Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1281
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01“…These fragments are stored on randomly chosen servers within cloud environment. Analyses and experiments show that this approach is efficient and useable for the confidentiality of user data in cloud storage system.…”
Get full text
Article -
1282
Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278
Published 2021-10-01“…Pemrosesan data secara umum dilakukan pada Cloud atau node lain, hal ini menyebabkan beban kerja dari node lain atau Cloud tersebut menjadi cukup berat. …”
Get full text
Article -
1283
ARMTRAJ: a set of multipurpose trajectory datasets augmenting the Atmospheric Radiation Measurement (ARM) user facility measurements
Published 2025-01-01“…<p>Ground-based instruments offer unique capabilities such as detailed atmospheric, thermodynamic, cloud, and aerosol profiling at a high temporal sampling rate. …”
Get full text
Article -
1284
Multi-Sensor-Fusion Approach for a Data-Science-Oriented Preventive Health Management System: Concept and Development of a Decentralized Data Collection Approach for Heterogeneous...
Published 2019-01-01“…Thus, the mDCS increases the availability of the processing cloud and in consequence also of the higher level data-fusion procedures. …”
Get full text
Article -
1285
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
1286
Steady-state mixing state of black carbon aerosols from a particle-resolved model
Published 2025-02-01Get full text
Article -
1287
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01“…A novel approach that has garnered increased attention involves the "vehicle-edge-cloud" framework, wherein RSUs decide whether to process tasks locally or to offload them to the cloud. …”
Get full text
Article -
1288
Research on the Classification of Traditional Building Materials in Southern Fujian Using the Reflection Intensity Values of Ground-Based LiDAR
Published 2025-01-01“…Ground-based LiDAR technology has been widely applied in various fields for acquiring 3D point cloud data, including spatial coordinates, digital color information, and laser reflectance intensities (I-values). …”
Get full text
Article -
1289
Internet marketing organization with the use of intellegent and block chain technologies
Published 2020-05-01“…Proposals have developed for improving Internet marketing in an integrated environment (traditional network and cloud one) using intelligent and blockchain technologies. …”
Get full text
Article -
1290
Perissomyrmex Snyderi (Hymenoptera: Formicidae) is Native to Central America and Exhibits Worker Polymorphism
Published 1994-01-01“…New collections were observed from two different cloud forest sites in the state of Chiapas, Mexico. …”
Get full text
Article -
1291
Shamir-based virtual machine placement policy
Published 2019-10-01“…In order to alleviate the harm of co-location attack in cloud environment,a virtual machine placement strategy based on Shamir was proposed,and a virtual machine placement framework was designed.The security of key data was ensured by the blockchain in the proposed placement strategy.The virtual machine placement policy could effectively improve the security of the virtual machine and the load balancing capability of the cloud environment,and reduce resource waste.Finally,the effectiveness of the scheme is proved by simulation experiments.…”
Get full text
Article -
1292
Attribute based sanitizable signature scheme
Published 2013-08-01“…Sensitive information in the document needs to be hidden in cloud computing environment, and attribute based sanitizable signature (ABSS) scheme was proposed to solve this problem. …”
Get full text
Article -
1293
MODIS land surface temperature in East Antarctica: accuracy and its main affecting factors
Published 2024-01-01“…By utilizing a stricter filter based on automatic weather station cloud data, despite losing 29.4% of the data, accuracy of MODIS LST was greatly improved. …”
Get full text
Article -
1294
Simulation of Self-Occlusion Virtual Dataset Method for Robust Point Matching Algorithm, With Applications to Positioning of Guide Vanes
Published 2025-01-01“…The application of point cloud registration technology for workpiece positioning compensation using optical three-dimensional measurement methods has attracted widespread attention in the manufacturing industry, particularly point cloud registration methods integrated with deep learning are booming. …”
Get full text
Article -
1295
Aspects of nonlinear effect on black hole superradiance
Published 2020-01-01“…In particular, we focus on the effect of the particle production and show that the growth of the boson cloud may be saturated much before the black hole spin is extracted by the boson cloud, while the nonlinear interactions also induce the boson emission. …”
Get full text
Article -
1296
NFV security requirements and strategies
Published 2016-03-01“…Rapid development of cloud computing technology not only brings the convenience of high-speed computing,but also buries a lot of unsafe factors.European Telecommunications Standards Institute(ETSI)pointed out that the problem of virtualization security would become a major problem for telecom operators and enterprises in the next year.The NFV architecture security technology was researched,the importance of the safety was pointed out,the facilities of availability management and startup related safety problems were analyzed,and the NFV software security risks was summarized too.Through continuous improvement of NFV security technology makes cloud computing environment can be more secure and orderly development.…”
Get full text
Article -
1297
Application of high-performance 4K live broadcast service in 5G network
Published 2019-06-01“…In order to accelerate the industrialization and commercialization of 5G and promote the integration and innovation development of 5G with various industries,the operators launched the demonstration project of 5G business application.The typical business scenarios under 5G network was firstly analyzed,the architecture of system was described,then hardware scheme was given including 4K collector,cloud platform and broadcast terminal.Then software solutions were proposed including management platform,cloud fast encoding system,4K transcoding platform,CDN and network slicing.…”
Get full text
Article -
1298
Development of visual surveillance standardization
Published 2018-10-01“…The standardization of visual surveillance in major standard organizations both domestic and international was focused on,and the progress of the visual surveillance standards in ITU-T,ONVIF,IEC,ISO,PSIA,HDcctv,IEEE,3GPP,ETSI,TC100,CCSA,AVS and National Information Technical Standardization Committee was introduced.The latest development in standardization area such as visual surveillance systems,architecture,terminals,codecs,intelligent applications,big data applications,cloud storage,cloud computing,edge storage and edge computing were introduced.On this basis,the future research areas of product development and standardization of visual surveillance were discussed.The visual surveillance standardization roadmap was laid out,and the future visual surveillance standardization and research fields were proposed.…”
Get full text
Article -
1299
Hierarchical and Distributed Eco-Driving Approach for Mixed Vehicle Clusters at Unsignalized Intersections
Published 2023-01-01“…For the cloud decision layer, the multivehicle model-free adaptive predictive cooperative driving (MFAPCD) method is designed by using only the driving data of the HDVs and ICVs formation based on compact form dynamic linearization (CFDL) technique, thereby improving traffic efficiency. …”
Get full text
Article -
1300
Coupling WRF Double-Moment 6-Class Microphysics Schemes to RRTMG Radiation Scheme in Weather Research Forecasting Model
Published 2016-01-01“…A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. …”
Get full text
Article