1 |
IPV9 is the Foundation of the Future Digital
World |
1 |
¡¡ |
Lou Peide, Xu Fei ¡¡ |
¡¡ |
2 |
Research on IPv6 Address Space and Super IP
Upgrade |
7 |
¡¡ |
Wang Tao, Wang Xiaodong ¡¡ |
¡¡ |
3 |
Radix-8 Design Alternatives of Fast Two Operands
Interleaved Multiplication with Enhanced
Architecture |
15 |
¡¡ |
Mohammad M. Asad, Ibrahim Marouf, Qasem
Abu Al-Haija ¡¡ |
¡¡ |
4 |
Application of Wavelet Analysis in the
Prediction of Telemetry Data |
28 |
¡¡ |
Xu Jiangtao, Liu Pingping ¡¡ |
¡¡ |
5 |
Violence Cracking Technology of SSH Service
Based on Kali-Linux |
35 |
¡¡ |
Ma Limei, Zhao Dongmei*, Gao Yijun, Zhao
Chen ¡¡ |
¡¡ |
6 |
Research on the Technology of Assign IP Address
to the Connected Computer Based IPV9 |
40 |
¡¡ |
Wang Hui, Liu Lingwen, Yu Zhikai, Li Ming ¡¡ |
¡¡ |
7 |
Research on IPv4, IPv6 and IPV9 Address
Representation |
48 |
¡¡ |
YURY Halavachou, Wang Yubian* ¡¡ |
¡¡ |
8 |
Application of Wireless Return Topology Planning
Based on K-Means |
61 |
¡¡ |
Yang Weixia, Xu Fei, Li He, Chen Yuan ¡¡ |
¡¡ |
9 |
A Secure Voice Signature Based Lightweight
Authentication Approach for Remote Access
Control |
69 |
¡¡ |
Oladayo Olufemi Olakanmi, Aminat Shodipo ¡¡ |
¡¡ |
10 |
Research on Trust-Role Access Control Model in
Cloud Computing |
75 |
¡¡ |
Yuchen Wu, Pingping Liu ¡¡ |
¡¡ |
11 |
Hazard Grading Model of Terrorist Attack Based
on Machine Learning |
81 |
¡¡ |
Yu Jun, Xian Tong, Hu Zhiyi, Liu Yutong ¡¡ |
¡¡ |
12 |
Application Research Based on 5G Wireless
Communication Technology |
86 |
¡¡ |
Bai Junying, An Yongli*, Sun Ruihua ¡¡ |
¡¡ |
13 |
Image Transformation Based on
Generative Adversarial Networks |
93 |
¡¡ |
Chen
Jie, Zhao Li |