Application of Blockchain Technology in Data Security and Privacy Protection
Xiuni Li*
Abstract | References | PDF | HTML | Pub. Date: Jul 8, 2024
DOI: 10.23977/jeis.2024.090219 | Downloads: 31 | Views: 1588
Protein folding rate prediction integrating multi-level structural information
Mingxiao Xu, Zhouting Jiang*, Zhenan Wu
Abstract | References | PDF | HTML | Pub. Date: Jul 1, 2024
DOI: 10.23977/jeis.2024.090218 | Downloads: 20 | Views: 1368
A Study of Tennis Match Momentum Based on Random Forest Model and AHP Approach
Renyang Xiong*
Abstract | References | PDF | HTML | Pub. Date: Jun 28, 2024
DOI: 10.23977/jeis.2024.090217 | Downloads: 27 | Views: 1534
Ying Ding*
Abstract | References | PDF | HTML | Pub. Date: Jun 24, 2024
DOI: 10.23977/jeis.2024.090216 | Downloads: 39 | Views: 1462
Design and implementation of industrial automation control system based on PLC
Hao Zhang*
Abstract | References | PDF | HTML | Pub. Date: Jun 11, 2024
DOI: 10.23977/jeis.2024.090215 | Downloads: 711 | Views: 5378
Research on Fault Diagnosis and Prediction Algorithms for Power Equipment in Smart Grids
Ming Gao*, Feng Zheng
Abstract | References | PDF | HTML | Pub. Date: Jun 10, 2024
DOI: 10.23977/jeis.2024.090214 | Downloads: 37 | Views: 1661
Yang Liu*, Xuying Zhang, Jun Wang, Yujiang Zhao, Bing Feng
Abstract | References | PDF | HTML | Pub. Date: Jun 7, 2024
DOI: 10.23977/jeis.2024.090213 | Downloads: 20 | Views: 1381
Research on Network Information Security Control in the Big Data Era
Mingming Xu*
Abstract | References | PDF | HTML | Pub. Date: Jun 3, 2024
DOI: 10.23977/jeis.2024.090212 | Downloads: 31 | Views: 1312
Kerui Liu*
Abstract | References | PDF | HTML | Pub. Date: May 31, 2024
DOI: 10.23977/jeis.2024.090211 | Downloads: 35 | Views: 1796
Utilization and Security Protection of Computer Communication Technology in the Information Age
Dongyuan Ge*, Qianyi Fang, Qi Han
Abstract | References | PDF | HTML | Pub. Date: May 30, 2024
DOI: 10.23977/jeis.2024.090210 | Downloads: 35 | Views: 1538


























