Volume 16 Number 1 March 2025

    
Secured hash Techniques for the Analysis of Physical Health Based on Third Party and Apriori Algorithm

Nan Zhang

https://doi.org/10.6025/jisr/2025/16/1/1-8

Abstract This article aims to conduct empirical testing on 6043 students from 7 high schools to explore the data background and potential risks that third-party physical health measurements can reveal. Through Apriori Analysis of algorithms, we have concluded that there is a certain degree of similarity between the results and reference values of most indicators when measured by a third party. Therefore, this paper... Read More


Data Mining-based Calculation and Comparative Analysis of Common Cause Failure Score for System Security

Yonghui Ma

https://doi.org/10.6025/jisr/2025/16/1/9-16

Abstract In this study, we employed a novel technique, data mining, to accurately evaluate the failure rate of secure computers, providing valuable data information for our decision-making layer. This technique is beneficial not only for our decision-making but also for the long-term operation of our systems. Through in-depth analysis, we discovered inherent connections among various failure events and their mutual impacts. These findings contribute to... Read More


Application of Swarm Intelligence Algorithms in Higher Vocational Teaching

Qin Li

https://doi.org/10.6025/jisr/2025/16/1/17-24

Abstract College Chinese,” as a core course in literary majors, faces challenges in achieving its intended goals due to the limitations of traditional teacher-centred teaching methods and students’ lack of enthusiasm. This study adopts genetic algorithms, particle swarm algorithms, hybrid frog-leaping methods, and swarm intelligence optimization algorithms to improve this situation. Through practical application, it is found that these methods outperform traditional manual and composite... Read More


Design and Research of Students’ Secured Education System Based on Personalized Recommendation

Hao Qin

https://doi.org/10.6025/jisr/2025/16/1/25-32

Abstract This study aims to develop a secure education solution that meets the individual needs of different college students, helping them grasp knowledge better, enhance their learning enthusiasm, and stimulate their motivation. The research adopts experimental design and analysis methods, setting up experimental and control groups, collecting experimental data, and conducting data analysis. The matrix factorization algorithm is used to obtain a suitable system, and... Read More