Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1361
Space-Air-Ground Integrated Network Architecture Based on Mobile Edge Computing
Published 2024-03-01“…The next generation of wireless communication technologies will enhance the quality of user experience by supporting services such as intelligent transportation, intelligent healthcare, virtual/augmented reality, and more.These emerging services are typically computation-intensive and delay-sensitive, and must meet stringent delay, energy consumption, and reliability requirements that cloud-based services struggle to meet.In order to solve the above problems, mobile edge computing (MEC) technology was proposed to solve the problems of high latency and high bandwidth consumption when sending offloading requests back to the cloud computing centers.As an important research direction of 6G , space-air-ground integrated network (SAGIN) could make up for the huge coverage gap in the world, and had been widely concerned.This paper introduced MEC technology, federated learning technology and artificial intelligence technology into SAGIN to efficiently manage massive and heterogeneous resources in the network, and builded low-delay, low-energy consumption and high-reliability SAGIN to support various emerging services.…”
Get full text
Article -
1362
Evolution scheme of 5G fusion user data architecture
Published 2019-06-01“…User data management has experienced the evolution of 2G/3G and 4G era.At present,as a triple integration HLR/HSS service for mobile 2G/3G/4G/VoLTE users,contract data storage and authentication management,with the advent of 5G,5GC introduces cloud-based micro-service architecture UDM/UDR user data management network element,how to realize the evolution deployment of existing HSS and UDM,and how to realize the timely signing of 5G users to guarantee the 5GC business process urgently need to be studied.How to realize the evolution deployment of 5G user data to the four-fused HSS/UDM architecture based on the strategy of no-change card and no-change trademark commercial 5G market,and how to realize the smooth migration of 2G/4G user data to 5G user data at the same time was mainly researched.Finally,four HSS/UDM evolution schemes were presented and the rhythm of cloud migration was proposed.…”
Get full text
Article -
1363
Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform
Published 2023-05-01“…., a novel algorithm based on deep reinforcement learning for optimizing QoS in software defined security middle platforms (SDSmp) in real-time was proposed.Firstly, the fragmented security requirements and infrastructure were integrated into the SDSmp cloud model.Then by leveraging the power of deep reinforcement learning and cloud computing technology, the real-time matching and dynamic adaptation capabilities of the security middle platform were enhanced.Finally, a real-time scheduling strategy for security middle platform resources that meet QoS goals was generated.Experimental results demonstrate that compared to existing real-time methods, the proposed algorithm not only ensures load balancing but also improves job success rate by 18.7% for high QoS and reduces the average response time by 34.2%, and it is highly robust and better suited for real-time environments than existing methods.…”
Get full text
Article -
1364
A Collaborative Story Writing Project Using Google Docs and Face-to-Face Collaboration
Published 2025-01-01“…The Google Docs application is part of Google Workspace for Education, a suite of cloud-based productivity and collaboration tools that are now ubiquitous in middle and high school classrooms. …”
Get full text
Article -
1365
Research and Implementation of Intelligent Home Pension System Based on Speech and Semantic Recognition
Published 2022-01-01“…In this method, data transmission, instruction uploading, and receiving are completed by designing the communication interface of home appliance terminal to build the wireless intelligent home communication subsystem, and the voice module of IfI is adopted. The intelligent cloud is selected as the development cloud platform, and the related hardware is selected to realize the remote data communication. …”
Get full text
Article -
1366
A pilot study of Telco’s next generation IT architecture evolution: business function virtualization (BFV)
Published 2022-06-01“…With the development of information and communication technologies, traditional telecom business support systems (BSS) are facing the challenge of agilely meeting the flexible needs from business.Application scenarization, service standardization, technology componentization and resource sharing have gradually become the consensual features among the evolution of telecom BSS architectures.A business function virtualization (BFV)-based BSS architecture, which is based on cloud-native, micro-services, containers, and DevOps technologies, was proposed.By embedding four components into the architecture, including standardized virtual network functions, modular design orchestrator, micro-service management framework, and multi-plane elastic computing controller, the system is able to deploy unitized system and distributed cloud.Therefore, the requirements of flexible telecom business development and frequent evolution of the system could be satisfied by the proposed BFV-based BSS architecture.In other words, the lightweight delivery of IT technologies and agile business support could be fulfilled by using the proposed BFV-based BSS architecture, and the proposed architecture will eventually become the standard architecture of next generation telecom BSS.…”
Get full text
Article -
1367
An intelligent and simplified 5G wireless network technology
Published 2021-05-01“…5G is the current focus of the development of the information and communication industry, and is gradually being deployed and commercialized.The 5G network will cover toC to toB, aiming at the interconnection of everything, so the complexity and challenges are unprecedented.In order to meet the needs of multiple scenarios, 5G network technology is complex and flexible in design, and the traditional management and operation methods are difficult and costly.At the same time, industry application requirements are very different and demanding.All of these require integrated solutions such as cloud-network integration and network industry collaboration.In response to the above-mentioned problems and needs, an intelligent and simplified 5G wireless network technology framework was proposed.Through innovative thinking and technology development of wireless networks, 5G and artificial intelligence, cloud computing, big data, edge computing and other new technologies were integrated and innovated to continuously improve 5G capabilities and promote the deep convergence of 5G and DOICT.A detailed introduction to the entire framework, platforms and applications in the above technology system were given.Finally, a technical outlook was proposed for shaping a new 5G ecology that supported green, smart, efficient operation, and the internet of everything.…”
Get full text
Article -
1368
Systematic Thinking and Evaluation of Construction Quality Management Standardization of Power Engineering in China
Published 2022-01-01“…Subsequently, the G1 method is used to determine the weight of each index, and the cloud model method is used to implement the evaluation process. …”
Get full text
Article -
1369
V2X offloading and resource allocation under SDN and MEC architecture
Published 2020-01-01“…To address the serious problem of delay and energy consumption increase and service quality degradation caused by complex network status and huge amounts of computing data in the scenario of vehicle-to-everything (V2X),a vehicular network architecture combining mobile edge computing (MEC) and software defined network (SDN) was constructed.MEC sinks cloud serviced to the edge of the wireless network to compensate for the delay fluctuation caused by remote cloud computing.The SDN controller could sense network information from a global perspective,flexibly schedule resources,and control offload traffic.To further reduce the system overhead,a joint task offloading and resource allocation scheme was proposed.By modeling the MEC-based V2X offloading and resource allocation,the optimal offloading decision,communication and computing resource allocation scheme were derived.Considering the NP-hard attribute of the problem,Agglomerative Clustering was used to select the initial offloading node,and Q-learning was used for resource allocation.The offloading decision was modeled as an exact potential game,and the existence of Nash equilibrium was proved by the potential function structure.The simulation results show that,as compared to other mechanisms,the proposed mechanism can effectively reduce the system overhead.…”
Get full text
Article -
1370
Research on the Influence of Rotational Speed on the Noise of V-ribbed Belt Three-wheel Drive System
Published 2021-10-01“…In order to study the influence of speed on the noise level of the V-ribbed belt three-wheel drive system,taking the 6PK V-ribbed belt as an example,a noise test device for the three-wheel drive system of the V-ribbed belt is built based on the acoustic array principle,and the time-domain signal and noise sound pressure distribution cloud diagram of the sound pressure in the transmission system of three wheels at different speeds are obtained. …”
Get full text
Article -
1371
Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading
Published 2025-01-01“…The robots, due to limited onboard computation resources, need to offload some complex computing tasks to an edge/cloud server, requiring artificial intelligence and high computation loads. …”
Get full text
Article -
1372
New Similarity of Triangular Fuzzy Number and Its Application
Published 2014-01-01“…A collaborative filtering case is used to illustrate users’ similarity based on cloud model and triangular fuzzy number; the result indicates that users’ similarity based on triangular fuzzy number can obtain better discrimination. …”
Get full text
Article -
1373
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01“…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
Get full text
Article -
1374
Can pollen affect precipitation?
Published 2025-01-01“…On one hand, due to their large size (10–100 <span class="inline-formula">µ</span>m), pollen can act as giant cloud condensation nuclei and enhance the collision–coalescence process in clouds that leads to drizzle formation. …”
Get full text
Article -
1375
-
1376
-
1377
Road Adhesion Coefficient Estimation Based on Vehicle-Road Coordination and Deep Learning
Published 2023-01-01“…Firstly, a vehicle-based data feedback system combined with a vehicle-road network cloud is introduced, and CarSim simulation is used to expand the data set and train the model effectively. …”
Get full text
Article -
1378
A fair multi-resource allocation mechanism for time-varying discrete jobs with placement constraints
Published 2024-12-01“…A key issue in resource sharing in cloud computing is how to fairly and efficiently allocate the multi-resources to users with dynamic demand. …”
Get full text
Article -
1379
Numerical Simulation and Analysis of Diffusion Process for the Leakages of a Tunnel LNG Pipeline
Published 2020-01-01“…From the simulation results, the variation of CH4 concentration field and explosive gas cloud with time within the tunnel, and the influence of leakage location on the diffusion was analyzed for the three cases. …”
Get full text
Article -
1380
Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
Published 2025-01-01“…In recent years, Trusted Execution Environment (TEE) has emerged as a promising technology for securing cloud data storage and cloud processing, demonstrating significant potential for ensuring data and application confidentiality in more scenarios. …”
Get full text
Article