期刊文献+
共找到397,011篇文章
< 1 2 250 >
每页显示 20 50 100
ASP.Net Web程序设计课程全流程智慧教学模式研究
1
作者 钟梁 刘平 王嵩 《数字通信世界》 2026年第2期109-111,共3页
本文聚焦全流程智慧教学模式的构建与实施,阐述智慧教学在促进能力生长、实现个性化学习、深化理论实践融合方面的独特价值。在此基础上,提出以学习者为中心、数据驱动决策、线上线下融合、全过程评价反馈的模式构建逻辑,并详细展开课... 本文聚焦全流程智慧教学模式的构建与实施,阐述智慧教学在促进能力生长、实现个性化学习、深化理论实践融合方面的独特价值。在此基础上,提出以学习者为中心、数据驱动决策、线上线下融合、全过程评价反馈的模式构建逻辑,并详细展开课前资源推送与自主探究、课中问题导向与协作创新、课后能力拓展与个性辅导的实践路径,为Web开发人才培养提供新范式。 展开更多
关键词 ASP.net web程序设计 智慧教学模式 全流程教学 混合式学习 教学改革
在线阅读 下载PDF
基于NET Web开发技术的电网运营管理与自动化监测研究
2
作者 潘鸿飞 刑应春 +2 位作者 王喜银 尹晨旭 曹洁 《自动化技术与应用》 2026年第1期171-175,共5页
以往电网的运营涉及很多不确定性因素而影响了电网运营监测的状态分析过程,导致监测结果准确度不高影响了电网运营管理效果。为此提出了基于NET Web开发技术的电网运营管理与自动化监测方法。该方法首先深入分析电网发电与供电环节的不... 以往电网的运营涉及很多不确定性因素而影响了电网运营监测的状态分析过程,导致监测结果准确度不高影响了电网运营管理效果。为此提出了基于NET Web开发技术的电网运营管理与自动化监测方法。该方法首先深入分析电网发电与供电环节的不确定性因素,通过定量计算构建综合性管理指标。随后,运用NET Web开发技术构建数据处理架构,有效访问电网运营数据。进而,通过解析数据的经验谱分布函数值,实现对电网运营的自动化监测。实验结果表明,此方法能准确监测电网运营状态,有效满足电网运营管理需求。本研究不仅提升了电网运营的监测精度,也为电网的自动化管理提供有力支持,对提升电网运营效率具有重要意义。 展开更多
关键词 电网运营 自动化监测 net web 程序开发技术
在线阅读 下载PDF
A Comprehensive Literature Review of AI-Driven Application Mapping and Scheduling Techniques for Network-on-Chip Systems
3
作者 Naveed Ahmad Muhammad Kaleem +5 位作者 Mourad Elloumi Muhammad Azhar Mushtaq Ahlem Fatnassi Mohd Fazil Anas Bilal Abdulbasit A.Darem 《Computer Modeling in Engineering & Sciences》 2026年第1期118-155,共38页
Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance ... Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance and scalability,as current trends require the distribution of computation across network nodes/points.In this paper,we survey a large number of mapping and scheduling techniques designed for NoC architectures.This time,we concentrated on 3D systems.We take a systematic literature review approach to analyze existing methods across static,dynamic,hybrid,and machine-learning-based approaches,alongside preliminary AI-based dynamic models in recent works.We classify them into several main aspects covering power-aware mapping,fault tolerance,load-balancing,and adaptive for dynamic workloads.Also,we assess the efficacy of each method against performance parameters,such as latency,throughput,response time,and error rate.Key challenges,including energy efficiency,real-time adaptability,and reinforcement learning integration,are highlighted as well.To the best of our knowledge,this is one of the recent reviews that identifies both traditional and AI-based algorithms for mapping over a modern NoC,and opens research challenges.Finally,we provide directions for future work toward improved adaptability and scalability via lightweight learned models and hierarchical mapping frameworks. 展开更多
关键词 application mapping mapping techniques netWORK-ON-CHIP system on chip optimisation
在线阅读 下载PDF
Introduction to the Special Issue on Cutting-Edge Security and Privacy Solutions for Next-Generation Intelligent Mobile Internet Technologies and Applications
4
作者 Ilsun You Gaurav Choudhary +1 位作者 Gökhan Kul Francesco Falmieri 《Computer Modeling in Engineering & Sciences》 2026年第3期34-36,共3页
1 Introduction The growing connectivity with mobile internet has significantly enhanced our day-to-day life support through various services and applications with on-demand availability at any time or anywhere.As emer... 1 Introduction The growing connectivity with mobile internet has significantly enhanced our day-to-day life support through various services and applications with on-demand availability at any time or anywhere.As emerging technologies with continuous revolutions in the digital transformations,various add-on technologies such as quantum computing,AI,and next-generation networks such as 6G are becoming an integral support to mobile internet systems.The emerging technologies in the next-generation mobile internet bring a lot of new security and privacy challenges. 展开更多
关键词 mobile internet emerging technologies next generation networks services applications AI quantum computing quantum computingaiand digital transformationsvarious
在线阅读 下载PDF
基于前后端联合分析的Java Web漏洞挖掘方法
5
作者 邹福泰 姜开达 +2 位作者 占天越 施纬 张亮 《计算机研究与发展》 北大核心 2026年第1期214-226,共13页
精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态... 精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态分析的精确度。为解决上述问题,提出了一种前后端联合分析的Web漏洞挖掘方法,利用前端解析提取污点源信息来帮助后端分析进行剪枝,提高漏洞覆盖率和检测性能;同时在漏洞挖掘时利用程序的动静态信息进行代码建模,结合数据流分析、污点分析、符号执行以及轻量动态求解技术完成漏洞的挖掘和验证,在引入较少开销前提下带来较大的效果提升。选取了CVE(common vulnerabilities and exposure)漏洞、开源CMS(content management system)以及开源社区应用中共105个Java Web漏洞对所提出的方法进行了实验,证明了各模块具有较好的分析效果,整体具有较强的漏洞挖掘能力。 展开更多
关键词 web安全 JAVA 漏洞挖掘 污点分析 符号执行
在线阅读 下载PDF
基于Web的高校课程库系统设计与实现
6
作者 汪志敏 张佳民 +2 位作者 王欣 陈延东 王建国 《电脑知识与技术》 2026年第4期73-75,共3页
为解决高校课程数据管理混乱、统计困难等问题,该研究设计并实现了一套基于Web的高校课程库系统。该系统采用B/S结构的三层架构模式,利用ASP.NET Core作为后端框架,SQL Server作为数据库,实现了对课程信息的全生命周期管理。文章重点阐... 为解决高校课程数据管理混乱、统计困难等问题,该研究设计并实现了一套基于Web的高校课程库系统。该系统采用B/S结构的三层架构模式,利用ASP.NET Core作为后端框架,SQL Server作为数据库,实现了对课程信息的全生命周期管理。文章重点阐述了系统在数据批量导入/导出的容错处理、基于索引与缓存的高效查询统计,以及基于角色的多级权限控制等关键技术上的设计与实现策略。该系统的成功应用,为高校课程数据的规范化、集约化管理提供了可行的技术方案。 展开更多
关键词 课程库 高校 web
在线阅读 下载PDF
1+X证书制度下Web前端开发数据库技术课程标准
7
作者 雷华军 潘萍 《办公自动化》 2026年第1期1-3,115,共4页
数据库技术是软件技术专业的基础课程,是Web前端开发中级、高级的核心课程。数据库技术课程标准对于Web前端开发课程的开展尤其重要。文章分析数据库技术现有课程标准存在的问题,基于1+X证书制度下Web前端开发人才培养模式,重新制定数... 数据库技术是软件技术专业的基础课程,是Web前端开发中级、高级的核心课程。数据库技术课程标准对于Web前端开发课程的开展尤其重要。文章分析数据库技术现有课程标准存在的问题,基于1+X证书制度下Web前端开发人才培养模式,重新制定数据库技术课程标准。 展开更多
关键词 1+X证书 web前端开发 数据库技术 课程标准
在线阅读 下载PDF
面向通用数字对象的Web3扩展域名系统
8
作者 李旭东 程子果 +1 位作者 黄宇豪 任文 《计算机工程与设计》 北大核心 2026年第1期88-95,共8页
为了解决传统域名系统不支持数字对象及服务的问题,提出面向通用数字对象的Web3扩展域名系统架构,并实现通用域名系统(GNS)。将数字对象定义进一步丰富拓展为通用数字对象,并细分为简单数字对象和复合数字对象。提出一种全新的域名服务... 为了解决传统域名系统不支持数字对象及服务的问题,提出面向通用数字对象的Web3扩展域名系统架构,并实现通用域名系统(GNS)。将数字对象定义进一步丰富拓展为通用数字对象,并细分为简单数字对象和复合数字对象。提出一种全新的域名服务系统架构与GNSP协议,设计链上、链下业务数据相结合的系统模式,以弥补纯链上模式的性能缺陷。针对海量数字对象所带来的性能和访问压力较大的问题,引入基于LRU-K的数字对象缓存模块,提高系统性能。通过实验性能评估,验证了GNS的有效性与高效性。 展开更多
关键词 域名系统 web3互联网 数字对象 web3域名系统 区块链 智能合约 以太坊
在线阅读 下载PDF
Web 3.0时代平台互联互通的偏差及其因应之策
9
作者 叶明 姚莹 《南京邮电大学学报(社会科学版)》 2026年第1期72-83,共12页
平台互联互通是Web 3.0时代的应有之义,然而其尚存在封闭式竞争行为屡禁不止,歧视性互联互通愈显,互联互通的范围层次有待提升等多重偏差。仔细审视背后的诱因,可以归结为平台互联互通嵌含利益冲突,存在规范与技术罅漏及运动式监管的局... 平台互联互通是Web 3.0时代的应有之义,然而其尚存在封闭式竞争行为屡禁不止,歧视性互联互通愈显,互联互通的范围层次有待提升等多重偏差。仔细审视背后的诱因,可以归结为平台互联互通嵌含利益冲突,存在规范与技术罅漏及运动式监管的局限。有鉴于此,应革新互联互通的推行理念,由强制互联变为顺“市”而为,同时廓清平衡数据开放与数据隐私保护的思路,以纾解利益冲突。在规范和技术方面,需要体系化完善数据要素制度规范、强化技术支撑从而消除推行隐忧。此外,还应破除运动式监管模式的窠臼,构建平台互联互通的常态化监管机制。 展开更多
关键词 web 3.0 平台 平台治理 平台互联互通 数据 数据监管 数据要素制度
在线阅读 下载PDF
基于Django框架的Web应用开发模式研究——以在线商城项目为例
10
作者 曹光忠 《电脑知识与技术》 2026年第4期53-55,82,共4页
当前Web应用追求开发效率与代码质量的平衡。Python Django框架作为一种高效的解决方案,其MTV(模型-模板-视图)架构和ORM(对象关系映射)技术的应用能显著提升开发效率。文章采用案例研究法,通过设计并实现一个“网上服装商城”项目,系... 当前Web应用追求开发效率与代码质量的平衡。Python Django框架作为一种高效的解决方案,其MTV(模型-模板-视图)架构和ORM(对象关系映射)技术的应用能显著提升开发效率。文章采用案例研究法,通过设计并实现一个“网上服装商城”项目,系统性地展示和验证Django框架在Web开发全流程中的应用。研究表明,Django框架通过其高度集成的MTV架构和强大的ORM模型,能够有效解耦业务逻辑、数据层与表现层,并通过对象化操作数据库,极大地提升了开发效率与代码的可维护性。本项目实践验证了该框架在快速构建功能完备、数据驱动型Web应用中的可行性与优越性。 展开更多
关键词 MTV架构 web开发框架 对象关系映射
在线阅读 下载PDF
MATLAB WEB SERVER AND ITS APPLICATION IN REMOTE COLLABORATIVE DESIGN OF MAGNETIC BEARING SYSTEMS 被引量:6
11
作者 Zhao Aiping Yu Lie Xie Youbai Theory of Lubrication and Bearing Institute,Xi’an Jiaotong University 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2001年第2期179-183,共5页
Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installat... Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installation and use of the environment is introduced.A code established on the platform of MATLAB,which deals with the modal analysis of magnetic bearing system(MBS) supporting rotors of five degrees of freedom and considering the coupling of thrust bearing with radical bearings is modified to work in the environment.The purpose is to realize a remote call of the code by users through Internet for the performance analysis of the system.Such an application is very important to the concurrent design of MBS and for the utilization of distributive knowledge acquisition resources in collaborative design.The work on modification and realization is described and the results are discussed. 展开更多
关键词 MATLAB web Server Remote call Magnetic bearing rotor system Concurrent design
在线阅读 下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
12
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed web network management CORBA JAVA
在线阅读 下载PDF
一种面向快速Web漏洞扫描的网页爬取方法
13
作者 王金翔 朱亚运 +3 位作者 刘万大山 姜琳 刘林彬 李俊娥 《计算机应用与软件》 北大核心 2026年第1期370-376,共7页
随着Web应用规模的不断扩大,对网站进行漏洞扫描的时间成本也不断增加。为此,提出一种面向快速Web漏洞扫描的网页爬取方法。该方法在传统的面向Web漏洞扫描的爬虫的基础上,利用增量闭频繁项集挖掘算法对网站页面进行阶段性聚类,并基于... 随着Web应用规模的不断扩大,对网站进行漏洞扫描的时间成本也不断增加。为此,提出一种面向快速Web漏洞扫描的网页爬取方法。该方法在传统的面向Web漏洞扫描的爬虫的基础上,利用增量闭频繁项集挖掘算法对网站页面进行阶段性聚类,并基于页面聚簇和爬虫日志构建页面分类模型,以过滤由同一个服务处理程序生成的冗余页面。实验表明,该方法能有效减少漏洞扫描系统在网站目录遍历和页面聚类上消耗的时间,从而提升Web漏洞扫描的效率。 展开更多
关键词 爬虫 web漏洞扫描 页面聚类 频繁模式挖掘
在线阅读 下载PDF
基于BERT-GATv2的PHP Webshell检测方法
14
作者 张文涛 张小萍 宁梓桁 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期137-145,共9页
Webshell是一种基于Web语言的网站后门程序,通常被攻击者用来控制Web服务器。近年来,Webshell免杀技术的发展使得静态特征匹配等传统检测方法对混淆加密后的Webshell检测能力下降。对Webshell检测方法的研究在Web安全领域越来越得到重视... Webshell是一种基于Web语言的网站后门程序,通常被攻击者用来控制Web服务器。近年来,Webshell免杀技术的发展使得静态特征匹配等传统检测方法对混淆加密后的Webshell检测能力下降。对Webshell检测方法的研究在Web安全领域越来越得到重视,针对现有的Webshell检测方法难以充分挖掘Webshell的语法和语义特征的问题,提出了一种基于BERT-GATv2的PHP Webshell检测方法。该方法使用PHP代码构建异构图,并通过联合训练BERT模型和图注意力网络v2(GATv2)模型,用线性插值方法结合2个模型的输出,实现对正常样本和Webshell的分类。实验结果表明,与以往的Webshell检测方法相比,提出的Webshell检测方法在精确率、召回率和F1值指标上均展现出优异的检测性能,准确率达到了99.65%。 展开更多
关键词 webshell检测 图神经网络 web安全 深度学习
在线阅读 下载PDF
Kinetic investigation of the energy storage process in graphene fiber supercapacitors:Unraveling mechanisms,fabrications,property manipulation,and wearable applications 被引量:1
15
作者 Juan Zhang Wenwen Liu +8 位作者 Minzhi Du Qingli Xu Minren Hung Ruifang Xiang Meng Liao Xinhou Wang Bingjie Wang Aiping Yu Kun Zhang 《Carbon Energy》 2025年第1期133-173,共41页
Graphene fiber supercapacitors(GFSCs)have garnered significant attention due to their exceptional features,including high power density,rapid charge/discharge rates,prolonged cycling durability,and versatile weaving c... Graphene fiber supercapacitors(GFSCs)have garnered significant attention due to their exceptional features,including high power density,rapid charge/discharge rates,prolonged cycling durability,and versatile weaving capabilities.Nevertheless,inherent challenges in graphene fibers(GFs),particularly the restricted ion-accessible specific surface area(SSA)and sluggish ion transport kinetics,hinder the achievement of optimal capacitance and rate performance.Despite existing reviews on GFSCs,a notable gap exists in thoroughly exploring the kinetics governing the energy storage process in GFSCs.This review aims to address this gap by thoroughly analyzing the energy storage mechanism,fabrication methodologies,property manipulation,and wearable applications of GFSCs.Through theoretical analysis of the energy storage process,specific parameters in advanced GF fabrication methodologies are carefully summarized,which can be used to modulate nano/micro-structures,thereby enhancing energy storage kinetics.In particular,enhanced ion storage is realized by creating more ion-accessible SSA and introducing extra-capacitive components,while accelerated ion transport is achieved by shortening the transport channel length and improving the accessibility of electrolyte ions.Building on the established structure-property relationship,several critical strategies for constructing optimal surface and structure profiles of GF electrodes are summarized.Capitalizing on the exceptional flexibility and wearability of GFSCs,the review further underscores their potential as foundational elements for constructing multifunctional e-textiles using conventional textile technologies.In conclusion,this review provides insights into current challenges and suggests potential research directions for GFSCs. 展开更多
关键词 fiber-shaped supercapacitor GRAPHENE ion storage ion transport wearable application
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
16
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor networks Internet of Things Key technologies application fields
在线阅读 下载PDF
Programming ferromagnetic soft materials for miniature soft robots:Design,fabrication,and applications 被引量:1
17
作者 Junliang Chen Dongdong Jin +1 位作者 Qianqian Wang Xing Ma 《Journal of Materials Science & Technology》 2025年第16期271-287,共17页
Due to the small size,active mobility,and intrinsic softness,miniature soft robots hold promising po-tentials in reaching the deep region inside living bodies otherwise inaccessible with compelling agility,adaptabilit... Due to the small size,active mobility,and intrinsic softness,miniature soft robots hold promising po-tentials in reaching the deep region inside living bodies otherwise inaccessible with compelling agility,adaptability and safety.Various materials and actuation strategies have been developed for creating soft robots,among which,ferromagnetic soft materials that self-actuate in response to external magnetic fields have attracted worldwide attention due to their remote controllability and excellent compatibil-ity with biological tissues.This review presents comprehensive and systematic research advancements in the design,fabrication,and applications of ferromagnetic soft materials for miniature robots,providing in-sights into their potential use in biomedical fields and beyond.The programming strategies of ferromag-netic soft materials are summarized and classified,including mold-assisted programming,3D printing-assisted programming,microassembly-assisted programming,and magnetization reprogramming.Each approach possesses unique advantages in manipulating the magnetic responsiveness of ferromagnetic soft materials to achieve outstanding actuation and deformation performances.We then discuss the biomedi-cal applications of ferromagnetic soft material-based soft robots(e.g.,minimally invasive surgery,targeted delivery,and tissue engineering),highlighting their potentials in revolutionizing biomedical technologies.This review also points out the current challenges and provides insights into future research directions,which we hope can serve as a useful reference for the development of next-generation adaptive miniature robots. 展开更多
关键词 Ferromagnetic soft materials Miniature soft robots Magnetic actuation Magnetization programming strategies Biomedical applications
原文传递
基于Web of Science的非酒精性脂肪性肝病中医药治疗可视化分析
18
作者 刘娅卿 杨慧丽 +2 位作者 时聪聪 刘翔 邢宇锋 《中西医结合肝病杂志》 2026年第3期327-333,共7页
目的:借助CiteSpace分析近15年(2010年至2024年)非酒精性脂肪性肝病(NAFLD)的中医药治疗研究现状与发展趋势,为后续研究提供参考。方法:检索2010年1月1日至2024年10月31日收录至Web of Science Core Collection的有关中医药治疗NAFLD的... 目的:借助CiteSpace分析近15年(2010年至2024年)非酒精性脂肪性肝病(NAFLD)的中医药治疗研究现状与发展趋势,为后续研究提供参考。方法:检索2010年1月1日至2024年10月31日收录至Web of Science Core Collection的有关中医药治疗NAFLD的相关文献,对发文量、作者、国家及机构、关键词、共被引用等进行可视化分析。结果:共纳入文献367篇,发文量整体呈上升趋势,发文量最多的作者是来自中国的Ji,发文量排名前3的国家是中国、韩国、美国,发文量最多的机构是上海中医药大学,关键词共现分析和聚类分析显示目前研究热点主要为中医药治疗NAFLD的机制研究与数据挖掘。结论:对中医药治疗NAFLD的热度持续增长,多靶点治疗、数据挖掘、高质量的临床RCT试验等具有较好的发展潜力,加强国际间的合作交流有助于进一步挖掘中医药的潜力,推动中医药国际化的进程。 展开更多
关键词 非酒精性脂肪性肝病 中医药 CITESPACE web of Science 可视化分析
暂未订购
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications 被引量:1
19
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption web3.0
在线阅读 下载PDF
Secure Development Methodology for Full Stack Web Applications:Proof of the Methodology Applied to Vue.js,Spring Boot and MySQL
20
作者 Kevin Santiago Rey Rodriguez Julián David Avellaneda Galindo +3 位作者 Josep Tárrega Juan Juan Ramón Bermejo Higuera Javier Bermejo Higuera Juan Antonio Sicilia Montalvo 《Computers, Materials & Continua》 2025年第10期1807-1858,共52页
In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementi... In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js,Spring Boot,and MySQL architecture.The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication,fine-grained authorization controls,sophisticated session management,data confidentiality and integrity protection,secure logging mechanisms,comprehensive error handling,high availability strategies,advanced input validation,and security headers implementation.Significant contributions are made to the field of web application security.First,a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats,backed by rigorous analysis and industry best practices.Second,the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment,demonstrating the practical effectiveness of the security measures.The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection,ensuring robust security coverage.The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology.A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle(SSDLC),creating a security-first mindset from initial design to deployment.By combining proactive secure coding practices with defensive security approaches,a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams.This hybrid approach ensures that security considerations are woven into every aspect of the development process,rather than being treated as an afterthought. 展开更多
关键词 web security methodology secure software development lifecycle DevSecOps security requirements secure development Full Stack web applications
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部