期刊文献+
共找到392,961篇文章
< 1 2 250 >
每页显示 20 50 100
基于NET Web开发技术的电网运营管理与自动化监测研究
1
作者 潘鸿飞 刑应春 +2 位作者 王喜银 尹晨旭 曹洁 《自动化技术与应用》 2026年第1期171-175,共5页
以往电网的运营涉及很多不确定性因素而影响了电网运营监测的状态分析过程,导致监测结果准确度不高影响了电网运营管理效果。为此提出了基于NET Web开发技术的电网运营管理与自动化监测方法。该方法首先深入分析电网发电与供电环节的不... 以往电网的运营涉及很多不确定性因素而影响了电网运营监测的状态分析过程,导致监测结果准确度不高影响了电网运营管理效果。为此提出了基于NET Web开发技术的电网运营管理与自动化监测方法。该方法首先深入分析电网发电与供电环节的不确定性因素,通过定量计算构建综合性管理指标。随后,运用NET Web开发技术构建数据处理架构,有效访问电网运营数据。进而,通过解析数据的经验谱分布函数值,实现对电网运营的自动化监测。实验结果表明,此方法能准确监测电网运营状态,有效满足电网运营管理需求。本研究不仅提升了电网运营的监测精度,也为电网的自动化管理提供有力支持,对提升电网运营效率具有重要意义。 展开更多
关键词 电网运营 自动化监测 net web 程序开发技术
在线阅读 下载PDF
基于前后端联合分析的Java Web漏洞挖掘方法
2
作者 邹福泰 姜开达 +2 位作者 占天越 施纬 张亮 《计算机研究与发展》 北大核心 2026年第1期214-226,共13页
精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态... 精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态分析的精确度。为解决上述问题,提出了一种前后端联合分析的Web漏洞挖掘方法,利用前端解析提取污点源信息来帮助后端分析进行剪枝,提高漏洞覆盖率和检测性能;同时在漏洞挖掘时利用程序的动静态信息进行代码建模,结合数据流分析、污点分析、符号执行以及轻量动态求解技术完成漏洞的挖掘和验证,在引入较少开销前提下带来较大的效果提升。选取了CVE(common vulnerabilities and exposure)漏洞、开源CMS(content management system)以及开源社区应用中共105个Java Web漏洞对所提出的方法进行了实验,证明了各模块具有较好的分析效果,整体具有较强的漏洞挖掘能力。 展开更多
关键词 web安全 JAVA 漏洞挖掘 污点分析 符号执行
在线阅读 下载PDF
1+X证书制度下Web前端开发数据库技术课程标准
3
作者 雷华军 潘萍 《办公自动化》 2026年第1期1-3,115,共4页
数据库技术是软件技术专业的基础课程,是Web前端开发中级、高级的核心课程。数据库技术课程标准对于Web前端开发课程的开展尤其重要。文章分析数据库技术现有课程标准存在的问题,基于1+X证书制度下Web前端开发人才培养模式,重新制定数... 数据库技术是软件技术专业的基础课程,是Web前端开发中级、高级的核心课程。数据库技术课程标准对于Web前端开发课程的开展尤其重要。文章分析数据库技术现有课程标准存在的问题,基于1+X证书制度下Web前端开发人才培养模式,重新制定数据库技术课程标准。 展开更多
关键词 1+X证书 web前端开发 数据库技术 课程标准
在线阅读 下载PDF
MATLAB WEB SERVER AND ITS APPLICATION IN REMOTE COLLABORATIVE DESIGN OF MAGNETIC BEARING SYSTEMS 被引量:6
4
作者 Zhao Aiping Yu Lie Xie Youbai Theory of Lubrication and Bearing Institute,Xi’an Jiaotong University 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2001年第2期179-183,共5页
Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installat... Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installation and use of the environment is introduced.A code established on the platform of MATLAB,which deals with the modal analysis of magnetic bearing system(MBS) supporting rotors of five degrees of freedom and considering the coupling of thrust bearing with radical bearings is modified to work in the environment.The purpose is to realize a remote call of the code by users through Internet for the performance analysis of the system.Such an application is very important to the concurrent design of MBS and for the utilization of distributive knowledge acquisition resources in collaborative design.The work on modification and realization is described and the results are discussed. 展开更多
关键词 MATLAB web Server Remote call Magnetic bearing rotor system Concurrent design
在线阅读 下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
5
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed web network management CORBA JAVA
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
6
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor networks Internet of Things Key technologies application fields
在线阅读 下载PDF
Internet Application Technologies in Web 2.0 Era 被引量:1
7
作者 Wang Lin, Yang Bo, Gao Yanli (Planning and Designing Research Institute, China Academy of Telecommunication Research of MIIT, Beijing 100037, P. R. China) 《ZTE Communications》 2008年第4期16-20,共5页
The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development o... The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development of Web 2.0 technologies and their promotion role in the development of Internet services, discusses the implementation of Web 2.0 core concepts (including user participation, resource sharing and platform) by the multiple Internet application technologies, and gives the development trends of Internet application technologies. 展开更多
关键词 MODE XML Internet application Technologies in web 2.0 Era
在线阅读 下载PDF
Programming ferromagnetic soft materials for miniature soft robots:Design,fabrication,and applications 被引量:1
8
作者 Junliang Chen Dongdong Jin +1 位作者 Qianqian Wang Xing Ma 《Journal of Materials Science & Technology》 2025年第16期271-287,共17页
Due to the small size,active mobility,and intrinsic softness,miniature soft robots hold promising po-tentials in reaching the deep region inside living bodies otherwise inaccessible with compelling agility,adaptabilit... Due to the small size,active mobility,and intrinsic softness,miniature soft robots hold promising po-tentials in reaching the deep region inside living bodies otherwise inaccessible with compelling agility,adaptability and safety.Various materials and actuation strategies have been developed for creating soft robots,among which,ferromagnetic soft materials that self-actuate in response to external magnetic fields have attracted worldwide attention due to their remote controllability and excellent compatibil-ity with biological tissues.This review presents comprehensive and systematic research advancements in the design,fabrication,and applications of ferromagnetic soft materials for miniature robots,providing in-sights into their potential use in biomedical fields and beyond.The programming strategies of ferromag-netic soft materials are summarized and classified,including mold-assisted programming,3D printing-assisted programming,microassembly-assisted programming,and magnetization reprogramming.Each approach possesses unique advantages in manipulating the magnetic responsiveness of ferromagnetic soft materials to achieve outstanding actuation and deformation performances.We then discuss the biomedi-cal applications of ferromagnetic soft material-based soft robots(e.g.,minimally invasive surgery,targeted delivery,and tissue engineering),highlighting their potentials in revolutionizing biomedical technologies.This review also points out the current challenges and provides insights into future research directions,which we hope can serve as a useful reference for the development of next-generation adaptive miniature robots. 展开更多
关键词 Ferromagnetic soft materials Miniature soft robots Magnetic actuation Magnetization programming strategies Biomedical applications
原文传递
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications 被引量:1
9
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption web3.0
在线阅读 下载PDF
Secure Development Methodology for Full Stack Web Applications:Proof of the Methodology Applied to Vue.js,Spring Boot and MySQL
10
作者 Kevin Santiago Rey Rodriguez Julián David Avellaneda Galindo +3 位作者 Josep Tárrega Juan Juan Ramón Bermejo Higuera Javier Bermejo Higuera Juan Antonio Sicilia Montalvo 《Computers, Materials & Continua》 2025年第10期1807-1858,共52页
In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementi... In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js,Spring Boot,and MySQL architecture.The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication,fine-grained authorization controls,sophisticated session management,data confidentiality and integrity protection,secure logging mechanisms,comprehensive error handling,high availability strategies,advanced input validation,and security headers implementation.Significant contributions are made to the field of web application security.First,a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats,backed by rigorous analysis and industry best practices.Second,the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment,demonstrating the practical effectiveness of the security measures.The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection,ensuring robust security coverage.The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology.A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle(SSDLC),creating a security-first mindset from initial design to deployment.By combining proactive secure coding practices with defensive security approaches,a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams.This hybrid approach ensures that security considerations are woven into every aspect of the development process,rather than being treated as an afterthought. 展开更多
关键词 web security methodology secure software development lifecycle DevSecOps security requirements secure development Full Stack web applications
在线阅读 下载PDF
基于BERT和GRU的Web攻击检测模型研究
11
作者 谭攀 王海珍 成雨玫 《齐齐哈尔大学学报(自然科学版)》 2026年第1期30-37,共8页
目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进... 目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进行上下文语义编码、全连接层处理,将获得的数据与原始文本数据拼接,输入GRU网络提取序列特征,输出通过Softmax计算,最终实现多分类。在CSIC 2010数据集和FWAF数据集上的实验结果表明,BERT_GRU模型在准确率、召回率、F1值等评价指标以及训练时间方面均优于对比模型。 展开更多
关键词 web攻击检测 BERT模型 GRU
在线阅读 下载PDF
Dynamic effect web generation for heterogeneous UAV cluster using DQN-based NSGA-Ⅱ:Methods and applications 被引量:1
12
作者 Pei CHI Chen LIU +2 位作者 Jiang ZHAO Kun WU Yingxun WANG 《Chinese Journal of Aeronautics》 2025年第7期374-388,共15页
Effect web will be an important combat means to achieve accurate,efficient,agile and reliable destruction of enemy targets.The use of Unmanned Aerial Vehicles(UAV)cluster in warfare has become a key element in the bat... Effect web will be an important combat means to achieve accurate,efficient,agile and reliable destruction of enemy targets.The use of Unmanned Aerial Vehicles(UAV)cluster in warfare has become a key element in the battle for military superiority between nations.The construction of UAV cluster effect web is a kind of combinatorial optimization in essence.By selecting the optimal combination in the limited equipment concentration,the whole network can be optimized.Firstly,in order to improve the combinatorial optimization efficiency of UAV cluster effect web,NSGA-Ⅱbased on deep Q-network(DQN-based NSGA-Ⅱ)is proposed.This algorithm is used to solve the Multi-Objective Combinatorial Optimization(MOCO)problem in the construction of effect web.Secondly,a dynamic generation method is devised to solve the problem caused by the possible destruction of enemy and our node under the fierce confrontation between the two sides.Finally,the simulation results show that the DQN-based NSGA-Ⅱis better than the genetic algorithm with single operator.The comparison experiment shows that the weight of evaluation indexes will have a corresponding influence on the optimization results. 展开更多
关键词 Optimization Effect web Unmanned Aerial Vehicles(UAV) Deep learning Genetic algorithm
原文传递
Application and Realization of Hierarchical Network Planning Based on Web 被引量:1
13
作者 WU Shi-jing GONG Zhi-bo +2 位作者 YIN Yong HUANG He-chao LOU Wei-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期839-844,共6页
Making use of Microsoft Visual Studio.NET platform,hierarchical network planning is realized in working procedure time-optimization of the construction by TBM,and hierarchical network graph of the construction by TBM ... Making use of Microsoft Visual Studio.NET platform,hierarchical network planning is realized in working procedure time-optimization of the construction by TBM,and hierarchical network graph of the construction by TBM is drawn based on browser.Then the theory of system realization is discussed,six components of system that can be reused are explained emphatically.The realization of hierarchical network panning in Internet provides available guarantee for controlling rate of progress in large-scale or middle-sized projects. 展开更多
关键词 web network graph hierarchical network planning
在线阅读 下载PDF
Access to emergency medical services in Beijing:integrating web mapping application programming interfaces and empirical Bayesian Kriging interpolation analysis
14
作者 Haolin Zhu Mo Xu +2 位作者 Luying Zhu Sijia Tian Jinjun Zhang 《World Journal of Emergency Medicine》 2025年第3期266-268,共3页
Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility o... Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility of EMS has received considerable attention in health and transport geography studies.^([3])One of the optimal gauges for evaluating the accessibility of EMS is the response time,which is defined as the time from receiving an emergency call to the arrival of an ambulance.^([4])Beijing has already reduced the response time to approximately12 min,and the next goal is to ensure that the response time across Beijing does not exceed 12 min (the information comes from the Beijing Emergency Medical Center). 展开更多
关键词 emergency medical services public healthcare system web mapping application programming interfaces empirical bayesian kriging interpolation analysis ACCESSIBILITY respond critical medical conditions response time
暂未订购
面向Web3钓鱼网站的域名检测与网页分析方法
15
作者 刘荣龙 李梓炜 +2 位作者 万悦 吴嘉婧 蒋子规 《计算机工程》 北大核心 2026年第1期76-85,共10页
Web3作为“去中心化的下一代互联网”范式,依托区块链技术,成为数智服务生态中极具潜力的新兴领域。然而,Web3钓鱼网站对生态健康构成了严重威胁,钓鱼者精心设计域名作为主要诱饵,诱导用户访问并进行高风险操作以窃取数字资产。目前,Web... Web3作为“去中心化的下一代互联网”范式,依托区块链技术,成为数智服务生态中极具潜力的新兴领域。然而,Web3钓鱼网站对生态健康构成了严重威胁,钓鱼者精心设计域名作为主要诱饵,诱导用户访问并进行高风险操作以窃取数字资产。目前,Web3反钓鱼工作主要集中在钓鱼账户检测、钓鱼交易检测和钓鱼团伙挖掘,而现有钓鱼网站域名检测工作主要面向传统钓鱼网站,存在适应性不足、缺乏系统性分析等局限性。为此,提出一种针对Web3钓鱼网站域名的检测方法WPWHunter,对检测到的真实Web3钓鱼网站进行多维度分析,并探究大语言模型(LLM)在网页分析方面的应用潜力。WPWHunter检测算法对Web3钓鱼网站域名中的诱导词、视觉欺骗、项目名模仿3种特征进行检测,实验结果表明,WPWHunter能够有效检测出可疑的Web3钓鱼域名,在测试集上G-means指标达到0.769,相比表现最佳的基线方法提升了0.048。此外,作为补充的探索实验,使用3个通用LLM对WPWHunter未能成功检测的Web3钓鱼网页内容进行分析,总结LLM判定Web3钓鱼网站时的依据。 展开更多
关键词 web3 网络安全 钓鱼网站 域名检测 大语言模型
在线阅读 下载PDF
Bio-inspired Magnetic Helical Miniature Robots:Mechanisms,Control and Biomedical Applications
16
作者 Aoji Zhu Yangmin Li +1 位作者 Yongping Zheng Lidong Yang 《Journal of Bionic Engineering》 2025年第6期2805-2830,共26页
Inspired by bacterial motility mechanisms,Magnetic Helical Miniature Robots(MHMRs)exhibit promising applications in biomedical fields due to their efficient locomotion and compatibility with biological tissues.In this... Inspired by bacterial motility mechanisms,Magnetic Helical Miniature Robots(MHMRs)exhibit promising applications in biomedical fields due to their efficient locomotion and compatibility with biological tissues.In this review,we systematically survey the basics of MHMRs,from propulsion mechanism,magnetization and control methods to biomedical applications,aiming to provide readers with an easily understandable overview and fundamental knowledge on implementing MHMRs.The MHMRs are actuated by rotating magnetic fields,achieving steering and rotation through magnetic torque,and converting rotation into forward motion through the helical structure.Magnetization methods for MHMRs are reviewed into three types:attaching magnets,magnetic coatings,and magnetic powder doping.Additionally,this review discusses the control methods for MHMRs,covering imaging techniques,path tracking control—including classical control algorithms and increasingly popular learning-based methods,and swarm control.Subsequently,a comprehensive survey is conducted on the biomedical applications of MHMRs in the treatment of vascular diseases,drug delivery,cell delivery,and their integration with catheters.We finally provide a perspective about future challenges in MHMR research,including enhancing functional design capabilities,developing swarm-assisted independent control mechanisms,refining in vivo imaging techniques,and ensuring robust biocompatibility for safe medical use. 展开更多
关键词 Biologically-inspired robots Miniature robots Magnetic control Biomedical application
在线阅读 下载PDF
Kinetic investigation of the energy storage process in graphene fiber supercapacitors:Unraveling mechanisms,fabrications,property manipulation,and wearable applications
17
作者 Juan Zhang Wenwen Liu +8 位作者 Minzhi Du Qingli Xu Minren Hung Ruifang Xiang Meng Liao Xinhou Wang Bingjie Wang Aiping Yu Kun Zhang 《Carbon Energy》 2025年第1期133-173,共41页
Graphene fiber supercapacitors(GFSCs)have garnered significant attention due to their exceptional features,including high power density,rapid charge/discharge rates,prolonged cycling durability,and versatile weaving c... Graphene fiber supercapacitors(GFSCs)have garnered significant attention due to their exceptional features,including high power density,rapid charge/discharge rates,prolonged cycling durability,and versatile weaving capabilities.Nevertheless,inherent challenges in graphene fibers(GFs),particularly the restricted ion-accessible specific surface area(SSA)and sluggish ion transport kinetics,hinder the achievement of optimal capacitance and rate performance.Despite existing reviews on GFSCs,a notable gap exists in thoroughly exploring the kinetics governing the energy storage process in GFSCs.This review aims to address this gap by thoroughly analyzing the energy storage mechanism,fabrication methodologies,property manipulation,and wearable applications of GFSCs.Through theoretical analysis of the energy storage process,specific parameters in advanced GF fabrication methodologies are carefully summarized,which can be used to modulate nano/micro-structures,thereby enhancing energy storage kinetics.In particular,enhanced ion storage is realized by creating more ion-accessible SSA and introducing extra-capacitive components,while accelerated ion transport is achieved by shortening the transport channel length and improving the accessibility of electrolyte ions.Building on the established structure-property relationship,several critical strategies for constructing optimal surface and structure profiles of GF electrodes are summarized.Capitalizing on the exceptional flexibility and wearability of GFSCs,the review further underscores their potential as foundational elements for constructing multifunctional e-textiles using conventional textile technologies.In conclusion,this review provides insights into current challenges and suggests potential research directions for GFSCs. 展开更多
关键词 fiber-shaped supercapacitor GRAPHENE ion storage ion transport wearable application
在线阅读 下载PDF
A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications
18
作者 Arshiya Sajid Ansari Ghadir Altuwaijri +3 位作者 Fahad Alodhyani Moulay Ibrahim El-Khalil Ghembaza Shahabas Manakunnath Devasam Paramb Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第6期3713-3752,共40页
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrai... IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional securitymeasures.This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems.The intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security issues.The methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in IoT.The reviewed solutions are categorized based on their ability to tackle specific security challenges.The review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and challenges.The findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data integrity.This paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks. 展开更多
关键词 Security in IoT applications PRIVACY-PRESERVING blockchain AI-driven security mechanisms
在线阅读 下载PDF
A Novel Malware Detection Framework for Internet of Things Applications
19
作者 Muhammad Adil Mona M.Jamjoom Zahid Ullah 《Computers, Materials & Continua》 2025年第9期4363-4380,共18页
In today’s digital world,the Internet of Things(IoT)plays an important role in both local and global economies due to its widespread adoption in different applications.This technology has the potential to offer sever... In today’s digital world,the Internet of Things(IoT)plays an important role in both local and global economies due to its widespread adoption in different applications.This technology has the potential to offer several advantages over conventional technologies in the near future.However,the potential growth of this technology also attracts attention from hackers,which introduces new challenges for the research community that range from hardware and software security to user privacy and authentication.Therefore,we focus on a particular security concern that is associated with malware detection.The literature presents many countermeasures,but inconsistent results on identical datasets and algorithms raise concerns about model biases,training quality,and complexity.This highlights the need for an adaptive,real-time learning framework that can effectively mitigate malware threats in IoT applications.To address these challenges,(i)we propose an intelligent framework based on Two-step Deep Reinforcement Learning(TwStDRL)that is capable of learning and adapting in real-time to counter malware threats in IoT applications.This framework uses exploration and exploitation phenomena during both the training and testing phases by storing results in a replay memory.The stored knowledge allows the model to effectively navigate the environment and maximize cumulative rewards.(ii)To demonstrate the superiority of the TwStDRL framework,we implement and evaluate several machine learning algorithms for comparative analysis that include Support Vector Machines(SVM),Multi-Layer Perceptron,Random Forests,and k-means Clustering.The selection of these algorithms is driven by the inconsistent results reported in the literature,which create doubt about their robustness and reliability in real-world IoT deployments.(iii)Finally,we provide a comprehensive evaluation to justify why the TwStDRL framework outperforms them in mitigating security threats.During analysis,we noted that our proposed TwStDRL scheme achieves an average performance of 99.45%across accuracy,precision,recall,and F1-score,which is an absolute improvement of roughly 3%over the existing malware-detection models. 展开更多
关键词 IoT applications security malware detection advanced machine learning algorithms data privacy challenges
在线阅读 下载PDF
Federated Learning for Vision-Based Applications in 6G Networks: A Simulation-Based Performance Study
20
作者 Manuel J.C.S.Reis Nishu Gupta 《Computer Modeling in Engineering & Sciences》 2025年第12期4225-4243,共19页
The forthcoming sixth generation(6G)of mobile communication networks is envisioned to be AInative,supporting intelligent services and pervasive computing at unprecedented scale.Among the key paradigms enabling this vi... The forthcoming sixth generation(6G)of mobile communication networks is envisioned to be AInative,supporting intelligent services and pervasive computing at unprecedented scale.Among the key paradigms enabling this vision,Federated Learning(FL)has gained prominence as a distributed machine learning framework that allows multiple devices to collaboratively train models without sharing raw data,thereby preserving privacy and reducing the need for centralized storage.This capability is particularly attractive for vision-based applications,where image and video data are both sensitive and bandwidth-intensive.However,the integration of FL with 6G networks presents unique challenges,including communication bottlenecks,device heterogeneity,and trade-offs between model accuracy,latency,and energy consumption.In this paper,we developed a simulation-based framework to investigate the performance of FL in representative vision tasks under 6G-like environments.We formalize the system model,incorporating both the federated averaging(FedAvg)training process and a simplified communication costmodel that captures bandwidth constraints,packet loss,and variable latency across edge devices.Using standard image datasets(e.g.,MNIST,CIFAR-10)as benchmarks,we analyze how factors such as the number of participating clients,degree of data heterogeneity,and communication frequency influence convergence speed and model accuracy.Additionally,we evaluate the effectiveness of lightweight communication-efficient strategies,including local update tuning and gradient compression,in mitigating network overhead.The experimental results reveal several key insights:(i)communication limitations can significantly degrade FL convergence in vision tasks if not properly addressed;(ii)judicious tuning of local training epochs and client participation levels enables notable improvements in both efficiency and accuracy;and(iii)communication-efficient FL strategies provide a promising pathway to balance performance with the stringent latency and reliability requirements expected in 6G.These findings highlight the synergistic role of AI and nextgeneration networks in enabling privacy-preserving,real-time vision applications,and they provide concrete design guidelines for researchers and practitioners working at the intersection of FL and 6G. 展开更多
关键词 Federated learning 6G networks edge intelligence vision-based applications communication-efficient learning privacy-preserving AI
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部