Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1561
Mobile terminal identity authentication system based on behavioral characteristics
Published 2020-01-01“…The system deploys software on the smartphone to collect data from sensors and touch screens, and upload the data to the cloud. We apply random forest algorithm on the data to extract features and achieve motion state detection. …”
Get full text
Article -
1562
Analysis and Simulation of Workspace of Humanoid Manipulator based on Matlab
Published 2020-12-01“…At the base of Monte Carlo method,the workspace point-cloud of the manipulator is obtained. The method of combining partitioning by angle method with two-parameter arctangent function is employed to extract the boundary points of the workspace. …”
Get full text
Article -
1563
Survey on edge computing technology for autonomous driving
Published 2021-03-01“…Edge computing plays an extremely important role in the environment perception and data processing of autonomous driving.Autonomous driving vehicles can expand their perception scope by obtaining environmental information from edge nodes, and can also deal with the problem of insufficient computing resources by offloading tasks to edge nodes.Compared with cloud computing, edge computing avoids high latency caused by long-distance data transmission, and provides autonomous driving vehicles with faster responses, and relieves the traffic load of the backbone network.Firstly, the edge computing-based cooperative perception and task offloading technologies for autonomous vehicles were introduced firstly, and related challenging issues were also proposed.Then the state-of-the-art of cooperative perception and task offloading technologies were analyzed and summarized.Finally, the problems need to be further studied in this field were discussed.…”
Get full text
Article -
1564
Attribute-based fully homomorphic encryption scheme over rings
Published 2017-04-01“…The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted its practical.To improve these drawbacks,a recoding scheme and a attribute-based encryption scheme based on learning with errors problem over rings were provided,then a attribute-based fully homomorphic encryption was constructed.The new scheme overcame the above mentioned drawbacks,because it did't need public key certificate,meanwhile,it can achieve the fine-grained access control to the ciphertext.Compared with similar results,proposed method decreases the size of keys and ciphertext greatly.…”
Get full text
Article -
1565
Research on mobile stroke unit based on 5G network technology
Published 2020-01-01“…The 5G mobile stroke unit uses advanced next-generation information and communication technologies such as the Internet of things,mobile Internet,cloud computing,5G,etc.,to connect and achieve healthy interaction with people,equipment,and resources related to health care,which can guarantee people's timely access to preven-tive and therapeutic medical services.The composition design,functional modules,implementation architecture,and innovative service models of 5G mobile stroke units were discussed.The combination of 5G network technology and mobile stroke units were analyzed,and the network requirements of 5G mobile stroke units was analyzed with spe-cific cases.…”
Get full text
Article -
1566
Research on the optimization adjustment strategy for the SaaS multi-tenant data placement
Published 2014-11-01“…The multi-tenant data stored in cloud using replica technology must be reasonably placed,meet the requirements for data access by tenants and management by service providers.According to the characteristics of multi-tenant data and the load of the nodes,for the outweight nodes and the ultralight nodes,through adjusting the number and position of the replicas to maintenance and optimization the placement strategy so that meet the SLA requirements at the same time minimize the overall cost,realize the balance between the quality of service and the cost of management.Experimental results through comparison with random placement strategy and greedy placement policy demonstrate the feasibility and effectiveness of the proposed strategy.…”
Get full text
Article -
1567
Differentiated and negotiable mechanism for data communication
Published 2021-10-01“…In view of the massive and differentiated computing units and terminal devices in the cloud environment and the Internet of things, the differences in hardware resources and computing capabilities posed new challenges to high reliability and high performance data communication, a data communication mechanism supporting differentiation and negotiation was proposed.A parameters negotiation method was proposed, and parameters were negotiated by the sender according to the difference of the receiver capability to achieve differentiated and negotiable data communication.A retransmission feedback mechanism was designed, and the transmission rate was dynamically adjusted and the data was retransmitted based on the data reception feedback of the receiver by the sender to improve communication efficiency and reliability.The experimental results show that the proposed mechanism can perform dynamic adaptive, efficient and parallel communication according to the difference of the receiver capability.…”
Get full text
Article -
1568
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
Get full text
Article -
1569
Access and mobility management technologies for 6G satellite communications network
Published 2021-06-01“…Analsisand outlook for satellite communication access and mobility management technology in 6G network was presented.Firstly, the access technology of current global representative satellite mobile communications system was introduced, as well as the international standardization organization research status of 5G NR satellite access technology.According to the challenges for 6G satellite communications network access, some solutions regarding to 6G satellite communications access were proposed respectively from the aspects of extremely simple access, extremely intelligent access.Furthermore, according to the demand of massive terminals handoff in the high dynamic scenario of 6G satellite communications, the flexible handoff scheme based on cloud channel technology, which supported batch massive terminals mobility management for across satellites and beams, was proposed.…”
Get full text
Article -
1570
Research on intelligent modeling and policy making of CNC brain
Published 2023-08-01“…As a future-oriented new network architecture, the core idea of computing and network convergence is to manage cloud-edge-end computing network resources in a centralized or distributed way by centering on the deep integration of computing force and network resources, so as to provide computing service for users’ needs.Although the CNC has made some progress in standard setting and industrial promotion, the overall development still faces many challenges, and there are still many scientific and engineering problems to be broken through.Research on CNC and its brain was carried out, the latest progress in related fields in the industry was analyzed, and the idea of building intelligent CNC brain was put forward, hoping to throw a brick at the table, jointly promote the implementation of AI in CNC, and truly realize intelligent CNC.…”
Get full text
Article -
1571
Lightning Damage to Landscape Palms
Published 2021-01-01“…Florida has on average 3,500 cloud-to-ground lightning strikes per day and 1.2 million strikes per year. …”
Get full text
Article -
1572
Influence of Involute Cylindrical Gear Tooth Profile Modification on the Stress of Gear Tooth
Published 2019-09-01“…The static finite element analysis of the gear is carried out by using the software of Ansys Workbench, the stress cloud diagram of gear tooth root is obtained. Through the contrast between the different amounts of modification, the relationship between the modification amount and the root stress is obtained. …”
Get full text
Article -
1573
-
1574
Remote-sensing detectability of airborne Arctic dust
Published 2025-01-01“…<p>Remote-sensing (RS)-based estimates of Arctic dust are oftentimes overestimated due to a failure in separating out the dust contribution from that of spatially homogeneous clouds or low-altitude cloud-like plumes. A variety of illustrations are given with a particular emphasis on questionable claims of using brightness temperature differences (BTDs) as a signature indicator of Arctic dust transported from mid-latitude deserts or generated by local Arctic sources. …”
Get full text
Article -
1575
Implementasi Layanan Aplikasi Bergerak Untuk Informasi Wisata Provinsi Papua Barat
Published 2020-10-01“…Aplikasi yang dibangun berbasis Android dengan memanfaatkan layanan cloud PaaS serta layanan google maps dalam mempermudah mencari lokasi wisata. …”
Get full text
Article -
1576
-
1577
Modelling pre-Hispanic settlement patterns in Alto de Toche, Colombia
Published 2024-05-01“… • A terrain modelling reconstructed a geoarchaeological mountain landscape, composed of massive systems of terraces at Alto de Toche Wax Palm cloud forest. • From digital photogrammetry in fieldwork, three sites were detailed. …”
Get full text
Article -
1578
Digital transformation of relocated higher education institutions in Ukraine under martial law
Published 2025-02-01“…Methodologically, the study integrates qualitative interviews and quantitative analysis, exploring how cloud technologies, learning management systems, and AI-driven chatbots contributed to continuity in education. …”
Get full text
Article -
1579
Rekayasa E-Aquaculture untuk Pemantauan Tambak Udang secara Realtime dengan Model Multipoint Node
Published 2021-03-01“…Masterboard dapat bekerja untuk mengirimkan data ke basis data cloud firebase untuk selanjutnya data ditampilkan pada aplikasi monitoring yang telah dikembangkan. …”
Get full text
Article -
1580
Digital-based emergency prevention and control system: enhancing infection control in psychiatric hospitals
Published 2025-01-01“…Methods The system incorporates modern technologies such as cloud computing, big data, streaming media, and knowledge graphs. …”
Get full text
Article