Exploration and Practice of New Intelligent Composite Protection Networking Technology

2020 ◽  
Vol 2 (3) ◽  
pp. 89-100
Author(s):  
Zhou Lai
2021 ◽  
Vol 1 ◽  
pp. 4-10
Author(s):  
Jianguo Zhou ◽  
Changjia Zhou ◽  
Yuqin Kang ◽  
Shenghui Tu

2012 ◽  
Vol 516-517 ◽  
pp. 1414-1418 ◽  
Author(s):  
Hua Yin ◽  
Bin Fa Long ◽  
Nai Zhou Wang

This article discussed the basic principles of the power line carrier application technology and an example scheme, The unique advantage of the power line carrier networking technology is applied in the Internet of things. The advantage of the application of the power line carrier in the difficult environment of radio frequency application and layout is pointed out.


2014 ◽  
Vol 989-994 ◽  
pp. 5520-5523 ◽  
Author(s):  
Zhi Ping Peng

The networking technology in warehouse management can be automated cargo management, operations and real-time access to inventory. Application networking technology greatly reduces the workload of warehouse management and unnecessary losses. Through the intelligent management of the goods, but also improve the utilization of warehouse space, to enable enterprises to understand the real-time inventory, thereby reducing inventory costs, improve the accuracy of inventory management.


2012 ◽  
Vol 610-613 ◽  
pp. 1121-1125
Author(s):  
Gong Wang ◽  
Jun Jie Guo ◽  
Yan Ling He ◽  
Hong Feng Du

Combined with sewage disposal characteristics and content networking technology, Constructing the relatively flexible structure, the price is relatively cheap,reliable performance of sewage treatment monitoring system. Improve the sewage disposal automation and informationization level and the ability of the key sources of pollution monitoring and environmental incident coping,The environmental protection,energy saving and emission reduction is of great significance.


Author(s):  
Mitesh Chanodiya* ◽  
◽  
Dr. Manish Potey ◽  

Cloud computing facilities have become an increasing rise in demand for presenting computing sources. Various programs like monetary transactions, fitness care systems, video streaming, IoT programs want on-call for provisioning of cloud sources to guarantee timeliness and excessive availability. A shared culture for data interchange has evolved as a result of the fast progress of networking technology. The data security has become a difficult issue as a result of the vast volume of data that is exchanged via the internet. Thus there is a requirement for security to protect data that is transmitted across an insecure connection. In our proposed work, privacy, confidentiality, availability, integrity, and accountability that contribute to the security of information are ensured by cryptographic technique. This paper also describes an exhaustive study on the usage of hybrid algorithms i.e. the combination of Advanced Encryption Standards (AES) and Elliptical Curve Cryptography (ECC) to protect data leakage and protect the privacy of end-users and SHA256 algorithm to ensure data integrity. This type of hybrid encryption will help not only in concentrating software as well as physical attacks but also provide the model to deal with and prevent the application from these types of attacks; thus making the cloud application system more secure. The implemented web application can be used as a defence system for privacy and security in organizations as well as institutions where members of the organization can share the file or confidential data to other team members or colleagues without data leakage thus providing data privacy and security.


Sign in / Sign up

Export Citation Format

Share Document