Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 14. Отображено 14.
05-10-2017 дата публикации

USER DOMAIN ACCESS METHOD, ACCESS DEVICE, AND MOBILE TERMINAL

Номер: WO2017166359A1
Автор: CUI, Yu, WANG, Xiaofei
Принадлежит:

Provided are a user domain access method, an access device, and a mobile terminal. The user domain access method comprises: concealing an access point of a designated user domain (102); detecting whether trigger information for triggering access to the designated user domain has been acquired (104); if it is determined that the trigger information has been acquired, verifying a user accessing the designated user domain (106); and enabling operation in the designated user domain if the user is successfully verified (108). Problems such as poor access confidentiality and high leakage risk are avoided by concealing an access point of a user domain and setting a dynamic password for accessing the user domain, thereby greatly improving security throughout the user domain access process and meeting actual needs of users.

Подробнее
27-06-2023 дата публикации

Integrated interactive order management platform based on cloud platform

Номер: CN116342066A
Принадлежит:

The invention relates to an integrated interactive order management platform based on a cloud platform, which belongs to the technical field of order management and comprises a cloud platform server, a public open platform, a PC (Personal Computer) management background and a comprehensive management system, the public open platform, the PC management background and the integrated management system are all in communication connection with the cloud platform server through the mobile internet. The problem that an existing order scheme is low in execution efficiency and few in agent channels can be solved.

Подробнее
02-05-2023 дата публикации

E-commerce platform management system based on cloud platform

Номер: CN116051232A
Принадлежит:

The invention relates to an e-commerce platform management system based on a cloud platform, which relates to the field of e-commerce, and comprises a cloud platform, a client terminal and a merchant terminal, the client terminal comprises an order submission module, a payment statistics module and a return statistics module; the orders submitted before payment by the customer recorded by the order submitting module, the order time and the product quantity of the orders submitted by the customer recorded by the payment statistics module, and the return operation and the product return quantity of the customer before delivery by the merchant recorded by the return statistics module are sent to the merchant terminal through the cloud platform; the merchant terminal comprises an inventory statistics module, a time management module and a logistics real-time tracking module; the inventory statistics module carries out statistics on the number of inventory products; the time management module ...

Подробнее
06-08-2020 дата публикации

DISPLAY CONTROL METHOD AND TERMINAL DEVICE

Номер: WO2020156169A1
Принадлежит:

Provided by the present disclosure are a display control method and a terminal device. The method comprises: receiving a first input for a first screen that displays a target object; in response to the first input, enlarging target display content of the target object at a preset ratio on a second screen for display. In the present disclosure, a first input for a first screen that displays a target object is received; and in response to the first input, target display content of the target object is enlarged at a preset ratio on a second screen for display.

Подробнее
06-07-2017 дата публикации

VOICE TOUCH SCREEN OPERATION PROCESSING METHOD AND DEVICE, AND A TERMINAL

Номер: WO2017113498A1
Автор: CUI, Yu, WANG, Xiaofei
Принадлежит:

Provided are a voice touch screen operation processing method and device, and a terminal. The method includes: receiving a voice control instruction; parsing the received voice control instruction to obtain voice content information, and searching for, in a pre-set voice operation database, key word information associated with the voice content information and position region information corresponding to the key word information; generating a touch screen operation instruction corresponding to a position region indicated by the position region information, and performing touch screen response processing according to the touch screen operation instruction. By means of the present invention, the practicability, convenience and rapidity of voice touch screen operation processing can be improved.

Подробнее
30-08-2018 дата публикации

METHOD FOR PROCESSING SECURITY OUTSOURCING DATA OF RELATIONAL DATABASE SUPPORTING CIPHERTEXT DATA OPERATION

Номер: WO2018152904A1
Принадлежит:

Disclosed is a method for processing security outsourcing data of a relational database supporting a ciphertext data operation. The method involves: 1) a database owner utilizing a private key to encrypt a database to be outsourced and then generate an outsourced ciphertext database, and sending same to a cloud service provider; 2) an authorized terminal user submitting, to the database owner, a plaintext data operation request in the form of an SQL statement; 3) the database owner converting a plaintext SQL statement of the data operation request into a ciphertext SQL statement set, and sending same to the cloud service provider; 4) the cloud service provider directly executing, on the outsourced ciphertext database, the ciphertext SQL statement, and if there is a query request, returning an obtained ciphertext query result to the database owner; and 5) the database owner receiving and decrypting the ciphertext query result, and returning a plaintext record to the terminal user. The present ...

Подробнее
08-08-2023 дата публикации

High-efficiency intrusion detection method based on heterogeneous data set

Номер: CN116566681A
Принадлежит:

The invention relates to a high-efficiency intrusion detection method based on a heterogeneous data set, and belongs to the technical field of network security intrusion detection. According to the method, the sensitivity of a convolutional neural network to image format data is utilized, firstly, the data is preprocessed, abnormal data and normal data are subjected to heterogeneous recombination to generate the image format data so as to construct a training data set, the generated data set is trained by using a constructed convolutional model, efficient detection of the data is realized, and the detection efficiency is improved. And the trained model is retrained in an incremental learning mode, so that continuous updating of the detection model is realized.

Подробнее
29-08-2023 дата публикации

Network security situation understanding analysis method based on knowledge graph

Номер: CN116668057A
Принадлежит:

The invention relates to a network security situation understanding analysis method based on a knowledge graph, and belongs to the technical field of network security. Starting from information asset information in a network security knowledge graph, in combination with network attack event information, reverse derivation is performed on an occurred network security event, and on the basis of the constructed knowledge graph of network space threats, an input security intelligence event and an occurred threat intelligence event are combined, so that the security information of the network space threats is obtained. And understanding and analysis of the network space situation are realized. Based on event risk portraits, attack path investigation and response strategy recommendation of the network security knowledge graph, abundant contexts with security semantics can be provided, research and judgment and strategy deployment of dynamic events are effectively supported, and dependence of ...

Подробнее
08-08-2023 дата публикации

Intelligent cognitive method and system for wireless ad hoc network

Номер: CN116567699A
Принадлежит:

The invention relates to an intelligent cognitive method and system for a wireless ad hoc network, and belongs to the technical field of wireless ad hoc networks. According to the method, a machine learning algorithm is adopted, an MAC protocol of a target network data link layer is automatically identified by using a signal intercepted by reconnaissance equipment, and a transceiving signal source is identified through radiation source identification, so that a network topology structure is reconstructed, and a network key node is judged; according to the designed cognitive method and system, a topological structure and key nodes of a target network can be intelligently analyzed by utilizing physical layer signals, targeted interference and attack targets can be provided for a decision-making system, and then the combat purpose of'chain breaking, network breaking and body paralysis' of the target ad hoc network is achieved through implementation of multiple attack means, so that the target ...

Подробнее
30-05-2023 дата публикации

Ad hoc network routing method based on trust recovery mechanism

Номер: CN116193447A
Принадлежит:

The invention relates to an ad hoc network routing method based on a trust recovery mechanism, and belongs to the technical field of network security. According to the method, a recommendation node set is constructed by setting credible recommendation nodes, recommendation nodes with relatively low confidence and other uncredible recommendation nodes, trust values and vigilance values of the nodes are regularly evaluated based on a periodic detection method, and attacked or controlled uncredible nodes are found according to corresponding judgment rules, so that the reliability of the recommendation nodes is improved. And corresponding measures are taken in time, so that the security and the self-stability of the ad hoc network are ensured.

Подробнее
08-08-2023 дата публикации

Target-camouflage-oriented confrontation camouflage pattern generation method and device

Номер: CN116563421A
Принадлежит:

The invention relates to a target-camouflage-oriented confrontation camouflage pattern generation method and device, and the method comprises the steps: firstly obtaining an initial confrontation camouflage pattern which comprises a protected target and a background region, and then obtaining a contour mask of the protected target and a background mask of the protected target based on the initial confrontation camouflage pattern, extracting a protected target background area in the initial anti-camouflage pattern by using a background mask of a protected target object, and extracting a final anti-camouflage protected target area by using a contour mask of the protected target object; finally, the protected target background area in the initial confrontation camouflage pattern and the protected target area of the final confrontation camouflage pattern are overlapped and updated into the final confrontation camouflage pattern. The adversarial camouflage in the generated adversarial pattern ...

Подробнее
23-06-2023 дата публикации

Handheld disinfection spraying device

Номер: CN116273560A
Принадлежит:

The invention belongs to the technical field of sprayers, and particularly relates to a handheld disinfection spraying device which comprises a disinfection spraying can body. The disinfection sprinkling can body is composed of a cavity and an upper cover, the cavity is in threaded connection with the upper cover, and the cavity can be filled with disinfection liquid medicine. An air pressure cavity is fixedly connected to the interior of the disinfection sprinkling can main body; the interior of the air pressure cavity is slidably connected with a piston plate. The upper surface of the piston plate is fixedly connected with a piston rod, the upper surface of the piston rod is fixedly provided with a lifting handle, and the lifting handle is made of plastic, can be designed into a circular arc shape and can be conveniently pressed by people; a worker can hold a handheld part with a hand and then press a rotating plate with a thumb, the rotating plate can open an opening in one side of a ...

Подробнее
28-04-2023 дата публикации

Novel low-foam aluminum alloy cleaning agent

Номер: CN116024578A
Принадлежит:

According to the novel low-foam aluminum alloy cleaning agent, firstly, the selected low-foam aluminum alloy cleaning agent is composed of an agent A and an agent B. The formula of the low-foam aluminum alloy cleaning agent is composed of an organic mixing agent A and an organic mixing agent B, the specific formula amount of the A-type organic mixture is as follows: step 1, (A-1) potassium bicarbonate, (A-2) sodium gluconate, (A-3) sodium citrate and (A-4) potassium sodium tartrate are selected as synthesis parts of the A-type organic mixture, and one or more of four materials can be selected and mixed (the mixing weight of the materials is added to 3%-10% of the total weight); in the second step, if the total amount is 100%, the aluminum alloy cleaning agent has the beneficial effects that the aluminum alloy cleaning agent adopted at present is added with a particularly large amount of foaming agent, so that the foam content is high, the problem of foam diffusion is solved, and foam overflow ...

Подробнее
30-05-2023 дата публикации

Node capture attack detection method for unmanned aerial vehicle cluster

Номер: CN116193397A
Принадлежит:

The invention relates to a node capture attack detection method for an unmanned aerial vehicle cluster, and belongs to the technical field of wireless communication networks. According to the method, physical capture detection of the nodes is researched, and the captured nodes are detected before being added into the network again, so that network attacks are discovered as soon as possible. According to the method, detection is carried out based on survivability monitoring between adjacent nodes, receiving of declaration messages between the nodes is guaranteed through a node declaration message unified scheduling broadcast mechanism, and meanwhile, a common neighbor node collaborative decision-making mechanism is adopted in the decision-making process to improve the node capture attack detection accuracy.

Подробнее