syring 发表于 2025-3-23 10:45:36

http://reply.papertrans.cn/48/4752/475108/475108_11.png

ordain 发表于 2025-3-23 17:19:10

http://reply.papertrans.cn/48/4752/475108/475108_12.png

neuron 发表于 2025-3-23 19:31:50

Mathematical Model of Data Partition Storage in Network Center Based on Blockchainatical model of data partition storage in Network Center Based on blockchain. Firstly, the cross attribute storage algorithm based on blockchain is designed. Through the algorithm, the function of network center data is analyzed, and different functions are analyzed in detail. On this basis, the met

Offset 发表于 2025-3-24 00:03:53

Enterprise Cluster Intelligent Manufacturing Information Management System Based on Wireless Communisecurity. In order to improve the security of the system, the intelligent manufacturing information management system of enterprise cluster is designed based on wireless communication technology. In the design of hardware system, the information processing module is designed to reduce the time used

Cubicle 发表于 2025-3-24 03:28:24

3D-HEVC Deep Video Information Hiding and Secure Transmission Methodn efficiency. In view of this phenomenon, a new 3D-HEVC deep video information hiding and secure transmission method is designed. According to the coding principle of single depth frame, the multi-view color and depth video feature regions are divided, and then the information hiding process is desi

glowing 发表于 2025-3-24 09:49:30

Research on Difference Elimination Method Between Small Sample Databases Based on Feature Extractioneliminating the differences between small sample databases based on feature extraction is designed. In order to realize the data communication between small sample databases, we construct the data retention mechanism of small sample databases, store the sample data safely, discretize the data attrib

显而易见 发表于 2025-3-24 12:18:19

Research on Homomorphic Retrieval Method of Private Database Secrets in Multi-server Environmentorphic secret retrieval method for private database in multi-server environment. After the establishment of the secret homomorphism vector model, the semantic classification of the secret homomorphism ciphertext is carried out. Then, according to the characteristics of the neighborhood structure, th

清真寺 发表于 2025-3-24 16:21:29

http://reply.papertrans.cn/48/4752/475108/475108_18.png

建筑师 发表于 2025-3-24 21:21:40

http://reply.papertrans.cn/48/4752/475108/475108_19.png

冷淡一切 发表于 2025-3-25 01:47:54

http://reply.papertrans.cn/48/4752/475108/475108_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: IoT and Big Data Technologies for Health Care; Second EAI Internati Shuihua Wang,Zheng Zhang,Yuan Xu Conference proceedings 2022 ICST Insti