Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1301
Regression Model to Predict Global Solar Irradiance in Malaysia
Published 2015-01-01“…The model is developed based on different available meteorological parameters, including temperature, cloud cover, rain precipitate, relative humidity, wind speed, pressure, and gust speed, by implementing regression analysis. …”
Get full text
Article -
1302
Job Shop Scheduling Based on Digital Twin Technology: A Survey and an Intelligent Platform
Published 2021-01-01“…Meanwhile, based on the prediction and diagnosis of multisource dynamic interference in the workshop production process by big data analysis technology, the corresponding interference strategy is formulated in advance by the scheduling cloud platform. The model simulation experiment of intelligent dispatching cloud platform was carried out, and some enterprises in intelligent manufacturing workshop were taken as examples to verify the superiority of the dispatching cloud platform. …”
Get full text
Article -
1303
Integration of InSAR coherence and SAR backscatter increases accuracy of LULC mapping in tropical high-mountain ecosystems
Published 2025-12-01“…Accurate land use/land cover (LULC) mapping is critical for monitoring these pressures. However, persistent cloud cover poses substantial challenges for optical satellite imagery. …”
Get full text
Article -
1304
Enhancing Off-Road Topography Estimation by Fusing LIDAR and Stereo Camera Data with Interpolated Ground Plane
Published 2025-01-01“…Common methods rely on point cloud data from, e.g., Light Detection and Ranging sensors (LIDARs) and stereo cameras. …”
Get full text
Article -
1305
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. …”
Get full text
Article -
1306
Two-Sided Matching Model of Shared Manufacturing Resources considering Psychological Behavior of Agents
Published 2021-01-01“…We describe the definition of two-sided matching and introduce the concept of the cloud model. The preference information of agents is transformed to values according to the cloud model. …”
Get full text
Article -
1307
A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions
Published 2024-06-01“…However, the sheer volume of data from billions of devices can overwhelm networks, making traditional cloud data processing inefficient for IoT applications. …”
Get full text
Article -
1308
Three-Dimensional Digital Documentation for the Conservation of the Prambanan Temple Cluster Using Guided Multi-Sensor Techniques
Published 2025-01-01“…Furthermore, visually, every point cloud model from each sensor successfully complemented each other. …”
Get full text
Article -
1309
Semisupervised Graph Neural Networks for Traffic Classification in Edge Networks
Published 2023-01-01“…In this paper, a semisupervised graph neural network traffic classifier is proposed for cloud-edge architecture so that cloud servers and edge nodes could cooperate to perform the traffic classification tasks in order to deliver low latency and save bandwidth on the edge nodes. …”
Get full text
Article -
1310
An overview of smart agriculture using internet of things (IoT) and web services
Published 2025-06-01“…IoT integrates wireless sensor networks, artificial intelligence, and cloud computing to boost productivity while minimizing costs and losses. …”
Get full text
Article -
1311
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01“…With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. …”
Get full text
Article -
1312
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…Fog computing is an emerging technology that extends the capability and efficiency of cloud computing networks by acting as a bridge among the cloud and the device. …”
Get full text
Article -
1313
Impact Assessment of Orography on the Extreme Precipitation Event of July 2010 over Pakistan: A Numerical Study
Published 2015-01-01“…The physical mechanism involved in such events includes mechanical uplifting, thermodynamics, small scale cloud processes, and large scale atmospheric circulations. …”
Get full text
Article -
1314
Lightning Current Distribution of the First and Subsequent Strokes Based on the Lightning Location System: Survey in Yunnan Power Grid
Published 2024-12-01“…Lightning is an electrical discharge phenomenon in the atmosphere caused by charge separation in clouds, which is divided into cloud-to-ground (CG) and cloud-to-cloud (CC) lightning. …”
Get full text
Article -
1315
Research on trust measurement method for initial access of industrial internet edge terminals
Published 2022-12-01“…The development of the discrete manufacturing shows a trend of intelligence, openness and collaboration.As a result, many heterogeneous devices are connected to the industrial internet, which brings serious challenges to the security.Therefore, it is particularly important to introduce trust management and trusted access to devices for trusted measurement.In order to more timely and accurately evaluate the trustworthiness of the edge terminal initially accessing the system, a trustworthiness measurement method based on the device vulnerability database was innovatively proposed.This method adopted the architecture of cloud-edge collaboration, established a device information database and a vulnerability database in the central cloud, and then calculated the terminal risk factor at the edge.Finally, the trust initialization of the access terminal was completed.The simulation results show that the method can well balance the efficiency and security of the system.…”
Get full text
Article -
1316
ENVIRONMENTAL TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING RASPBERRY PI 4 AND THINGSPEACK
Published 2022-01-01“…This paper aims to create an IoT system to monitor temperature and humidity in an enclosure The Raspberry Pi 4 SBC (Single-Board Computer) development board and ThingSpeak cloud platform will be used to make this system. …”
Get full text
Article -
1317
Edge intelligence-assisted routing protocol for Internet of vehicles via reinforcement learning
Published 2023-11-01“…To achieve a highly reliable and adaptive packet routing protocol in a complex urban Internet of vehicles, an end-edge-cloud edge intelligence architecture was proposed which consisted of an end user layer, an edge collaboration layer, and a cloud computing layer.Based on the proposed edge intelligence architecture, an packet routing protocol based on multi-intelligent reinforcement learning technologies was designed.The experimental results show that the proposed protocol could significantly improve the transmission delay and the packet reception rate in the interval of 29.65%~44.06% and 17.08%~25.38% compared to the state-of-the-art transmission mechanism for emergency data (TMED), intersection fog-based distributed routing protocol (IDR), and double deep Q-net based routing protocol (DRP).…”
Get full text
Article -
1318
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01“…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
Get full text
Article -
1319
Novel chaotic block encryption scheme for WSN based on dynamic sub key
Published 2017-12-01“…In view of high efficiency and security requirements in WSN encryption algorithm,a lightweight chaotic block encryption algorithm was designed and a novel scheme of dynamic sub keys extension was proposed.To greatly reduce the computing burden of WSN nodes,this scheme made full use of WSN cloud servers monitoring platform,which was powerful in data computing and processing,and transfered the sub keys synchronization task from nodes to cloud servers.Experimental results and performance analysis show that the scheme has good characteristics of diffusion,confusion and statistical balance,strong key security and high algorithm efficiency.It has a good application prospect in the field of WSN communication encryption.…”
Get full text
Article -
1320
Research and optimization on quality of service in distributed block storage system
Published 2018-04-01“…In cloud storage technology,resource reuse and sharing is a double-edged sword.While it reducing the overhead for customers,it leads to a situation that the different applications will compete for hardware resources,especially when resource requirement exceeded storage system capability.As a consequence the cloud storage system is unable to provide satisfactory quality of service.An adaptive scheduling technology was proposed,solving the resource balance problem between front tasks and back tasks.A multilevel popularity cache replacement technology was also proposed,solving the resource balance problems between the front tasks themselves.These technology was implemented and tested on the ZTE distributed block storage system.The proposed technology satisfies the expectations of the quality of service from the users.…”
Get full text
Article