Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1521
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic. …”
Get full text
Article -
1522
Kinematics and Workspace Analysis of an 8-DOF Space Manipulator
Published 2021-03-01“…Monte Carlo method is used to solve the workspace of the manipulator, and the point cloud of the workspace of the end effector of the manipulator is drawn. …”
Get full text
Article -
1523
Data center networks with performance guarantee: a survey
Published 2023-06-01“…As an important information infrastructure, data center network (DCN) supports numerous distributed applications, such as artificial intelligence training and cloud storage.These applications require the transmission of large amounts of data, and as a result, the demand for performance stability of DCN has been increasing.The performance guarantee of DCN has gained widespread attention from both academia and industry in recent years.Firstly, the main challenges of implementing performance guarantees in DCN were analyzed, and the research directions to improve performance stability were proposed.Secondly, three essential capabilities for a performance-guaranteed DCN were summarized, such as high availability, bandwidth guarantee, and bounded latency.The comparative analysis of the relevant research was provided from multiple perspectives.In the end, the future development trend of the research on the performance guarantee of DCN was looked forward to.…”
Get full text
Article -
1524
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
Get full text
Article -
1525
Development Status and Trends of Space Processor
Published 2023-03-01“…Space electronic system is the "brain" of aerospace engineering models and the core fi eld of competitive development of major countries around the world.As the most core device in space electronic system, space processor directly aff ects the performance, reliability and safety of aerospace models.On the basis of brief introduced of space electronic systems, fi rstly, the development status of foreign space processors was analyzed, and then the development roadmap of space processors such as SPARC, PowerPC, ARM, RISC V, etc were combed and formed.The development process was summarized into three stages:initial stage, development stage and new stage, considered architecture and performance parameters.Finally, the development trend of space processors in the future was summarized as "fi ve modernizations": micro system, commercialization, intelligent, ecological and cloud enabled.…”
Get full text
Article -
1526
Modeling and Dynamics Characteristic Analysis of Helical Gear System with Considering Tooth Surface Friction
Published 2015-01-01“…The bifurcation diagrams,Lyapunov exponents,cloud pictures of the maximum amplitude and the amplitude- frequency characteristic superposition graphs are obtained and the system dynamics characteristic variation with frequency is analyzed. …”
Get full text
Article -
1527
Sugarcane Orange Rust
Published 2014-10-01“…It is hypothesized that rust spores were blown into the region as a disperse spore cloud from an unknown source rather than spread from a single or several small focal points. …”
Get full text
Article -
1528
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
1529
Bridge monitoring system based on Internet of things technology
Published 2018-09-01“…The Internet of everything is the trend of today’s smart cities.With the rapid development of Internet of things technology,a good opportunity is provided to obtain real-time status information on important infrastructures.Aiming at the problem such as low monitoring efficiency,poor flexibility and rigorous testing results with traditional artificial bridge monitoring methods a bridge monitoring system based on the Internet of things technology was designed.A variety of sensors and cameras were used in the system to collect the data of bridge’s dynamic status in real-time,and the wireless multi-hop network was used to transfer the perception data to the bridge health monitoring cloud platform for further processing and analysis.Real-time monitoring,early warning,analysis and assessment of bridge safety conditions could be realized by the system,and is very important to the bridge safety engineering.…”
Get full text
Article -
1530
Electricity internet of things based on LPWAN technology
Published 2017-05-01“…Based on the low power consumption wide area network (LPWAN) technology,operation-level cloud-side integration of energy and power of the internet of things program was achieved using the existing power communica-tion network to realize the data back-to-back.It realized the integration of electric power communication network and LPWAN internet of things technology,provided a wide range of mass “small data” connection for the energy of the in-ternet.It had advantages of low-cost,personalized and flexible.It could meet the connection needs of four-in-one,the source network load interaction,temperature monitoring of electrical equipment and power distribution fault indicator.It could also achieve massive small data connection needs of power plants,substations,electric transport infrastructure,distributed generation operation and maintenance,environmental monitoring energy internet business and so on.…”
Get full text
Article -
1531
Analysis and modeling of Internet backbone traffic with 5G/B5G
Published 2019-08-01“…The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.…”
Get full text
Article -
1532
Optimizing strategy of computing off loading energy consumption based on Lagrangian method
Published 2018-12-01“…With the development of mobile network technology and the popularization and application of intelligent terminals,mobile edge computing has become an important application of cloud computing.Computing offloading strategy has become one of the key issues in mobile edge computing services.Targeting the total computing time of the mobile terminal and minimizing the energy consumption of the mobile terminal,the computation offloading resource allocation problem of the mobile terminal was modeled as a convex optimization problem,solved by the Lagrange multiplier method,and a threshold-based offloading was proposed.Simulation experiments show that the proposed offloading optimization strategy model can effectively balance the relationship between local computing and offloading,and provide guarantee for executing computation-intensive applications in mobile edge computing.…”
Get full text
Article -
1533
Stabilization of a Class of Complex Chaotic Systems by the Dynamic Feedback Control
Published 2020-01-01Get full text
Article -
1534
Key technology and validation of roadside sensing system for vehicle-road cooperation
Published 2024-12-01“…Vehicular-road collaborative roadside sensing systems are a crucial part of developing “integrated vehicular-road-cloud systems” and implementing the digital transformation and upgrading of transportation infrastructure. …”
Get full text
Article -
1535
Application of Computer-aided Rehabilitation
Published 2019-08-01“…With the rapid development of computer computing technology, big data, artificial intelligence and cloud computing, the application of computer in the field of rehabilitation medicine is more and more extensive. …”
Get full text
Article -
1536
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01“…Side-channel attacks were the main ways of multi-tenant information leakage in the cloud computing and data center environments.The existing defense approaches based on dynamic migration of virtual machine have long convergence time of migration algorithm and high migration cost.Hence,a dynamic migration of virtual machine based on security level was proposed.Firstly,security level classification of virtual machines was used to reduce the number of migrating virtual machines.Then the corresponding virtual machines embedding strategy was used to reduce the frequency of virtual machines migration.Simulation experiments demonstrate that the proposed approach can reduce convergence time of migration algorithm and migration cost.…”
Get full text
Article -
1537
An algorithm for embedding oversubscribed virtual data center
Published 2017-07-01“…Predictable network performance is critical for cloud applications and can be achieved by providing tenants a dedicated virtual data center (VDC) with bandwidth guarantee.The embedding problem of oversubscribed data center in physical data center network was studied.Compared with the general virtual data center,the traffic pattern between the virtual machines in the over-subscription virtual data was more complicated.Therefore,the flow model and the embedding problem were described.A heuristic algorithm with lower time complexity was proposed for the embedding problem of virtual machine-packet perturbation algorithm.Finally,the simulation algorithm was used to compare the packet perturbation algorithm with the algorithm proposed in the previous work and the famous first-fit.The experiment result shows that the proposed algorithm improves the embedding success rate while reducing the complexity of the algorithm.…”
Get full text
Article -
1538
Corrigendum: Abnormal respiratory sounds classification using deep CNN through artificial noise addition
Published 2025-01-01Get full text
Article -
1539
Regular Detection and Intelligent Monitoring Technology of Atmospheric Storage Tank Based on Acoustic Emission and Internet of Things
Published 2025-02-01“…Through the integration of intelligent acoustic wave (acoustic emission) collector, networking communication, cloud platform/server and customer terminal, the long-term online monitoring of storage tanks is realized, the detection efficiency and accuracy are improved, and the manual intervention and maintenance costs are reduced. …”
Get full text
Article -
1540
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01“…Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.…”
Get full text
Article