scholarly journals Spatial Optimization Information Security Algorithm for UAV Cluster Oriented to RSA

2021 ◽  
Vol 1995 (1) ◽  
pp. 012033
Author(s):  
Guilan Luo ◽  
Yuanbo Zhu ◽  
Shuailin Wang ◽  
Zhongmu Li ◽  
Mei Zhang ◽  
...  
2012 ◽  
Vol 160 ◽  
pp. 297-300
Author(s):  
Cong Chen

The ubiquitous network and it provides the high quality wireless service, all depends on the wireless communication system network security level. Safety algorithm for wireless communication system constructed in different network reliability. In this paper, based on the wireless communication system to study on information security technology, as the development of information security provides a theoretical basis.


2021 ◽  
Vol 18 (6) ◽  
pp. 7955-7964
Author(s):  
Xiang Nan ◽  
◽  
Kayo kanato

<abstract> <p>With the rapid development of tourism and the Internet industry, tourism activities have increasingly become a fashion behavior of people. The role of intelligent tourism resources in tourism activities has gradually become prominent. In order to meet the needs of all kinds of users, the tourism management system services are developing in the direction of diversification and individualization, and recommending the tourism resource products that best meet the needs of users to users has become a top priority. This article aims to improve the practical value of the system through the intelligent functions of the tourism management system based on information security in the intelligent recommendation of tourism resources. The tourism management system can display the received information about tourists. Through the experimental research of the accompanying information security algorithm and the analysis of the recommendation of the tourism system, the intelligent functions of the tourism management system based on information security can be captured in the intelligent recommendation of tourism resources. Develop the tourism management system to solve efficiency problems and realize tourism management information. Experimental results show that based on information security, 80% of tourists have become a popular choice for smart recommendation countries, which will bring more convenience to tourists during the game.</p> </abstract>


2021 ◽  
Vol 2136 (1) ◽  
pp. 012044
Author(s):  
Yuxi Zhou ◽  
Mingjie Ma ◽  
Zenghui Jiang

Abstract As the focus of the development of the whole society in the era of big data, information security is also the main direction of the practice and development of technological innovation. On the basis of understanding the current information transmission security and its algorithm research, this paper analyzes how to use this technology to guarantee information security according to the block encryption principle.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Sign in / Sign up

Export Citation Format

Share Document