Visible to the public The Design and Realization of Information Security Technology and Computer Quality System Structure

TitleThe Design and Realization of Information Security Technology and Computer Quality System Structure
Publication TypeConference Paper
Year of Publication2022
AuthorsHu, Yuanyuan, Cao, Xiaolong, Li, Guoqing
Conference Name2022 International Conference on Artificial Intelligence in Everything (AIE)
KeywordsCollaboration, composability, compositionality, Computer architecture, computer networks, computer quality architecture, computer theory, Design and implementation, Design methodology, Hardware, Human Behavior, Information security, information security technology, Metrics, policy governance, pubcrawl, research and analysis, resilience, Resiliency, Routing, security, system-on-chip
AbstractWith the development of computer technology and information security technology, computer networks will increasingly become an important means of information exchange, permeating all areas of social life. Therefore, recognizing the vulnerabilities and potential threats of computer networks as well as various security problems that exist in reality, designing and researching computer quality architecture, and ensuring the security of network information are issues that need to be resolved urgently. The purpose of this article is to study the design and realization of information security technology and computer quality system structure. This article first summarizes the basic theory of information security technology, and then extends the core technology of information security. Combining the current status of computer quality system structure, analyzing the existing problems and deficiencies, and using information security technology to design and research the computer quality system structure on this basis. This article systematically expounds the function module data, interconnection structure and routing selection of the computer quality system structure. And use comparative method, observation method and other research methods to design and research the information security technology and computer quality system structure. Experimental research shows that when the load of the computer quality system structure studied this time is 0 or 100, the data loss rate of different lengths is 0, and the correct rate is 100, which shows extremely high feasibility.
DOI10.1109/AIE57029.2022.00094
Citation Keyhu_design_2022