Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1501
Research and Application of Mobile OA Technology in Power Generation Enterprise
Published 2013-11-01“…As the rapid development of mobile Internet and cloud computing technology, enterprise mobile OA needs bred. …”
Get full text
Article -
1502
Assessment Architecture of SaaS System Based on Characteristics of System of Systems
Published 2013-12-01“…With the development of internet of things, cloud computing and software as a service as well as other new technologies, the distributed software system is becoming more and more complex because of interconnection and interoperability. …”
Get full text
Article -
1503
Study on the Structured Processing of Unstructured Personalized Customer Requirement for Mass Customization
Published 2013-12-01“…Finally the validity of the method was verified by an example and the method can be helpful to provide personalized cloud service.…”
Get full text
Article -
1504
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01“…Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the concepts of cyberspace security were advanced,and the definition was given.Then,a hierarchy model of cyberspace security was proposed.Based on the model,the details technologies of eight research fields of cyberspace security including information security,information secrecy,information coun-termeasure,cloud security,big data,IOT security,mobile security,and trustable computing were presented.New guidance and experience for the research in cyberspace security could be taken as.…”
Get full text
Article -
1505
Enhanced-mobile ubiquitous smart environment——the super state of Internet of things
Published 2018-03-01“…Enhanced-mobile ubiquitous smart environment (E-MUSE) was proposed as the super state of Internet of things (IoT),which was also the evolution of mobile ubiquitous service environment (MUSE) in the epoch of IoT.E-MUSE is a mobile,ubiquitous and intelligent information environment that runs on 5G ubiquitous network and takes 5G technology as the core.The physical structure and connotation framework of E-MUSE were defined.Around IoT,cloud-fog-edge computing,artificial intelligence,etc.…”
Get full text
Article -
1506
Discussion on the common sense of the Internet of things
Published 2020-12-01“…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
Get full text
Article -
1507
Multi-authority attribute-based encryption with efficient revocation
Published 2017-03-01“…Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups,and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition,the proposed scheme supports large universe and any monotone access structures,which makes it more flexible for practical applications.…”
Get full text
Article -
1508
Review of deterministic networking technology
Published 2023-11-01“…Deterministic networking was proposed to meet the demands of high bandwidth, low delay and high reliability for audio and video, industrial control, power protection and other applications.With the development of new services such as virtual/augmented reality and cloud games, the application scenarios of deterministic networking have been enriched, and the scope of deterministic networking technology has also been extended.In view of the overall consideration of current application scenarios, technical standards and industrial development, the strong and weak deterministic requirements and characteristics for different scenarios were analyzed, as well as different kinds of deterministic networking technologies, including scientific and engineering.The diversified development path of deterministic networking was proposed and the development of combination technologies of deterministic networking for 6G and computing force network was looked forward.…”
Get full text
Article -
1509
Tributary
Published 2023-05-01“…These include cryptocurrency mining, cloud storage, digital image production and media streaming. …”
Get full text
Article -
1510
A Distributed K-Means Segmentation Algorithm Applied to Lobesia botrana Recognition
Published 2017-01-01“…Our image capture application is currently implemented in a mobile application and subsequent segmentation processing is done in the cloud.…”
Get full text
Article -
1511
End-to-end deterministic networking architecture and key technologies
Published 2021-09-01“…New services such as remote control and cloud AR/VR, have put forward higher bandwidth and latency requirements than traditional network.6G-oriented network evolution needs end-to-end deterministic networking technology support.In view of the lack of global consideration of end-to-end latency guarantee in current technical standard research, it was pointed out that deterministic networking needs to solve the problem of single hop and global latency at the same time.An end-to-end deterministic networking architecture was built, as well as deterministic networking technical schemes across networking domain and protocol layer was proposed.Finally, according to the current difficulties of deterministic networking development, the corresponding promotion suggestions were put forward.…”
Get full text
Article -
1512
Comprehensive Review on Modelling, Estimation, and Types of Faults in Solar Photovoltaic System
Published 2022-01-01Get full text
Article -
1513
Model of runtime memory leak detection based on the virtual machine introspection
Published 2013-08-01“…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. …”
Get full text
Article -
1514
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
1515
Seasonal and Regional Variability of Long-Wave Effective Radiation in China and Associated Modulating Factors
Published 2020-01-01“…However, there are higher negative correlations with middle and high clouds in regions 1 and 2, which are modulated by cloud characteristics. …”
Get full text
Article -
1516
mmPrivPose3D: A dataset for pose estimation and gesture command recognition in human-robot collaboration using frequency modulated continuous wave 60Hhz RaDARMendeley Data
Published 2025-04-01“…In contrast, using RaDAR sensors offers a privacy-preserving alternative, as they can output point-cloud data rather than images. We introduce mmPrivPose3D, a dataset of 3D RaDAR point-cloud data that captures human movements and gestures using a single IWR6843AOPEVM RaDAR sensor with a frequency of 10 Hz synchronized with 19 corresponding 3D skeleton keypoints as the ground truth. …”
Get full text
Article -
1517
AI augmented edge and fog computing for Internet of Health Things (IoHT)
Published 2025-01-01“…The primary limitation of these cloud frameworks right now is their limited scalability, which results in their inability to meet needs. …”
Get full text
Article -
1518
The Contemporary Critical Reception of Walter Pater: Retrospective and Proleptical Views
Published 2008-12-01“…While it is true that he was still somewhat under a cloud in the early 1970s, that cloud has dissipated. …”
Get full text
Article -
1519
Investigation of the Ternary System, Water/Hydrochloric Acid/Polyamide 66, for the Production of Polymeric Membranes by Phase Inversion
Published 2025-01-01“…Swelling measurements determined the polymer/non-solvent interaction parameter (<i>χ</i><sub>13</sub>) for H<sub>2</sub>O/PA66 and the solvent/polymer interaction parameter (<i>χ</i><sub>23</sub>) for PA66/FA and PA66/HCℓ. The theoretical cloud point curve was calculated based on “Boom’s LCP Correlation” and compared to the curve of the experimental cloud point. …”
Get full text
Article -
1520
Automation of urban technological census. The historical centre of Bethlehem
Published 2022-12-01“…The model lifecycle management, from training to prediction and deployment, as well as the storage of both image data and metadata, is performed through the scalability of a Cloud enterprise architecture. Periodical scheduled monitoring enables comparisons across different periods, allowing the detection of modifications, removals, and additions, therefore identifying the insurgence of potential criticalities. …”
Get full text
Article