syring
发表于 2025-3-23 10:45:36
http://reply.papertrans.cn/48/4752/475108/475108_11.png
ordain
发表于 2025-3-23 17:19:10
http://reply.papertrans.cn/48/4752/475108/475108_12.png
neuron
发表于 2025-3-23 19:31:50
Mathematical Model of Data Partition Storage in Network Center Based on Blockchainatical model of data partition storage in Network Center Based on blockchain. Firstly, the cross attribute storage algorithm based on blockchain is designed. Through the algorithm, the function of network center data is analyzed, and different functions are analyzed in detail. On this basis, the met
Offset
发表于 2025-3-24 00:03:53
Enterprise Cluster Intelligent Manufacturing Information Management System Based on Wireless Communisecurity. In order to improve the security of the system, the intelligent manufacturing information management system of enterprise cluster is designed based on wireless communication technology. In the design of hardware system, the information processing module is designed to reduce the time used
Cubicle
发表于 2025-3-24 03:28:24
3D-HEVC Deep Video Information Hiding and Secure Transmission Methodn efficiency. In view of this phenomenon, a new 3D-HEVC deep video information hiding and secure transmission method is designed. According to the coding principle of single depth frame, the multi-view color and depth video feature regions are divided, and then the information hiding process is desi
glowing
发表于 2025-3-24 09:49:30
Research on Difference Elimination Method Between Small Sample Databases Based on Feature Extractioneliminating the differences between small sample databases based on feature extraction is designed. In order to realize the data communication between small sample databases, we construct the data retention mechanism of small sample databases, store the sample data safely, discretize the data attrib
显而易见
发表于 2025-3-24 12:18:19
Research on Homomorphic Retrieval Method of Private Database Secrets in Multi-server Environmentorphic secret retrieval method for private database in multi-server environment. After the establishment of the secret homomorphism vector model, the semantic classification of the secret homomorphism ciphertext is carried out. Then, according to the characteristics of the neighborhood structure, th
清真寺
发表于 2025-3-24 16:21:29
http://reply.papertrans.cn/48/4752/475108/475108_18.png
建筑师
发表于 2025-3-24 21:21:40
http://reply.papertrans.cn/48/4752/475108/475108_19.png
冷淡一切
发表于 2025-3-25 01:47:54
http://reply.papertrans.cn/48/4752/475108/475108_20.png