In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development. Through the existence of hidden dangers of computer multimedia security, a computer is constructed based on the network security active defense model. For a multimedia security protection system, select four modules in the system for design and description. Finally, the experimental results show that the system designed in this study can realize the security protection of computer multimedia, and the system is simple to operate and has strong practicability and meets the expected design effect.
The vehicle-mounted self-organizing network is a part of the MANET network. It is placed between the roadside vehicle and the fixed communication equipment. It can serve as a hub for road vehicles and can enable multihorsepower wireless mechanisms to exchange data between vehicles. This article is aimed at studying the DTN routing protocol based on machine learning in the vehicle self-organizing network. When data is forwarded, the node will determine the forwarding route selection according to its own coordinate information, the coordinate information of neighboring nodes, and the coordinate information of the destination node. Usually, the purpose is for the geographic coordinates of the node to be stored in the data packet. And data packets are periodically transmitted between nodes on each network. So that when you publish your own coordinate nodes, you can update the location information of nearby nodes at any time. This paper proposes that routing technology has become one of the most important challenges in vehicle self-organization, and there are many reasons for this. These reasons include frequent changes in the network topology and fast-moving mobile nodes. The experimental results in this paper show that more than 67% of the network data is obtained through the Gawk data extraction tool to quantify GPSR performance indicators and obtain the average driving speed of the current vehicle node. When increasing, the average end-to-end transmission delay of the GPSR routing protocol increases, and the average transmission rate decreases.
Although cloud computing has some eminent advantages such as low cost, resource elasticity, yet the highly dynamic, distributed and opaque nature of cloud services makes it a meaningful challenge to establish and manage trust between cloud service providers and consumers. Based on this background, this paper first describes the common concepts and classifications of trust issues and trust models, then generalize trust issues in cloud computing based on the research of existing work, next enumerates typical trust evaluation models from several different perspectives in cloud computing. Finally, conclusions including several potential trends are proposed for the future work.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.