2021
DOI: 10.1155/2021/5518135
|View full text |Cite
|
Sign up to set email alerts
|

Research on Vertical Search Method of Multidimensional Resources in English Discipline Based on Edge Computing

Abstract: The traditional vertical search method only considers the content of the webpage, and the global master node is not enough, which will lead to premature convergence and fall into the local optimum, resulting in insufficient multi-dimensional search of resources. Therefore, this paper proposes a multidimensional resource vertical edge based on the calculation of English subject search method. This paper analyzes the architecture of search engine firstly and then introduces the multiaccess edge computing archite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…This special issue includes five papers on LBS for education which are listed as follows. LSB techniques were applied on vertical search methods [56], cloud classrooms [57], speech recognition [58], data stream classification [59], and online learning support service system based on LBS for providing education applications. Detailed information of each article on LBS for education could be found in [56][57][58][59][60].…”
Section: Lbs For Educationmentioning
confidence: 99%
“…This special issue includes five papers on LBS for education which are listed as follows. LSB techniques were applied on vertical search methods [56], cloud classrooms [57], speech recognition [58], data stream classification [59], and online learning support service system based on LBS for providing education applications. Detailed information of each article on LBS for education could be found in [56][57][58][59][60].…”
Section: Lbs For Educationmentioning
confidence: 99%
“…There are still some deficiencies in functionality. On the one hand, most of the traditional privacy protection ciphertext query protocols are committed to resisting untrusted cloud attacks, and need to rely on privacy computing or trusted third parties to authenticate the legitimacy of users, lack of effective access control strategies, and the security needs to be strengthened [3]. On the other hand, most of the existing searchable encryption technologies are based on the design of tight cipher algorithm.…”
Section: Introductionmentioning
confidence: 99%