Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1221
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing
Published 2025-01-01“…Journal of Cloud Computing: Advances, Systems and Applications…”
Get full text
Article -
1222
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01“…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
Get full text
Article -
1223
التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة
Published 2016-10-01“…This study aimed at introducing the concept of cloud storing; its definition,importance, advantages, disadvantages, challenges and ways to overcome thesechallenges as well as aspects of benefit of cloud storing to the field of libraries.The study used the analytical descriptive approach, and reached the followingresults: there is a high possibility of making use of cloud storing in all institutionsincluding libraries. …”
Get full text
Article -
1224
Innovative IaaS Management System for Sensor Devices and IT Resources
Published 2014-06-01“…To solve these problems, we propose the innovative IaaS management system for sensor devices in which the sensor devices are managed as one of the IT resources in the same way as CPUs, storage, and networks in the cloud computing. We call this cloud environment “Sensor Cloud (SC).” …”
Get full text
Article -
1225
Radiative forcing from the 2020 shipping fuel regulation is large but hard to detect
Published 2025-01-01“…We find low detectability of the cloud radiative effect of this event, attributed to strong natural variability in cloud albedo and cloud cover. …”
Get full text
Article -
1226
An architecture of database-based open resource service networking
Published 2023-08-01“…The deep cloud-network integration hopes that the network side can provide fine-grained and on-demand customized services for cloud-side services, which poses a great challenge to existing IP bearer networks.To this end, an architecture of database-based open resource service networking was proposed.By abstracting the atomic service capabilities of the network and publishing services through a strongly consistent distributed key-value database, on-demand use of networking services at the cloud-side, joint cloud-network orchestration, and one point of business access could be achieved, which could flexibly meet the needs of cloud-network integration and achieve efficient carrying and refined services for diversified businesses.…”
Get full text
Article -
1227
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring
Published 2023-09-01“… As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. …”
Get full text
Article -
1228
Research and implementation of intelligent endogenous technology for SDN cooperative controller
Published 2021-12-01“…In the face of new demands and challenges such as business diversification, data quantification and cloud network integration, the ideas and methods of cloud network operation are changing.As the core capability of the new generation of cloud network operation system, SDN controller was deeply integrated with artificial intelligence technology.The key technologies and application practices of full-process closed-loop autonomy capability including intention analysis, cloud network intelligence perception, guarantee, optimization and automatic execution were studied to form intelligent endogenous capability of SDN controller.Firstly, the SDN controller intelligent endogenous development background and significance were clarified.And then, the ability of intelligent endogenous architecture and distribution of core competence were illustrated, which gradually form the whole process of the closed loop cloud network autonomy.Finally, focusing on 5G slice, SRv6 scene of new technology new business use cases, the intelligent perception, independent guarantee, automatic optimization of the key aspects of technology, and the effect of implementation and application were resolved.Through capability architecture design, key capability research and development, implementation verification and layout in standardization, the internal intelligence of SDN controller would gradually mature and enable smart operation of cloud network.…”
Get full text
Article -
1229
SRAM and Mixed-Signal Logic With Noise Immunity in 3-nm Nano-Sheet Technology
Published 2025-01-01Get full text
Article -
1230
Development and Application of a New Convective Entrainment Rate Parameterization for Improving Precipitation Simulation Over the Tibetan Plateau and Its Surrounding Areas
Published 2025-01-01“…Third, in terms of cloud microphysics, the increased entrainment rate reduces the cloud water content and weakens the intensity of convective precipitation. …”
Get full text
Article -
1231
An Autonomous Positioning Method for Drones in GNSS Denial Scenarios Driven by Real-Scene 3D Models
Published 2025-01-01“…Next, the corresponding real-scene 3D point cloud data within the point cloud dataset is extracted in accordance with the image-matching results. …”
Get full text
Article -
1232
Climatology of Total Cloudiness in the Arctic: An Intercomparison of Observations and Reanalyses
Published 2012-01-01“…Total cloud fraction over the Arctic (north of 60°N) has been evaluated and intercompared based on 16 Arctic cloud climatologies from different satellite and surface observations and reanalyses. …”
Get full text
Article -
1233
An Efficient Data Analysis Framework for Online Security Processing
Published 2021-01-01“…Most existing studies on traditional cloud data security analysis were focused on inspecting techniques for block storage data in the cloud. …”
Get full text
Article -
1234
English Writing Correction Based on Intelligent Text Semantic Analysis
Published 2022-01-01“…Moreover, this paper deduces the relationship formula between the range of English semantic information cloud drop and the evaluation word through the contribution of cloud drop group to qualitative concepts, the association between cloud drop central area and evaluation words, and the relationship between cloud drop ring area and evaluation word. …”
Get full text
Article -
1235
Assessment of the Symmetry and Deformation of a Submarine Hull Using the PCSE Method
Published 2024-12-01“…The paper presents a new dry-dock method for assessing the deformation of submarine hulls using TLS point cloud data and the point cloud spatial expansion method (PCSE). …”
Get full text
Article -
1236
Verifiable attribute-based searchable encryption scheme based on blockchain
Published 2020-02-01“…For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was proposed.The ciphertext policy attribute-based encryption mechanism was used on the shared key to achieve fine-grained access control.Ethereum blockchain technology was combined to solve the problem of incorrect search results returned by the semi-honest and curious cloud server model,so it could prompt both the cloud server and the user to follow the rules of the contract honestly and achieved service-payment fairness between the user and the cloud server in the pay-per-use cloud environment.In addition,based on the irreversible modification of the blockchain,the cloud server was guaranteed to receive the service fee,and the user was assured to obtain the correct retrieval results without additional verification which reduced the computational overhead of the user.The security analysis shows that the scheme satisfies the semantic security against adaptive chosen keyword attack and can protect the privacy of users and the security of data.The performance comparison and experimental results show that the scheme has certain optimizations in security index generation,search token generation,retrieval efficiency and transaction quantity,so it is more suitable for one-to-many search scenarios such as smart medical.…”
Get full text
Article -
1237
Potential impacts of marine fuel regulations on an Arctic stratocumulus case and its radiative response
Published 2025-01-01“…Compliance measures affect the physicochemical properties of exhaust particles and their cloud condensation nucleus (CCN) activity in different ways, with the potential to have both direct and indirect impacts on atmospheric processes such as the formation and lifetime of clouds. …”
Get full text
Article -
1238
Virtual reality compressing and transmitting system based on mobile edge computing
Published 2020-04-01“…In order to solve the problem of the high requirements of data transmission rate and sensitivity to transmission delay in virtual reality (VR) based on cloud services,a Cloud VR system with MEC (mobile edge computing) was proposed,mainly including viewpoint-based VR processing and HDA (hybrid digital-analog) transmission optimization.Firstly,a dynamic streaming method based on user viewpoint and pyramid projection was used to implement a complete edge cloud VR system.Then,HDA transmission was introduced to optimize the transmission,and a heuristic algorithm for resource allocation was given.Finally,the base station protocol stack was transformed,and the MEC was integrated into the LTE (long term evolution) system to implement a complete mobile edge cloud VR system.Experimental results demonstrate that the proposed scheme has good robustness and efficient transmission by comparing with the existing schemes.…”
Get full text
Article -
1239
3D Modeling of Sculpture Nano-Ceramics under Sparse Image Sequence
Published 2022-01-01“…To improve the analysis ability of point cloud 3D reconstruction of sparse images of nano-ceramic sculpture points, an automatic cloud 3D reconstruction method of nano-ceramic sculpture points based on sparse image sequence is proposed. …”
Get full text
Article -
1240
An efficient load balancing algorithm for virtual machine allocation based on ant colony optimization
Published 2018-12-01“…With the rapid development of information technologies and the popularization of Internet applications, more and more companies and developers pay great attention to the cloud computing. As one of the most significant problems in cloud computing, virtual machine allocation has attracted significant attention. …”
Get full text
Article