Showing 1,521 - 1,540 results of 2,372 for search '"cloud"', query time: 0.05s Refine Results
  1. 1521

    Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG

    Published 2017-01-01
    “…With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic. …”
    Get full text
    Article
  2. 1522

    Kinematics and Workspace Analysis of an 8-DOF Space Manipulator by Kai Yang, Jinying Huang

    Published 2021-03-01
    “…Monte Carlo method is used to solve the workspace of the manipulator, and the point cloud of the workspace of the end effector of the manipulator is drawn. …”
    Get full text
    Article
  3. 1523

    Data center networks with performance guarantee: a survey by Kaihui GAO, Dan LI

    Published 2023-06-01
    “…As an important information infrastructure, data center network (DCN) supports numerous distributed applications, such as artificial intelligence training and cloud storage.These applications require the transmission of large amounts of data, and as a result, the demand for performance stability of DCN has been increasing.The performance guarantee of DCN has gained widespread attention from both academia and industry in recent years.Firstly, the main challenges of implementing performance guarantees in DCN were analyzed, and the research directions to improve performance stability were proposed.Secondly, three essential capabilities for a performance-guaranteed DCN were summarized, such as high availability, bandwidth guarantee, and bounded latency.The comparative analysis of the relevant research was provided from multiple perspectives.In the end, the future development trend of the research on the performance guarantee of DCN was looked forward to.…”
    Get full text
    Article
  4. 1524

    Verifiable outsourced attribute-based encryption with access update by Suqing LIN

    Published 2019-02-01
    “…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
    Get full text
    Article
  5. 1525

    Development Status and Trends of Space Processor by Zhigang YU, Xu FENG, Zhou LU, Jixing GAO, Wenhui DING

    Published 2023-03-01
    “…Space electronic system is the "brain" of aerospace engineering models and the core fi eld of competitive development of major countries around the world.As the most core device in space electronic system, space processor directly aff ects the performance, reliability and safety of aerospace models.On the basis of brief introduced of space electronic systems, fi rstly, the development status of foreign space processors was analyzed, and then the development roadmap of space processors such as SPARC, PowerPC, ARM, RISC V, etc were combed and formed.The development process was summarized into three stages:initial stage, development stage and new stage, considered architecture and performance parameters.Finally, the development trend of space processors in the future was summarized as "fi ve modernizations": micro system, commercialization, intelligent, ecological and cloud enabled.…”
    Get full text
    Article
  6. 1526

    Modeling and Dynamics Characteristic Analysis of Helical Gear System with Considering Tooth Surface Friction by Kang Boqiang, Gou Xiangfeng

    Published 2015-01-01
    “…The bifurcation diagrams,Lyapunov exponents,cloud pictures of the maximum amplitude and the amplitude- frequency characteristic superposition graphs are obtained and the system dynamics characteristic variation with frequency is analyzed. …”
    Get full text
    Article
  7. 1527

    Sugarcane Orange Rust by Philippe Rott, Sushma Sood, Jack C. Comstock, Richard N. Raid, N. C. Glynn, Robert A. Gilbert, Hardev S. Sandhu

    Published 2014-10-01
    “…It is hypothesized that rust spores were blown into the region as a disperse spore cloud from an unknown source rather than spread from a single or several small focal points. …”
    Get full text
    Article
  8. 1528

    Privacy protection scheme of DBSCAN clustering based on homomorphic encryption by Chunfu JIA, Ruiqi LI, Yafei WANG

    Published 2021-02-01
    “…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
    Get full text
    Article
  9. 1529

    Bridge monitoring system based on Internet of things technology by Zheng LI, Sheng ZHANG, Luyu ZHANG, Yang ZHANG

    Published 2018-09-01
    “…The Internet of everything is the trend of today’s smart cities.With the rapid development of Internet of things technology,a good opportunity is provided to obtain real-time status information on important infrastructures.Aiming at the problem such as low monitoring efficiency,poor flexibility and rigorous testing results with traditional artificial bridge monitoring methods a bridge monitoring system based on the Internet of things technology was designed.A variety of sensors and cameras were used in the system to collect the data of bridge’s dynamic status in real-time,and the wireless multi-hop network was used to transfer the perception data to the bridge health monitoring cloud platform for further processing and analysis.Real-time monitoring,early warning,analysis and assessment of bridge safety conditions could be realized by the system,and is very important to the bridge safety engineering.…”
    Get full text
    Article
  10. 1530

    Electricity internet of things based on LPWAN technology by Yongbo CHEN, Yi TANG, Xinwei AI, Bo XU

    Published 2017-05-01
    “…Based on the low power consumption wide area network (LPWAN) technology,operation-level cloud-side integration of energy and power of the internet of things program was achieved using the existing power communica-tion network to realize the data back-to-back.It realized the integration of electric power communication network and LPWAN internet of things technology,provided a wide range of mass “small data” connection for the energy of the in-ternet.It had advantages of low-cost,personalized and flexible.It could meet the connection needs of four-in-one,the source network load interaction,temperature monitoring of electrical equipment and power distribution fault indicator.It could also achieve massive small data connection needs of power plants,substations,electric transport infrastructure,distributed generation operation and maintenance,environmental monitoring energy internet business and so on.…”
    Get full text
    Article
  11. 1531

    Analysis and modeling of Internet backbone traffic with 5G/B5G by Yuan YANG, Mingwei XU, Hao CHEN

    Published 2019-08-01
    “…The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.…”
    Get full text
    Article
  12. 1532

    Optimizing strategy of computing off loading energy consumption based on Lagrangian method by Guangxue YUE, Youkang ZHU, Jiansheng LIU, Yasheng DAI, Zhenxu YOU, Hao XU

    Published 2018-12-01
    “…With the development of mobile network technology and the popularization and application of intelligent terminals,mobile edge computing has become an important application of cloud computing.Computing offloading strategy has become one of the key issues in mobile edge computing services.Targeting the total computing time of the mobile terminal and minimizing the energy consumption of the mobile terminal,the computation offloading resource allocation problem of the mobile terminal was modeled as a convex optimization problem,solved by the Lagrange multiplier method,and a threshold-based offloading was proposed.Simulation experiments show that the proposed offloading optimization strategy model can effectively balance the relationship between local computing and offloading,and provide guarantee for executing computation-intensive applications in mobile edge computing.…”
    Get full text
    Article
  13. 1533
  14. 1534

    Key technology and validation of roadside sensing system for vehicle-road cooperation by BAO Xuyan, GONG Zheng, LI Boxiong, YU Bingyan

    Published 2024-12-01
    “…Vehicular-road collaborative roadside sensing systems are a crucial part of developing “integrated vehicular-road-cloud systems” and implementing the digital transformation and upgrading of transportation infrastructure. …”
    Get full text
    Article
  15. 1535

    Application of Computer-aided Rehabilitation by Zhuoming CHEN

    Published 2019-08-01
    “…With the rapid development of computer computing technology, big data, artificial intelligence and cloud computing, the application of computer in the field of rehabilitation medicine is more and more extensive. …”
    Get full text
    Article
  16. 1536

    Research on dynamic migration of virtual machine based on security level by Shuo ZHAO, Xin-sheng JI, Yu-xing MAO, Guo-zhen CHENG, Hong-chao HU

    Published 2017-07-01
    “…Side-channel attacks were the main ways of multi-tenant information leakage in the cloud computing and data center environments.The existing defense approaches based on dynamic migration of virtual machine have long convergence time of migration algorithm and high migration cost.Hence,a dynamic migration of virtual machine based on security level was proposed.Firstly,security level classification of virtual machines was used to reduce the number of migrating virtual machines.Then the corresponding virtual machines embedding strategy was used to reduce the frequency of virtual machines migration.Simulation experiments demonstrate that the proposed approach can reduce convergence time of migration algorithm and migration cost.…”
    Get full text
    Article
  17. 1537

    An algorithm for embedding oversubscribed virtual data center by Chukun LU, Fangfang YAN, Dong LI

    Published 2017-07-01
    “…Predictable network performance is critical for cloud applications and can be achieved by providing tenants a dedicated virtual data center (VDC) with bandwidth guarantee.The embedding problem of oversubscribed data center in physical data center network was studied.Compared with the general virtual data center,the traffic pattern between the virtual machines in the over-subscription virtual data was more complicated.Therefore,the flow model and the embedding problem were described.A heuristic algorithm with lower time complexity was proposed for the embedding problem of virtual machine-packet perturbation algorithm.Finally,the simulation algorithm was used to compare the packet perturbation algorithm with the algorithm proposed in the previous work and the famous first-fit.The experiment result shows that the proposed algorithm improves the embedding success rate while reducing the complexity of the algorithm.…”
    Get full text
    Article
  18. 1538
  19. 1539

    Regular Detection and Intelligent Monitoring Technology of Atmospheric Storage Tank Based on Acoustic Emission and Internet of Things by Jiehui Xie, Xueying Lu

    Published 2025-02-01
    “…Through the integration of intelligent acoustic wave (acoustic emission) collector, networking communication, cloud platform/server and customer terminal, the long-term online monitoring of storage tanks is realized, the detection efficiency and accuracy are improved, and the manual intervention and maintenance costs are reduced. …”
    Get full text
    Article
  20. 1540

    Efficient certificateless searchable encryption scheme with verifiability by Xinhua CUI, Youliang TIAN, Qijia ZHANG

    Published 2023-08-01
    “…Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.…”
    Get full text
    Article