Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1381
ANTHROPOMETRIC MEASUREMENT BASED ON STRUCTURE FROM MOTION IMAGING TECHNIQUE
Published 2016-12-01“…With use of VisualSFM software a virtual cloud of points representing real points of examined object was calculated. …”
Get full text
Article -
1382
Research on heterogeneous data fusion and arithmetic optimization in multi-sensor systems
Published 2024-12-01“…Secondly, a three-layer "cloud-edge-end" architecture was implemented, leveraging edge servers to offload computational pressure from cloud servers, optimizing task scheduling strategies, and enabling coordinated management of network and computing resources. …”
Get full text
Article -
1383
Classification of Iranian weather types based on Woś method
Published 2025-06-01“…The findings indicated that the predominant temperature types in the country are primarily categorized as hot and very hot, with sub-codes reflecting generally low to moderate cloud cover and negligible precipitation. Furthermore, the application of Ward's clustering method facilitated the identification of three distinct climatic groups. …”
Get full text
Article -
1384
Satellite In-Orbit Secondary Collision Risk Assessment
Published 2022-01-01“…A modified spacecraft impact disintegration model then is used to calculate the collision results and estimate the collision threat level of the short-term debris cloud formed by the Starlink satellite after its destruction to satellites in the same orbit. …”
Get full text
Article -
1385
Explosion pressure of industrial titanium powder and its suppression characteristics by explosion suppressants SiO2, K2CO3, and NaHCO3
Published 2024-12-01“…The research results show that the mass concentration of powder clouds and ignition delay time have a great impact on the explosion pressure of titanium powder. …”
Get full text
Article -
1386
Selection and Ranking of Fog Computing-Based IoT for Monitoring of Health Using the Analytic Network Approach
Published 2021-01-01“…FC progresses the prototype of cloud computing to network edge leading various possibilities and services. …”
Get full text
Article -
1387
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Cloud storage has been recognized as the popular solution to solve the problems of the rising storage costs of IT enterprises for users. …”
Get full text
Article -
1388
Analysis on the Prewarning Distance of Expressway Traffic Based on Lane-Selection Cell Transmission Model
Published 2023-01-01Get full text
Article -
1389
Quantum anonymous one-vote veto protocol based on BB84 states
Published 2022-08-01“…., secure multiparty disjunction.Furthermore, by introducing a quantum cloud, a quantum secure multiparty disjunction (QSMD) protocol was proposed.BB84 states were took as quantum resources and only single-photon operations and measurements were needed.To avoid the flaws of infeasibility, i.e., most of existing quantum voting protocols need to perform operations and measurements in high-dimensional Hilbert space, a quantum anonymous one-vote veto protocol with a quantum cloud (QAOVC) was designed by using the QSMD protocol.In addition, to decentralize, a quantum anonymous one-vote veto (QAOV) protocol without any third party was presented.Compared with related protocols, the proposed protocols require less quantum resources and simpler operations, so they have better feasibility.Under the semi-honest model, quantum perfect encryption and classical one-time pad can ensure the unconditional security of the proposed protocols, i.e., it can completely meet secure requirements of one-vote veto and perfectly protect the privacy of the voters.Finally, simulation experiments are implemented on IBM Qiskit, and the experimental results show that the protocols are correct and feasible.…”
Get full text
Article -
1390
Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things
Published 2024-01-01“…To begin, we offer an IoT data encryption strategy in which edge devices can send data to a nearby cloud network for data processing while maintaining privacy. …”
Get full text
Article -
1391
Analysis of Bulk Queueing Model with Load Balancing and Vacation
Published 2024-12-01“…In this paper, we incorporated the load-balancing technique used in cloud computing with power business intelligence (BI) and cloud load based on the queueing theoretic approach. …”
Get full text
Article -
1392
Penerapan Mekanisme Continuous Deployment dalam Pengembangan dan Pembaruan Perangkat Lunak Sistem Benam Berbasis Internet of Things
Published 2022-06-01“…Dari permasalahan tersebut, maka dibuatlah penelitian ini mengenai pembaruan software pada perangkat IoT menggunakan continuous deployment yang dilakukan di cloud. Continuous deployment adalah proses penyebaran berkelanjutan pada software yang memanfaatkan proses otomatisasi yang dilakukan dari awal hingga akhir berjalan secara otomatis tanpa adanya campur tangan manusia. …”
Get full text
Article -
1393
A Study on the Dynamic Transmission Law of Spiral Drum Cutting Coal Rock Based on ANSYS/LS-DYNA Simulation
Published 2019-01-01“…Based on the dynamic analysis of the coal and rock that were cut by the spiral drum, the stress cloud diagram of the coupled model of the spiral drum and the coal and the plastic domain evolution law of the coal and the rock were obtained from the coal to the rock. …”
Get full text
Article -
1394
Model Test and Numerical Simulation Analysis on Freezing Effect of Different Freezers in Freeze-Sealing Pipe-Roof Method
Published 2022-01-01“…The numerical simulation results indicate that the temperature cloud diagram of SCF at 42 h is butterfly-shaped after opening the limit pipes, and the temperature cloud diagrams of ESF and EDCF are the same as the model test results. …”
Get full text
Article -
1395
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Published 2015-01-01“…Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. …”
Get full text
Article -
1396
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
Published 2025-01-01“…The advent of 6G networks and beyond calls for innovative paradigms to address the stringent demands of emerging applications, such as extended reality and autonomous vehicles, as well as technological frameworks like digital twin networks. Traditional cloud computing and edge computing architectures fall short in providing their required flexibility, scalability, and ultra-low latency. …”
Get full text
Article -
1397
A feature extraction method for hydrofoil attached cavitation based on deep learning image semantic segmentation algorithm
Published 2025-02-01“…This method is employed to investigate the mechanism of the transition process from sheet cavitation to cloud cavitation on hydrofoils. The accuracy and generalization ability of the proposed method have been validated. …”
Get full text
Article -
1398
Reduction of Pacific Double‐ITCZ Bias by Convection Parameterization in NCAR CESM2.2
Published 2025-01-01“…The modified convective closure improves the low‐level cloud and shortwave cloud radiative forcing in the southeastern Pacific. …”
Get full text
Article -
1399
TSMC: A Novel Approach for Live Virtual Machine Migration
Published 2014-01-01“…Cloud computing attracted more and more attention in recent years, and virtualization technology is the key point for deploying infrastructure services in cloud environment. …”
Get full text
Article -
1400
An IoT and Machine Learning-Based Model to Monitor Perishable Food towards Improving Food Safety and Quality
Published 2022-01-01“…Pictures are recorded using high-resolution cameras in this suggested architecture, and then these images are sent to a cloud server using Internet of Things devices. When uploaded to a cloud server, these photos are segmented using the K-means clustering method. …”
Get full text
Article