期刊文献+
共找到562,197篇文章
< 1 2 250 >
每页显示 20 50 100
Analysis of Internet of Things Intrusion Detection Technology Based on Deep Learning
1
作者 Huijuan Zheng Yongzhou Wang 《Journal of Electronic Research and Application》 2025年第2期233-239,共7页
With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connectio... With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives. 展开更多
关键词 Deep learning Internet of Things Intrusion detection technology
在线阅读 下载PDF
Research on Governance Strategy of Internet Public Opinion Reversal based on Blockchain Technology
2
作者 Fei Wang 《Journal of Electronic Research and Application》 2025年第3期44-51,共8页
In recent years,the network public opinion reversal governance events have occurred frequently.Over time,the repeated truth of the matter will not only weaken the rational judgment of the public to a certain extent,so... In recent years,the network public opinion reversal governance events have occurred frequently.Over time,the repeated truth of the matter will not only weaken the rational judgment of the public to a certain extent,so that its negative emotions accumulate,but also have a serious impact on the credibility of the media and the government,and may even further intensify social contradictions.Therefore,in the face of such a complex online public opinion space,accurately identifying the truth behind the incident and how to carry out the reversal of online public opinion governance is particularly critical.And blockchain technology,with its advantages of decentralization and immutable information,provides new technical support for the network public opinion reversal governance.Based on this,this paper gives an overview and analysis of blockchain technology and network public opinion reversal,and on this basis introduces the network public opinion reversal governance mechanism based on blockchain technology,aiming to further optimize the network public opinion reversal governance process,for reference only. 展开更多
关键词 Blockchain technology network public opinion reversal Governance strategy
在线阅读 下载PDF
Exploration of the Application of Internet of Things Technology in Real-time Monitoring of Cold Chain Logistics
3
作者 Huiling Ma Xinyuan Liu +1 位作者 Weihan Zhao Haoyue Wu 《Journal of Electronic Research and Application》 2025年第3期165-170,共6页
The Internet of Things technology provides a comprehensive solution for the real-time monitoring of cold chain logistics by integrating sensors,wireless communication,cloud computing,and big data analysis.Based on thi... The Internet of Things technology provides a comprehensive solution for the real-time monitoring of cold chain logistics by integrating sensors,wireless communication,cloud computing,and big data analysis.Based on this,this paper deeply explores the overview and characteristics of the Internet of Things technology,the feasibility analysis of the Internet of Things technology in the cold chain logistics monitoring,the application analysis of the Internet of Things technology in the cold chain logistics real-time monitoring to better improve the management level and operational efficiency of the cold chain logistics,to provide consumers with safer and fresh products. 展开更多
关键词 Internet of Things technology Cold chain logistics Real-time monitoring
在线阅读 下载PDF
Application of Transcranial Magnetic Stimulation Technology in the Management of Motor Symptoms of Parkinson’s Disease
4
作者 Chengming Wang 《Journal of Clinical and Nursing Research》 2025年第5期284-290,共7页
Objective:To study the effect of transcranial magnetic stimulation(TMS)on improving motor symptoms in patients with Parkinson’s disease(PD).Methods:60 PD patients who visited the hospital from September 2023 to Augus... Objective:To study the effect of transcranial magnetic stimulation(TMS)on improving motor symptoms in patients with Parkinson’s disease(PD).Methods:60 PD patients who visited the hospital from September 2023 to August 2024 were selected as samples and randomly divided into two groups.Group A received conventional medication plus TMS treatment,while Group B received medication only.The efficacy of motor function improvement,neurological symptoms,mental state,sleep quality,quality of life,and adverse reactions was compared between the two groups.Results:The efficacy of Group A was higher than that of Group B(P<0.05).The scores of the Scales for Outcomes in Parkinson’s Disease-Autonomic(SCOPA-AUT),Mini-Mental State Examination(MMSE),and Pittsburgh Sleep Quality Index(PSQI)in Group A were lower than those in Group B(P<0.05).The quality of life scale(SF-36)score in Group A was higher than that in Group B(P<0.05).The adverse reaction rate in Group A was lower than that in Group B(P<0.05).Conclusion:TMS used in the treatment of PD patients can improve patients’mental state and motor function,optimize sleep quality and quality of life,and is safe and efficient. 展开更多
关键词 Parkinson’s disease Transcranial magnetic stimulation technology Motor symptom management
暂未订购
DSACNet:改进YOLOX的雾天条件下道路缺陷检测 被引量:1
5
作者 陈里里 蒋晓红 +1 位作者 张杰 丁怡文 《重庆交通大学学报(自然科学版)》 北大核心 2025年第2期53-60,共8页
针对在雾天条件下道路图像质量被破坏,使得检测困难的问题,提出了改进YOLOX的检测算法DSACNet。DSACNet采用YOLOX作为检测模块,设计了一个类似编码-解码(encoder-decoder)的重构模块,利用特征重构模块与检测网络共享重构网络产生的干净... 针对在雾天条件下道路图像质量被破坏,使得检测困难的问题,提出了改进YOLOX的检测算法DSACNet。DSACNet采用YOLOX作为检测模块,设计了一个类似编码-解码(encoder-decoder)的重构模块,利用特征重构模块与检测网络共享重构网络产生的干净特征,使检测网络能够更好地学习到雾天图像中的隐藏特征,从而帮助DSACNet提高在恶劣天气条件下的检测能力;引入了自注意力机制、自校准卷积来提高特征提取能力,加入focal loss解决目标检测任务中正负样本之间的不平衡问题。结果表明:提出的DSACNet采用端对端的训练方式能够同时执行雾天图像恢复和目标检测,并采用联合优化的策略将二者进行联合,让目标检测网络能够获得恢复网络探索的隐藏特征,更利于雾天情况下的道路缺陷检测;相较于原始模型YOLOX,平均精度均值达到93.5%,提高了14%,并且优于其他主流的目标检测算法,满足了道路表面缺陷检测对精度的要求。 展开更多
关键词 道路工程 计算机技术 道路缺陷检测 自注意机制
在线阅读 下载PDF
A new horizon for neuroscience:terahertz biotechnology in brain research 被引量:1
6
作者 Zhengping Pu Yu Wu +2 位作者 Zhongjie Zhu Hongwei Zhao Donghong Cui 《Neural Regeneration Research》 SCIE CAS 2025年第2期309-325,共17页
Terahertz biotechnology has been increasingly applied in various biomedical fields and has especially shown great potential for application in brain sciences.In this article,we review the development of terahertz biot... Terahertz biotechnology has been increasingly applied in various biomedical fields and has especially shown great potential for application in brain sciences.In this article,we review the development of terahertz biotechnology and its applications in the field of neuropsychiatry.Available evidence indicates promising prospects for the use of terahertz spectroscopy and terahertz imaging techniques in the diagnosis of amyloid disease,cerebrovascular disease,glioma,psychiatric disease,traumatic brain injury,and myelin deficit.In vitro and animal experiments have also demonstrated the potential therapeutic value of terahertz technology in some neuropsychiatric diseases.Although the precise underlying mechanism of the interactions between terahertz electromagnetic waves and the biosystem is not yet fully understood,the research progress in this field shows great potential for biomedical noninvasive diagnostic and therapeutic applications.However,the biosafety of terahertz radiation requires further exploration regarding its two-sided efficacy in practical applications.This review demonstrates that terahertz biotechnology has the potential to be a promising method in the field of neuropsychiatry based on its unique advantages. 展开更多
关键词 biological effect brain NEURON NEUROPSYCHIATRY NEUROSCIENCE non-thermal effect terahertz imaging terahertz radiation terahertz spectroscopy terahertz technology
暂未订购
Tracking direct and indirect impact on technology and policy of transformative research via ego citation network
7
作者 Xian Li Xiaojun Hu 《Journal of Data and Information Science》 CSCD 2024年第3期65-87,共23页
Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy o... Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research. 展开更多
关键词 Transformative research Nobel Prize winning articles Citation networks Technological impact Policy impact
在线阅读 下载PDF
Realization of an optimized cylindrical uniform magnetic field coil via flexible printed circuit technology
8
作者 A-Hui Zhao Yong-Le Zhang +5 位作者 Yue-Yue Liang Yi Zhang Jun-Jun Zha Dao-Rong Rui Xiao-Qiang Zhang Kang Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第12期242-248,共7页
The design and fabrication method of magnetic field coils with high uniformity is essential for atomic magnetometers.In this paper,a novel design strategy for cylindrical uniform coils is first proposed,which combines... The design and fabrication method of magnetic field coils with high uniformity is essential for atomic magnetometers.In this paper,a novel design strategy for cylindrical uniform coils is first proposed,which combines the target-field method(TFM)with an optimized slime mold algorithm(SMA)to determine optimal structure parameters.Then,the realization method for the designed cylindrical coil by using the flexible printed circuit(FPC)technology is presented.Compared with traditional fabrication methods,this method has advantages in excellent flexibility and bending property,making the coils easier to be arranged in limited space.Moreover,the manufacturing process of the FPC technology via a specific cylindrical uniform magnetic field coil is discussed in detail,and the successfully realized coil is well tested in a verification system.By comparing the uniformity performance of the experimental coil with the simulation one,the effectiveness of the FPC technology in producing cylindrical coils has been well validated. 展开更多
关键词 uniform magnetic field coil optimized target field method slime mold algorithm FPC technology
原文传递
澳大利亚教材Design and Technology的特色与启示
9
作者 王振强 何善亮 《湖北教育》 2025年第7期84-87,共4页
随着经济一体化和全球化进程的不断推进,世界各国目前都认识到技术与工程教育对于提升综合国力的重要性。基础教育阶段虽不以直接培养各领域的工程师或设计师为目标,但关注学生技术与工程素养的提升,让他们像工程师或设计师一样思考和... 随着经济一体化和全球化进程的不断推进,世界各国目前都认识到技术与工程教育对于提升综合国力的重要性。基础教育阶段虽不以直接培养各领域的工程师或设计师为目标,但关注学生技术与工程素养的提升,让他们像工程师或设计师一样思考和解决问题,这不仅不能回避,而且是亟须直面的问题。《义务教育科学课程标准(2022年版)》的颁布为中小学技术与工程教育的落实指明了方向。 展开更多
关键词 澳大利亚教材 Design and technology
在线阅读 下载PDF
Research progress of intelligent testing technology and evaluation methods for subgrade engineering 被引量:1
10
作者 Guojun Cai Hongliang Tian +2 位作者 Lulu Liu Xiaoyan Liu Songyu Liu 《Journal of Road Engineering》 2025年第2期164-183,共20页
Subgrade engineering is a fundamental aspect of infrastructure construction in China.As the primary structural element responsible for bearing and distributing traffic loads,the subgrade must not only withstand the su... Subgrade engineering is a fundamental aspect of infrastructure construction in China.As the primary structural element responsible for bearing and distributing traffic loads,the subgrade must not only withstand the substantial pressures exerted by vehicles,trains,and other forms of transportation,but also efficiently transfer these loads to the underlying foundation,ensuring the stability and longevity of the roadway.In recent years,advancements in subgrade engineering technology have propelled the industry towards smarter,greener,and more sustainable practices,particularly in the areas of intelligent monitoring,disaster management,and innovative construction methods.This paper reviews the application and methodologies of intelligent testing equipment,including cone penetration testing(CPT)devices,soil resistivity testers,and intelligent rebound testers,in subgrade engineering.It examines the operating principles,advantages,limitations,and application ranges of these tools in subgrade testing.Additionally,the paper evaluates the practical use of advanced equipment from both domestic and international perspectives,addressing the challenges encountered by various instruments in realworld applications.These devices enable precise,comprehensive testing and evaluation of subgrade conditions at different stages,providing real-time data analysis and intelligent early warnings.This supports effective subgrade health management and maintenance.As intelligent technologies continue to evolve and integrate,these tools will increasingly enhance the accuracy,efficiency,and sustainability of subgrade monitoring. 展开更多
关键词 Subgrade engineering Intelligent testing technology technology evaluation Health management and maintenance
在线阅读 下载PDF
Net valence analysis of iris recognition technology-based FinTech
11
作者 Mutaz M.Al-Debei Omar Hujran Ahmad Samed Al-Adwan 《Financial Innovation》 2024年第1期2339-2385,共47页
Iris recognition technology(IRT)-based authentication is a biometric financial technology(FinTech)application used to automate user recognition and verification.In addition to being a controversial technology with var... Iris recognition technology(IRT)-based authentication is a biometric financial technology(FinTech)application used to automate user recognition and verification.In addition to being a controversial technology with various facilitators and inhibitors,the adoption of IRT-based FinTech is driven by contextual factors,such as customer perceptions,deployed biometric technology,and financial transaction settings.Due to its controversial and contextual properties,analyzing IRT-based FinTech acceptance is challenging.This study uses a net valence framework to investigate the salient positive and negative factors influencing the intention to use IRT-based FinTech in automated teller machines(ATMs)in Jordan.This study is pertinent because there is a dearth of research on IRT-based FinTech in the relevant literature;most previous research has taken purely engineering and technical approaches.Furthermore,despite considerable investments by banks and other financial institutions in this FinTech,target user adoption is minimal,and only 6% of Jordan’s ATM transactions are currently IRT-enabled.This study employs mixed methods.In the first qualitative study,17 Jordanian customers were interviewed regarding the benefits and risks of IRT-based FinTech in ATMs.Content analyses determined the most important concepts or themes.The advantages include financial security,convenience,and FinTech-enabled hygiene,whereas the concerns include performance,financial,privacy,and physical risks.The research model is constructed based on the qualitative study and theoretical underpinnings,wherein 631 Jordanian bank customers with active ATM accounts were surveyed to validate the research model.The findings indicate that IRT-based FinTech usage in ATMs is proportional to its perceived value.In descending order of effect,financial security,FinTech-enabled hygiene,and convenience benefits positively impact perceived value.Privacy,financial,and physical risks have negative impacts on perceived value,whereas performance risk has no effect.This study contributes to the relatively untapped domain of biometric technology in information systems,with important theoretical and practical implications. 展开更多
关键词 Iris recognition technology(IRT) FinTech Biometric technology net valence Perceived value Adoption intention JORDAN
在线阅读 下载PDF
Application of AI technology in pulsar candidate identification 被引量:1
12
作者 Wanqiong Wang Jie Wang +7 位作者 Xinchen Ye Yazhou Zhang Jia Li Xu Du Wenna Cai Han Wu Ting Zhang Yuyue Jiao 《Astronomical Techniques and Instruments》 2025年第1期27-43,共17页
As artificial intelligence(AI)technology has continued to develop,its efficient data processing and pattern recognition capabilities have significantly improved the precision and speed of decision-making processes,and... As artificial intelligence(AI)technology has continued to develop,its efficient data processing and pattern recognition capabilities have significantly improved the precision and speed of decision-making processes,and it has been widely applied across various fields.In the field of astronomy,AI techniques have demonstrated unique advantages,particularly in the identification of pulsars and their candidates.AI is able to address the challenges of pulsar celestial body identification and classification because of its accuracy and efficiency.This paper systematically surveys commonly used AI models for pulsar candidate identification,analyzing and discussing the typical applications of machine learning,artificial neural networks,convolutional neural networks,and generative adversarial networks in candidate identification.Furthermore,it explores how th.e introduction of AI techniques not only enhances the efficiency and accuracy of pulsar identification but also provides new perspectives and tools for pulsar survey data processing,thus playing a significant role in advancing pulsar research and the field of astronomy. 展开更多
关键词 AI technology Candidate identification Machine learning Neural networks
在线阅读 下载PDF
Value realization of intelligent emergency management:research framework from technology enabling to value creation 被引量:1
13
作者 Yan Guo Yan Song Mingyue Zhang 《Data Science and Management》 2025年第1期11-22,共12页
This study investigated the application and the application value of intelligent emergency in emergency management in the big data environment.It addresses the neglect of the application value(performance)measurement ... This study investigated the application and the application value of intelligent emergency in emergency management in the big data environment.It addresses the neglect of the application value(performance)measurement of intelligent emergency,further improving the effectiveness of intelligent emergency management.First,approximately 3,900 documents from the intelligent emergency field are analyzed to determine the future research trend in intelligent emergency management.The socio-technical theory concerning technical and social systems is introduced.The emergency management system concepts of“technology enabling”and“enabling value creation”are defined according to bibliometric analysis and socio-technical theory.Second,a research framework that includes technology enabling and enabling value creation for the decision-making paradigm in emergency management according to the big data environment is constructed.A detailed analysis approach from intelligent emergency technology enabling to enabling value creation in emergency management is proposed.Finally,earthquake disasters are taken as examples,and specific analyses of the intelligent emergency enabling and enabling value creation are explored;enabling value creation is discussed based on measurable indicators.The clear concept of emergency management system technology enabling and enabling value creation,as well as the detailed analysis approach from intelligent emergency technology enabling to enabling value creation,provide a theoretical bases for scholars and practitioners to evaluate the value(performance)of intelligent emergency for the first time. 展开更多
关键词 technology enabling Enabling value creation EMERGENCIES Intelligent emergency management
在线阅读 下载PDF
Cutting-Edge Challenges in Communication Technology and Computer Network Security
14
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 Communication technology Computer network SECURITY
在线阅读 下载PDF
User acceptance of social network-backed cryptocurrency:a unified theory of acceptance and use of technology(UTAUT)-based analysis
15
作者 Márk Recskó Márta Aranyossy 《Financial Innovation》 2024年第1期2578-2606,共29页
Turbulent market conditions,well-publicized advantages,and potential individual,social,and environmental risks make blockchain-based cryptocurrencies a popular focus of the public and scientific communities.This paper... Turbulent market conditions,well-publicized advantages,and potential individual,social,and environmental risks make blockchain-based cryptocurrencies a popular focus of the public and scientific communities.This paper contributes to the literature on the future of crypto markets by analyzing a promising cryptocurrency innovation from a customer-centric point of view;it explores the factors influencing user acceptance of a hypothetical social network-backed cryptocurrency in Central Europe.The research model adapts an internationally comparative framework and extends the well-established unified theory of acceptance and use of the technology model with the concept of perceived risk and trust.We explore user attitudes with a survey on a large Hungarian sample and analyze the database with consistent partial least square structural equation modeling methodology.The results show that users would be primarily influenced by the expected usefulness of the new technology assuming it is easy to use.Furthermore,our analysis also highlights that while social influence does not seem to sway user opinions,consumers are susceptible to technological risks,and trust is an important determinant of their openness toward innovations in financial services.We contribute to the cryptocurrency literature with a future-centric technological focus and provide new evidence from an under-researched geographic region.The results also have practical implications for business decision-makers and policymakers. 展开更多
关键词 Cryptocurrency Social media Unified theory of acceptance and use of technology(UTAUT) technology acceptance Central-Eastern Europe Hungary TRUST RISK
在线阅读 下载PDF
Preparation of spherical HMX@PDA-based PBX by co-axial droplet microfluidic technology:Enhancing the interfacial effect and safety performance of composite microspheres 被引量:1
16
作者 Yunyan Guo Yi Liu +6 位作者 Jiani Xie Jiawei Li Fan Wang Jinshan Lei Chongwei An Zhongliang Ma Bidong Wu 《Defence Technology(防务技术)》 2025年第3期73-83,共11页
Surface engineering plays a crucial role in improving the performance of high energy materials,and polydopamine(PDA)is widely used in the field of energetic materials for surface modification and functionalization.In ... Surface engineering plays a crucial role in improving the performance of high energy materials,and polydopamine(PDA)is widely used in the field of energetic materials for surface modification and functionalization.In order to obtain high-quality HMX@PDA-based PBX explosives with high sphericity and a narrow particle size distribution,composite microspheres were prepared using co-axial droplet microfluidic technology.The formation mechanism,thermal behavior,mechanical sensitivity,electrostatic spark sensitivity,compressive strength,and combustion performance of the microspheres were investigated.The results show that PDA can effectively enhance the interfacial interaction between the explosive particles and the binder under the synergistic effect of chemical bonds and the physical"mechanical interlocking"structure.Interface reinforcement causes the thermal decomposition temperature of the sample microspheres to move to a higher temperature,with the sensitivity to impact,friction,and electrostatic sparks(for S-1)increasing by 12.5%,31.3%,and 81.5%respectively,and the compressive strength also increased by 30.7%,effectively enhancing the safety performance of the microspheres.Therefore,this study provides an effective and universal strategy for preparing high-quality functional explosives,and also provides some reference for the safe use of energetic materials in practical applications. 展开更多
关键词 Droplet microfluidic technology Interfacial reinforcement Safety performance Surface modification POLYDOPAMINE HMX
在线阅读 下载PDF
Advances in the Fabrication of Perovskite Solar Cells by Roll-to-Roll Technology
17
作者 ZHAO Jiawei CHEN Haolin +1 位作者 LUO Ni LIU Zhenguo 《材料导报》 北大核心 2025年第1期98-114,共17页
In recent years,perovskite solar cells(PSCs)have garnered significant attention as a potential mainstream technology in the future photovol-taic(PV)market.This is primarily attributed to their salient advantages inclu... In recent years,perovskite solar cells(PSCs)have garnered significant attention as a potential mainstream technology in the future photovol-taic(PV)market.This is primarily attributed to their salient advantages including high efficiency,low cost,and ease of preparation.Nota-bly,the power conversion efficiency(PCE)of PSCs has experienced a remarkable increase from 3.8%in 2009 to over 26%at present.Conse-quently,the adoption of roll-to-roll(R2R)technology for PSCs is considered a crucial step towards their successful commercialization.This arti-de reviews the diverse substrates,scalable deposition techniques(such as solution-based knife-coating and spraying technology),and optimiza.tion procedures employed in recent years to enhance device performance within the R2R process.Additionally,novel perspectives are presented to enrich the existing knowledge in this field. 展开更多
关键词 perovskite solar cells roll-to-roll technology substrate scalable deposition technology performance optimization
在线阅读 下载PDF
Design Discussion of a Wireless Fire Alarm System Based on Data Fusion Technology 被引量:1
18
作者 Qun Wu Jinyang Wu 《Journal of Electronic Research and Application》 2025年第2期58-64,共7页
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi... This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system. 展开更多
关键词 Data fusion technology Fire alarm system Wireless alarm Hardware design Software design
在线阅读 下载PDF
Exploration of Industrial Internet Security Technology and Application from the Perspective of Generative Artificial Intelligence
19
作者 Dinggao Li Shengda Liao Zhuo Zheng 《Journal of Electronic Research and Application》 2024年第6期170-175,共6页
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog... In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers. 展开更多
关键词 Generative artificial intelligence Industrial Internet security technology Application
在线阅读 下载PDF
Computer Network and Database Security Technology Optimization
20
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 Computer network and database Security technology Optimized path
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部