Showing 441 - 460 results of 2,372 for search '"cloud"', query time: 0.09s Refine Results
  1. 441
  2. 442
  3. 443

    Theoretical framework for measuring cloud effective supersaturation fluctuations with an advanced optical system by Y. Kuang, J. Tao, H. Xu, L. Liu, P. Liu, W. Xu, W. Xu, Y. Sun, C. Zhao

    Published 2025-01-01
    “…<p>Supersaturation is crucial in cloud physics, determining aerosol activation and influencing cloud droplet size distributions, yet its measurement remains challenging and poorly constrained. …”
    Get full text
    Article
  4. 444
  5. 445
  6. 446
  7. 447
  8. 448
  9. 449
  10. 450

    PCEP application in cloud-network convergence and end to end traffic assurance scheme by Yue WANG, Aijun WANG, Honglei XU

    Published 2021-08-01
    “…With the booming development of new technologies such as cloud computing, big data and the continuous upgrading of communication infrastructure, the major domestic ISPs have proposed the development strategy of building a centralized control and flexible cloud network infrastructure under the trend of intelligent-traction network transformation.As a path calculation protocol widely used in the existing SDN architecture, PCEP protocol was often used to solve the problem of cross-layer and cross-domain path computing under complex network environment.The application of PCEP protocol in cloud-network convergence scenario was discussed and an end-to-end traffic guarantee scheme was introduced based on PCEP protocol which could ensure the connection-oriented network communication and make end-to-end service guarantee in native IP environment.It helps to improve the operators' ability of real-time perception, agile response and intelligent analysis of the network and meets the operation and maintenance management requirements such as global scheduling of communication resources, comprehensive opening of capabilities and flexible architecture.…”
    Get full text
    Article
  11. 451

    A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient by Muhammad Al-Qurishi, Mabrook Al-Rakhami, Fattoh Al-Qershi, Mohammad Mehedi Hassan, Atif Alamri, Hameed Ullah Khan, Yang Xiang

    Published 2015-03-01
    “…This paper presents a new hybrid framework based on mobile multimedia cloud that is scalable and efficient and provides cost-effective monitoring solution for noncommunicable disease patient. …”
    Get full text
    Article
  12. 452
  13. 453
  14. 454

    A Fast Optimization Method for Reliability and Performance of Cloud Services Composition Application by Zhao Wu, Naixue Xiong, Yannong Huang, Qiong Gu, Chunyang Hu, Zhongbo Wu, Bo Hang

    Published 2013-01-01
    “…At present the cloud computing is one of the newest trends of distributed computation, which is propelling another important revolution of software industry. …”
    Get full text
    Article
  15. 455
  16. 456

    Evaluation of Comprehensive Ability of Accounting Applied Talents Based on GFAHP-Cloud Model by Qingyang Zhang

    Published 2021-01-01
    “…Finally, a fuzzy comprehensive evaluation model based on the cloud model is constructed and tested in practice. …”
    Get full text
    Article
  17. 457

    An edge cloud–based body data sensing architecture for artificial intelligence computation by TaeYoung Kim, JongBeom Lim

    Published 2019-04-01
    “…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
    Get full text
    Article
  18. 458

    Scheme on user identity attribute preserving based on ring signcryption for cloud computing by Shuan-bao LI, Jian-ming FU, Huan-guo ZHANG, Jing CHEN, Jing WANG, Bi-jun REN

    Published 2014-09-01
    “…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
    Get full text
    Article
  19. 459
  20. 460