Accesso libero

A multi-task scheduling algorithm for heterogeneous information security in the Internet of Things for electricity

, , ,  e   
26 mar 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Figure 1.

A complex task is divided into several subtasks with computational characteristics
A complex task is divided into several subtasks with computational characteristics

Figure 2.

Service A corresponds to the resource usage of the container
Service A corresponds to the resource usage of the container

Figure 3.

Physical machine resource usage
Physical machine resource usage

Figure 4.

Comparison of security transmission results of big data for power dispatching
Comparison of security transmission results of big data for power dispatching

Figure 5.

The relationship between the power and intercept probability of VCM control
The relationship between the power and intercept probability of VCM control

Figure 6.

The relationship between optimization target and transmission power and arrival rate
The relationship between optimization target and transmission power and arrival rate

Figure 7.

Algorithm real-time load
Algorithm real-time load

Password task execution time

Password task type Execution time
Symmetric encryption request 240ms
Symmetric decryption request 210ms
Asymmetric encryption request 380ms
Asymmetric decryption request 360ms
Signature request 420ms
Check request 580ms
Hash request 120ms
Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro