Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1541
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
1542
Development trends of the information technology and cyberspace security
Published 2015-12-01“…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
Get full text
Article -
1543
Kinematics and Workspace Analysis for Articulated Arm Coordinate Measuring Machine
Published 2015-01-01“…The kinematics and workspace for articulated arm coordinate measuring machine(AACMM)is the basis for structure optimization and precision analysis.First,the kinematics theory model of AACMM is established by using D-H method and tri-dimension kinematics simulation is implemented based on the secondary development of SolidWorks to verify whether the kinematics model is correct.Then the AACMM workspace is analyzed and simulated by Monte Carlo method and the cloud picture is obtained.Finally,the volume of workspace is calculated more accurately by the stratifying method and boundary extension,a basis for the parameter optimization is provided.The simulation results show sthat the workspace of AACMM is distributed uniformly and no cavity and it meets the measurement requirement.…”
Get full text
Article -
1544
3D Modeling and Simulation Analysis of Cylindrical Indexing Cam based on CATIA
Published 2015-01-01“…Through the analysis of the cylindrical indexing cam working surface equations and parameters,combined the macro procedure of the CATIA secondary development,macro procedure of cam surface equations is written.The point coordinate of indexing period and rest period cam surface can be generated accurately and quickly by operating the macro.The cam curve and contour surface is generated through using the cloud shape and scanning function,thus the cam solid model can be generated.The motion simulation analysis of cam mechanism motion is carried out in CATIA.The evaluation of the established cam curve and contour surface is carried out,the precision cam curve and contour surface are obtained.…”
Get full text
Article -
1545
Silicon-Based-Chip Multiplexing Technologies and Devices
Published 2015-10-01“…As the demands of the data communications increase quickly for the applications of cloud-computing as well as data centers,optical interconnects have been very attractive because of the unique advantages on the aspects of low power consumption,high speed and large bandwidth.It is effective to enhance the link capacity by utilizing multiplexing technologies like wavelength-division-multiplexing(WDM),polarization-division-multiplexing(PDM),as well as mode-division-multiplexing(MDM).It will become very useful when these multiplexing technologies are combined to work together as a hybrid multiplexing technology.Definitely the multiplexer is one of the most important devices for a multiplexed optical interconnect link.A review for the recent progress of ultracompact on-chip multiplexers was given,including WDM devices,PDM devices,MDM devices,and hybrid multiplexers.…”
Get full text
Article -
1546
Streaming Science #2: Using Webcast Electronic Field Trips for Engagement with Your Target Audience
Published 2022-04-01“…This new 6-page article focuses on how to use mobile hardware and cloud-based software for streaming live webcast electronic field trips (EFTs). …”
Get full text
Article -
1547
Pairing-free equality test over short ciphertexts
Published 2017-06-01“…It has been used in many fields, especially in cloud storage. However, the previous schemes do not provide an effective authorization mechanism. …”
Get full text
Article -
1548
Identity-based fully homomorphic encryption from learning with error problem
Published 2014-02-01“…The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of such schemes in the key and identity management. …”
Get full text
Article -
1549
Persistent Oxygen Requirement beyond Prematurity: A Case of Acquired Pulmonary Vein Stenosis
Published 2017-01-01“…Comorbid conditions can cloud this diagnosis further. Prognosis is poor for most patients. …”
Get full text
Article -
1550
Analysis of value-added services of power communication network in energy internet
Published 2019-06-01“…The value-added services of power communication networks in the energy internet were introduced.5G,4K/8K ultra high definition video,business that cloud drive all-optical network construction were analyzed.How the power company uses its resource advantages to expand energy internet value-added services and their business models were analyzed,including infrastructure resource leasing,backbone line business leased line,FTTH wholesale and telecommunication business,data center leasing,etc.Based on ubiquitous electric internet of things,power company that could combine big data and artificial intelligence to expand more value-added services was forcasted.…”
Get full text
Article -
1551
Realization of vOLT and development trend
Published 2018-07-01“…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
Get full text
Article -
1552
Intelligent collaborative management technology of virtual resources based on internet of vehicles remote driving
Published 2020-04-01“…Starting from the application scenario of internet of vehicles remote driving,the specific requirements of remote driving for network communication were analyzed.The technical analysis scheme was put forward systematically.First of all,mobile edge computing technology was introduced on the terminal side to provide,low latency,large bandwidth and high reliability edge computing services.Secondly,virtual resource cooperative scheduling and intelligent fault prediction technology were analyzed on the network side,to complete the global management of network resources for remote driving.Finally,the related technologies of the intelligent vehicle integrated control service and SDN cloud control center were analyzed on the platform side,so that the intelligent application of remote driving vehicle was realized.…”
Get full text
Article -
1553
Design of Continuously Variable Transmission Sprocket Wheel
Published 2020-02-01“…Finally, the scheme is simulated and the stress cloud diagram is obtained. The simulation results verify the feasibility of the scheme.…”
Get full text
Article -
1554
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01“…In a searchable encryption scheme,whether it is a cloud server or a user,it may be deceptive.In order to solve the security problem,the definition of fairness security was given and a new searchable encryption scheme based on blockchain was proposed.Through the third-party trusted authority to verify the consistency of data during data transmission,the complete verification results were recorded on the blockchain to prevent tampering,and it could make all the related entities to reach the consistent security consensus and achieve the fairness security.The security and complexity analysis show that the proposed searchable encryption scheme was feasible.If it is combined with a searchable encryption scheme with its searched results verifiable,the proposed scheme can be effectively improved to be a blockchain-based searchable encryption scheme with its searched results verifiable and its security will be more strengthened.…”
Get full text
Article -
1555
Outsourced attribute-based encryption with policy update
Published 2016-05-01“…In order to achieve the efficient and flexible access control for the encrypted data stored in the cloud,an outsourced attribute-based encryption scheme with policy update was proposed.Based on the standard attribute-based encryption scheme,the functionality of policy update from delegation for a ciphertext without revealing any confidential information of the plaintext and private keys by utilizing the techniques of key blinding and outsourcing decryption was accomplished.Simultaneously,the decryption overhead for a user to recover the plaintext was effectively reduced.The scheme supports non-monotonic access structure and can be proved to have selective IND-CPA security and private key security under standard assumptions,respectively,in the standard model.Compared with similar schemes from literatures,the scheme provides better security and efficiency.…”
Get full text
Article -
1556
Research development and forecast of automatic speech recognition technologies
Published 2018-02-01“…The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.…”
Get full text
Article -
1557
Security test of 101 protocol of FTU
Published 2018-10-01“…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
Get full text
Article -
1558
SIMULATION AND STRUCTURAL IMPROVEMENT DESIGN OF GEAR SYSTEM OF SHIFT ACTUATOR
Published 2022-01-01“…The stress distribution cloud diagram of the output gear and the output shaft during the movement shows that the maximum equivalent stress value of the output gear has exceeded the yield strength of the material, and the maximum equivalent stress value of the output shaft is close to the yield strength of the material. …”
Get full text
Article -
1559
A discovery strategy for APT anomaly based on homologous behavior analysis
Published 2016-01-01“…As APT(advanced persistent threat)attacks are increasingly frequently,higher requirements for the detection of APT attacks were proposed.It was an effective method to early discover the attack behavior of APT based on homologous behavior analysis.Aiming at the problem of low efficiency of data authentication caused by excessive data,the historical behavior database with data label technology was established and the database was stored in the cloud.Relying on the Hadoop platform and the aggregate computing ability of MapReduce and the pseudorandom permutation technique,the whole traffic parallel detection of the network was realized.In order to determine whether there was a APT attack behavior,the detection of APT attacks was implemented by comparing the data labels in the database.Test results show that the proposed method can detect the abnormal behavior of APT from the network as soon as possibleand improve the efficiency of the whole data flow detection.…”
Get full text
Article -
1560
Research on intelligent computing power prediction based on AI large models
Published 2024-10-01“…Telecom operators and cloud service providers are increasingly expanding their intelligent computing center layouts. …”
Get full text
Article