Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1321
Discretization Envelope Design Modeling Method of Rack and Pinion with Variable Ratio
Published 2019-01-01“…A design method of discretization envelope is proposed for the variable ratio rack and pinion, a transverse profile model of helical gear is established as the gear shaper cutter and the generating motion of gear shaping is simulated to obtain the envelope point cloud of the variable ratio rack in Matlab. The data points in the envelope point cloud are very dense, and at the same height, the distance between the adjacent tooth profile points is far greater than that between the non-tooth profile points. …”
Get full text
Article -
1322
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
1323
Evaluation of 16S rRNA Databases for Taxonomic Assignments Using a Mock Community
Published 2018-12-01“…This study was conducted to evaluate the accuracy of three widely used 16S databases—Greengenes, Silva, and EzBioCloud—and to suggest basic guidelines for selecting reference databases. …”
Get full text
Article -
1324
Research and practice of software-defined security technology architecture in the 5G+ era
Published 2021-12-01“…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
Get full text
Article -
1325
Application Research and Implementation of Load Balance Technology in General Collection Platform
Published 2013-12-01“…Through the interpretation of dynamic load balancing principles, the research for task scheduling algorithm, the expound to build the cloud resource pool hardware solution, the implementation for different scenarios designed mechanism and the configuration instructions and load monitoring for flexible weighting factors, that has the dynamic load balance techniques applied successfully in general collection platform for x86-based private cloud resource pool. …”
Get full text
Article -
1326
The Research on Obtaining the Geometric Dimension of Cable-Stayed Bridges Based on 3D Laser Scanning
Published 2023-01-01“…After obtaining plenty of point cloud data and point cloud models, precise and accurate geometric dimensions of cable-stayed bridges can be obtained accurately and conveniently. …”
Get full text
Article -
1327
An investigation on the feasibility of applying MODIS snow cover products in cloudy weather by the employment of its integration with microwave images
Published 2015-09-01“…However, one of the major problems in applying the MODIS snow products is cloud obscuration which limits the utilization of these products. …”
Get full text
Article -
1328
Automated Fog Node Audit and Certification Scheme With Multiple Attestation Certificate Authorities
Published 2025-01-01“…Fog computing is a complementary paradigm to cloud computing. It aims to improve the performance of Internet of Things (IoT) applications by positioning fog computing nodes closer to IoT networks. …”
Get full text
Article -
1329
Optimal Design of Intracranial Hematoma Puncture Drainage Tube Based on Adaptive Bifurcation Algorithm
Published 2021-01-01“…Aiming at the puncture and drainage of clinical intracranial hematoma, we proposed an adaptive bifurcation algorithm based on the hematoma point cloud and optimized the design of the drainage tube. …”
Get full text
Article -
1330
A Study of an IT-Assisted Higher Education Model Based on Distributed Hardware-Assisted Tracking Intervention
Published 2022-01-01“…The simulation results show that the model has lower latency and energy consumption compared to the cloud rendering model, which is suitable for the safety education classroom scenario and solves the outstanding problems of network connection rate and cloud service latency.…”
Get full text
Article -
1331
Optimization Model and Algorithm of Empty Pallets Dispatching under the Time-Space Network of Express Shipment
Published 2018-01-01“…According to the structural characteristics of the model, genetic algorithm and improved cloud clonal selection operation is used to solve the model. …”
Get full text
Article -
1332
Predicting Downward Longwave Radiation for Various Land Use in All-Sky Condition: Northeast Florida
Published 2014-01-01“…In this study, first, we analyzed the cloud cover and land use covers impacts on LWd. Next, LWd on all-sky conditions were developed by using the existing land use-adapted model and cloud cover data from the region of Saint Johns River Water Management District (SJRWMD), FL. …”
Get full text
Article -
1333
Game Edukasi Pengenalan Sistem Isyarat Bahasa Indonesia (SIBI) Menggunakan Myo Armband pada Arsitektur Client Server
Published 2022-06-01“…Penelitian ini juga membangun aplikasi permainan edukasi yang menggunakan platform cloud tersebut sebagai implementasi dari penggunaan platform. …”
Get full text
Article -
1334
An Arctic sea ice concentration data record on a 6.25 km polar stereographic grid from 3 years of Landsat-8 imagery
Published 2025-01-01“…Clouds in each Landsat-8 scene were masked using the cloud-masking array provided in Landsat data. …”
Get full text
Article -
1335
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01“…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
Get full text
Article -
1336
Attribute-based proxy re-encryption scheme with multiple features
Published 2019-06-01“…A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA).…”
Get full text
Article -
1337
5G core network deployment and evolution scheme
Published 2020-09-01“…Firstly,the disadvantages of NSA networking based on the 5G commercial situation of domestic operators were analyzed,it was suggested to control NSA investment and carry out 5G network construction with SA as the goal.Then based on combing the progress of 5G core network standard and the main changes of R16 standard,the commercial deployment of 5G SA core network based on regional network cloud and the following 2G/4G/5G convergence evolution planning and deployment proposal was analyzed,it included the commercial deployment suggestions of 5G edge computing nodes and the subsequent planning and construction suggestions.It was suggested that the planning and construction of 2G/4G/5G integrated networking should be carried out as soon as possible,in order to effectively protect investment,reduce the complexity of networking and maintenance,realize the target architecture of full cloud deployment of control plane and distributed sinking deployment of user plane.It provides reference for the construction of 5G SA core network.…”
Get full text
Article -
1338
Multi-authority ABS supporting dendritic access structure
Published 2017-07-01“…Attribute-based signature (ABS),which could realize fine-grained access control,was considered to be an important method for anonymous authentication in cloud computing.However,normal ABS only provided simple access control through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud.Moreover,the attribute sets were supervised by only one attribute authority,which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached.Aiming at tackling the problems above,a novel scheme,was proposed called multi-authority ABS supporting dendritic access structure which supported any AND,OR and threshold gates and affords more flexible access control.Meanwhile,the attribute sets of users were classified by diverse attribute authorities which reduced the overhead and the risk of systems.Besides,the scheme is proved to be selective predicate chosen message attack secure in the random oracle model.…”
Get full text
Article -
1339
Inter-Satellite Cooperative Computing Scheme Driven by Business Graph in LEO Satellite Network
Published 2021-06-01“…Low earth orbit-satellite network (LEO-SN) has the advantages of wide coverage and short satellite-to-earth link, and has become a current hot research fi eld.A business graph-driven inter-satellite collaborative computing method in LEO-SN was proposed to solve the problem of high transmission delay when the task was offl oaded to the cloud computing center.This method shielded the dynamics of LEO-SN by relying on the weighted time expansion graph model, combined multiple satellite computing resources, and dispatches tasks in the form of a directed acyclic graph to the satellites in the transmission path, thereby realizing the "computing while transmitting” of user services in the satellite cluster.The simulation results showed that when the data volume was 5 MB, the latency performance of on-orbit collaborative computing was improved by 58.9% compared to ground cloud computing.…”
Get full text
Article -
1340
Fatigue Life Comparative Analysis of Rolling-sliding Bearing based on nCode DesignLife
Published 2017-01-01“…The fatigue life simulation of cylindrical roller bearing and rolling- sliding bearing is carried out by using the n Code Design Life fatigue analysis software,the cloud picture of life and damage of two kinds of bearing are got,the parts easily damaged of two kinds of bearing are determined from the cloud picture. …”
Get full text
Article