computer network
Recently Published Documents


TOTAL DOCUMENTS

3676
(FIVE YEARS 1066)

H-INDEX

44
(FIVE YEARS 6)

2022 ◽  
Vol 30 (7) ◽  
pp. 0-0

This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and definitions of computer crime and network crime, this paper puts forward the comparison matrix, investigation and statistics method and characteristic measure of computer crime. Through the methods of crime scene investigation, network investigation and network tracking, this paper studies the big data security management countermeasures in the prevention and control of computer network crime from the perspective of criminology. The experimental results show that the phenomenon of low age is serious, and the number of Teenagers Participating in network crime is on the rise. In all kinds of cases, criminals under the age of 35 account for more than 50%.


Author(s):  
Oleksandr Stasiuk ◽  
Valeriy Kuznetsov ◽  
Vitalii Zubok ◽  
Lidiya Goncharova ◽  
Antonina Muntian

The paper is devoted to analysis of modern directions of innovation-investment formation of intelligent computer networks that control the fast-moving technological processes of electricity supply. It is based on the conclusion that the problem of increasing the productivity of information exchange between information resources and consumers is dominant. A method for increasing the efficiency of information exchange is proposed as a search for the rational location of a new node and the organization of such a set of its connections among the whole set of nodes of the computer network, which provides a minimum average topological distance. Mathematical models of effective topological organization of connections in computer network of power consumption control at the level of traction substations, electric power distances and the railway in general are proposed.


2022 ◽  
Author(s):  
Jerry Jing

<p>Cryptocurrencies have been a massive surge since last decade leads to blockchain technology steps in epical milestone. Blockchain is a distributed database that is shared among the nodes of a computer network. Bitcoin, as a critical role in cryptocurrency system is known as a typical blockchain, maintaining a secure and decentralized record of transactions. The value and advantage of blockchain technology has been acknowledged by the public and applied in difference areas. The defect of blockchain technology is gradually revealed. Excessively wasting electricity have severely affect the utilities usage in many countries. Therefore, DRD Memory Mining is developed to solve the defects. This article illustrates the algorithm of DRD Memory Mining and how the memory consensus mechanism works.</p>


2022 ◽  
Author(s):  
Jerry Jing

<p>Cryptocurrencies have been a massive surge since last decade leads to blockchain technology steps in epical milestone. Blockchain is a distributed database that is shared among the nodes of a computer network. Bitcoin, as a critical role in cryptocurrency system is known as a typical blockchain, maintaining a secure and decentralized record of transactions. The value and advantage of blockchain technology has been acknowledged by the public and applied in difference areas. The defect of blockchain technology is gradually revealed. Excessively wasting electricity have severely affect the utilities usage in many countries. Therefore, DRD Memory Mining is developed to solve the defects. This article illustrates the algorithm of DRD Memory Mining and how the memory consensus mechanism works.</p>


2022 ◽  
Vol 9 (6) ◽  
Author(s):  
Dhamyaa Salim Mutar

The need for security means has brought from the fact of privacy of data especially after the communication revolution in the recent times. The advancement of data mining and machine learning technology has paved the road for establishment an efficient attack prediction paradigm for protecting of large scaled networks. In this project, computer network intrusions had been eliminated by using smart machine learning algorithm. Referring a big dataset named as KDD computer intrusion dataset which includes large number of connections that diagnosed with several types of attacks; the model is established for predicting the type of attack by learning through this data. Feed forward neural network model is outperformed over the other proposed clustering models in attack prediction accuracy.


2022 ◽  
Vol 2146 (1) ◽  
pp. 012041
Author(s):  
Yiming Niu ◽  
Wenyong Du ◽  
Zhenying Tang

Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.


Sign in / Sign up

Export Citation Format

Share Document