Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
2041
Short-term calving front dynamics and mass loss at Sálajiegna glacier, northern Sweden, assessed by uncrewed surface and aerial vehicles
Published 2024-01-01“…Consecutive USV surveys of Sálajiegna's front, followed by point cloud based calving detection and surface-reconstruction based volume quantification, allowed for a detailed description of calving-induced terminus changes and is hence suggested as a viable alternative to the differencing of digital elevation models. …”
Get full text
Article -
2042
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article -
2043
Weakened future surface warming in China due to national planned afforestation through biophysical feedback
Published 2025-02-01“…On the diurnal cycles, afforestation induces daytime cooling effects of −0.21 °C caused by increased latent heat fluxes, while nighttime warming effects of 0.05 °C induced mainly by cloud feedback. Our findings highlight the importance of the scientific identification of afforestation areas when developing land-management strategies and biophysical feedback for climate change mitigation.…”
Get full text
Article -
2044
Consistent patterns of LiDAR-derived measures of savanna vegetation complexity between wet and dry seasons
Published 2025-01-01“…We repeated our analysis at a thinned point cloud density of 10 points/m2 and found that seasonal consistencies were not resolution dependent. …”
Get full text
Article -
2045
Experimental Analysis Using IoT-Based Smart Power Quality Analyzer System With Remote Data Access and GSM Alerting Mechanism
Published 2025-01-01“…Internet of Things (IoT) is a potential technology to design Smart PQAs for remote monitoring and easy integration of the field information on the cloud platform using gateway units. This paper focuses on the development of a Smart PQA system using low-cost IoT hardware and software design solutions. …”
Get full text
Article -
2046
A Hybrid Strategy Two‐Dimensional Concrete Aggregate Filling Algorithm
Published 2025-01-01“…In order to improve the efficiency of aggregate placement in modeling concrete meso‐models, we proposed a hybrid‐strategy point cloud placement algorithm that combines the re‐placement and sedimentation strategies. …”
Get full text
Article -
2047
Distributed Storage Strategy and Visual Analysis for Economic Big Data
Published 2021-01-01“…With the increasing popularity of a large number of Internet-based services and a large number of services hosted on cloud platforms, a more powerful back-end storage system is needed to support these services. …”
Get full text
Article -
2048
Rapid Flood Monitoring Using Sentinel-1 and Landsat-8 Images (Case study: Kashkan River, Poldakhter City)
Published 2023-09-01“…This advantage coupled with cloud computing platforms such as Google Earth Engine (GEE) provide a tremendous opportunity for the crisis response community for effective management plans. …”
Get full text
Article -
2049
Record Keeping Practices at Kabale University Central Registry.
Published 2024“…The researcher recommends that they purchase a good-quality photocopying machine and they should adopt the use of record management systems such as the cloud, the disposition methods include burning and archiving and the researcher recommends purchasing a shredder to ease the disposition of records.…”
Get full text
Thesis -
2050
Ice-nucleating particles active below −24 °C in a Finnish boreal forest and their relationship to bioaerosols
Published 2024-10-01“…<p>Cloud properties are strongly influenced by ice formation; hence, we need to understand the sources of ice-nucleating particles (INPs) around the globe. …”
Get full text
Article -
2051
Palette-based image recoloring based on moving least squares(基于移动最小二乘的图像重着色)
Published 2025-01-01“…Next, we map the image and its palette to the RGB color space, treating them as a three-dimensional point cloud and control points. Finally, we transform the palette based image recoloring task into a problem of classic point cloud deformation. …”
Get full text
Article -
2052
Systematic Characterization of the Chemical Components of Canna edulis Ker-Gawl Based on UHPLC Q-Exactive Orbitrap MS Technology
Published 2023-01-01“…We used retention time, accurate molecular weight, parent peaks, fragment peaks, fragmentation characteristics, comparative analysis with the literature, reference standards, and standard databases, including ChemSpider, mzVault, MassBank, and mzCloud. A total of 54 chemical constituents were identified from the methanol extract of the rhizome, including 36 organic acids (with six phenolic acids), three phenols, one sugar (and its derivatives), one coumarin, one triterpenoid, ten N-containing organic compounds (including seven amino acids), and two other compounds. …”
Get full text
Article -
2053
Challenges and Opportunities in Fog Computing Scheduling: A Literature Review
Published 2025-01-01“…Nonetheless, both IoT and Artificial Intelligence (AI)-based applications face obstacles concerning the availability of computing resources, security, and constraints on energy consumption. While cloud computing provides certain resolutions, it also poses additional challenges, including heightened communication expenses and security vulnerabilities due to its physical disconnection from endpoint devices. …”
Get full text
Article -
2054
Evaluation of the Cost of Intelligent Upgrades of Transportation Infrastructure for Intelligent Connected Vehicles
Published 2022-01-01“…The results show that the intelligent transportation infrastructure for advanced ICVs mainly includes communication base stations, roadside units (RSUs), vision sensors, millimeter-wave radars, laser radars (LiDARs), meteorological sensors, intelligent signal machines, edge computing servers, and cloud computing centers. The route of deploying primary intelligent transportation infrastructure at first and then directly upgrading them to advanced level can well match the functional requirements of ICVs on the basis of lower costs. …”
Get full text
Article -
2055
Evaluation of aerosol loading and its relationship with geopotential height in Nigeria’s Guinea Coast
Published 2025-01-01“…Aerosols impact the Earth's climate by influencing cloud formation, scattering radiation, and cooling the planet. …”
Get full text
Article -
2056
Study on scour simulation and boundary condition conversion technology for a shallow foundation bridge
Published 2025-02-01“…This method utilizes point cloud reverse engineering technology to generate a riverbed surface from the three-dimensional coordinate matrix of the boundary and import it into the structural analysis field. …”
Get full text
Article -
2057
Incremental Instance-Oriented 3D Semantic Mapping via RGB-D Cameras for Unknown Indoor Scene
Published 2020-01-01“…To obtain accurate point cloud cluster, we adopt the Gaussian mixture model as an optimizer after processing 2D to 3D projection. …”
Get full text
Article -
2058
Identifying weather patterns responsible for renewable energy droughts over India
Published 2025-01-01“…Renewable energy droughts are caused by low seasonal wind speeds in combination with weather patterns bringing high cloud cover. These are mainly weak northeast monsoon and western disturbances.…”
Get full text
Article -
2059
Smartphone-Based Automated Non-Destructive Testing Devices
Published 2020-12-01“…The purpose of this work was to develop an ultrasonic flaw detector, which uses a smartphone to process the test results, as well as transfer them directly to an powerful information processing center, or to a cloud storage to share operational information with specialists from anywhere in the world.The proposed flaw detector consists of a sensor unit and a smartphone. …”
Get full text
Article -
2060
Validation of Two MODIS Aerosols Algorithms with SKYNET and Prospects for Future Climate Satellites Such as the GCOM-C/SGLI
Published 2013-01-01“…The uncertainties explaining these ground-satellites’ algorithms discrepancies are examined: the cloud contamination affects differently the aerosols properties (AOT and AE) of both satellites’ algorithms due to the retrieval scale differences between these algorithms. …”
Get full text
Article