3.4 User Access Module
	4 Conclusion
	References
Author Index




نظرات کاربران