Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1581
Epsilon Canis Majoris: The Brightest Extreme-ultraviolet Source with Surprisingly Low Interstellar Absorption
Published 2025-01-01“…The B2 star Epsilon Canis Majoris ( ϵ CMa), at parallax distance d = 124 ± 2 pc, dominates the H i photoionization of the Local Interstellar Cloud. At its closer parallax distance compared to previous estimates, ϵ CMa has a 0.9 mag fainter absolute magnitude M _V = −3.97 ± 0.04. …”
Get full text
Article -
1582
Privacy in the Internet: Myth or reality
Published 2016-01-01“…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
Get full text
Article -
1583
Numerical Analysis of Seepage Field Characteristics for Tunnel Engineering at Shaoquan Lake
Published 2021-01-01“…Waterproofing of the urban under-lake tunnels is directly related to the operation safety of tunnel projects.In order to analyze the waterproof performance of the tunnel,this paper establishes a three-dimensional numerical model of the tunnel under the lake based on the real tunnel structure,simulates the seepage state of the tunnel under different water depths and soil thickness through FLAC3D,and obtains the pore water pressure cloud map of the tunnel under different conditions.It is found that the maximum pore water pressure occurs at the top and outside of the tunnel,so improving anti-seepage measures shall be taken at these areas.After comparison of the anti-seepage performance of the concrete with different impermeable layer thickness by the numerical method,the results show that the anti-seepage performance of the concrete will be significantly enhanced with the increase of impermeable layer thickness.…”
Get full text
Article -
1584
Design and Stiffness Analysis of 3-(2SPS) Parallel Machine Tool
Published 2019-03-01“…Under the same working conditions, the overall displacement cloud image and the finite element simulation stiffness of the machine tool are obtained. …”
Get full text
Article -
1585
Dynamic load balancing algorithm based on queuing theory comprehensive index evaluation
Published 2018-07-01“…Internet communication,computer cluster and cloud environment have complex and dynamic characteristics,which can cause load imbalance easily,reduce the service efficiency and increase the energy consumption.Therefore,the load balancing technology becomes the focus of research.The existing load balancing strategy uses the occupancy of CPU,memories,processes to estimate the current load of each server.But it is hard to guarantee its accuracy.Aiming at this problem,a dynamic load balancing algorithm based on queuing theory comprehensive index evaluation was proposed.Firstly,queuing theory model was introduced to estimate the real-time load of each server,and then the tasks of input queue was distributed to each server separately according to the load comprehensive index of each server.Experimental results show that this method can balance the load of each server effectively and reduce the average waiting time of the task requests,which is of great application value.…”
Get full text
Article -
1586
Design of self-adaptive spatio-temporal diversity joint scheduling strategy
Published 2021-07-01“…To solve the problem that a diversity system is difficult to take defense capability, defense cost and quality of service into account at the same time under a single diversity strategy, firstly, the scheduling object selecting sequences under different security levels were constructed based on the measurement of scheduling heterogeneity, executor security and spatial diversity.Then, according to the coarse-grained evaluation of threat environment, the scheduling time and scheduling object were determined comprehensively.Through the realization of the spatio-temporal diversity Web server system in a cloud environment, the proposed scheduling strategy was tested with attack and defense experiments and compared with the existing scheduling strategies.The results show that the proposed scheduling strategy improves the defense capability significantly and maintains a high quality of service within the acceptable defense cost increasing range.…”
Get full text
Article -
1587
Dynamic Data Scheduling of a Flexible Industrial Job Shop Based on Digital Twin Technology
Published 2022-01-01“…A CGA algorithm is proposed by introducing the cloud model. The algorithm is used to solve the model, and the chaotic particle swarm optimization algorithm is used to maintain the particle diversity to complete the dynamic data scheduling of a flexible industrial job shop. …”
Get full text
Article -
1588
Research on Moving Target Detection and Tracking Technology in Sports Video Based on SIFT Algorithm
Published 2022-01-01“…Moreover, this paper divides the point cloud data into multiple cube grids under the coordinate system where it is located, and then finds the center of gravity of the data points in each grid, and replaces the coordinates of all points in the grid with the coordinates of the center of gravity. …”
Get full text
Article -
1589
Virtualization security:the good,the bad and the ugly
Published 2016-10-01“…The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.…”
Get full text
Article -
1590
Research on Public Transit Network Hierarchy Based on Residential Transit Trip Distance
Published 2012-01-01“…Firstly, the hierarchy standard of transit network is given, in addition, both simulating electron cloud model and Rayleigh distribution model are used to fit the residential transit trip distance. …”
Get full text
Article -
1591
Efficient identity-based fully homomorphic encryption over NTRU
Published 2017-01-01“…Fully homomorphic encryption is the best solution for solving privacy concerns for data over cloud so far,while large public key size is a general shortcoming for existing schemes.First,by introducing the concept of Kullback-Leibler divergence,an identity-based public key scheme over NTRU lattice with modified ciphertext form was proposed.Analysis on parameter setting showed its small key size and ciphertext size,and experiments revealed its high computational efficiency.Second,with the idea of approximate eigenvector,an improved method to convert the scheme into an identity-based fully homomorphic encryption one was put forward to further reduce ciphertext size.Compared with existing schemes,the converted scheme not only abandons evaluation keys to make it fully identity-based,but also has smaller keys and ciphertext,which results in higher computational and transmission efficiency.…”
Get full text
Article -
1592
Research of an Improved Trajectory Planning Method for Industrial Robot
Published 2019-02-01“…Using the standard D-H parameter method, the coordinate system of the robot connecting rod is established first, then, the robot simulation model is created and the kinematics forward solution and inverse solution are solved, the workspace point cloud image at the end of the robot is also been made. …”
Get full text
Article -
1593
Fast surface reconstruction algorithm with adaptive step size.
Published 2025-01-01“…In (Dai et al. 2023), the authors proposed a fast algorithm for surface reconstruction that converges rapidly from point cloud data by alternating Anderson extrapolation with implicit progressive iterative approximation (I-PIA). …”
Get full text
Article -
1594
Study of the Advanced Application Characteristics of a Solar Solid Adsorption Refrigerator
Published 2005-05-01“…These include the efficient design of a new adsorbent bed; experimental studies of working pairs for a solar ice maker using activated carbon—methanol and activated carbon—ethanol; the effects of sky cloud cover on a solar ice maker; and the efficient utilization of a solar ice maker with provision for heating and cooling. …”
Get full text
Article -
1595
Du concept psychiatrique à la métaphore théâtrale : le miroir de l’Autre dans les dramaturgies postcoloniales de Caryl Churchill et de Nick Gill
Published 2014-06-01“…His characters’ masked identities and ontological insecurity bear striking similarities to Churchill’s Hospital at the Time of the Revolution (1971) and Cloud Nine (1979). Both playwrights draw their ideas from a psycho-analytical approach to post-colonial identities, basing their assessment of their characters’ conflicting identities on a symptomatic approach to the fear of the Other. …”
Get full text
Article -
1596
Design and implementation of NB-IoT based environmental temperature and humidity monitoring system
Published 2021-12-01“…In view of the disadvantages of the traditional environmental monitoring system, such as high power consumption, high maintenance cost and no real-time monitoring, an environmental temperature and humidity monitoring system based on narrow band Internet of things (NB-IoT) technology was developed, which is mainly controlled by singlechip microcomputer.The work flow of the main controller and the working mode of the communication module were optimized to reduce the power consumption of the system.NB-IoT communication technology was utilized for data transmission to the cloud platform through the base station and core network.China Mobile IoT open platform (OneNET platform) was adopted to achieve the connection between the terminal device and the application, and expanded functions provided by the platform was used to design a mobile phone application to achieve the remote real-time monitoring of environmental parameters and improve the user’s convenience.…”
Get full text
Article -
1597
Research of the Meshing Drive Performance of New Arc Tooth Synchronous Belt based on RecurDyn
Published 2019-01-01“…The simulation stress cloud chart shows the synchronous belt bears the maximum load at the pinch-in and out areas of active and driven pulley. …”
Get full text
Article -
1598
Lightning Damage to Landscape Palms
Published 2021-01-01“…Florida has on average 3,500 cloud-to-ground lightning strikes per day and 1.2 million strikes per year. …”
Get full text
Article -
1599
Comparison of the Frequentist MATA Confidence Interval with Bayesian Model-Averaged Confidence Intervals
Published 2015-01-01“…Differences between the Bayesian and frequentist methods are illustrated through an example involving cloud seeding. The coverage performance and interval width of each technique are then studied using simulation. …”
Get full text
Article -
1600
Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain
Published 2020-08-01“…Considering that it was difficult to share medical record data among different medical institutions in cloud storage,an electronic medical record data sharing scheme based on searchable encryption on blockchain was proposed.In order to realize the secure storage and sharing of electronic medical records in the scheme,the patient’s electronic medical record ciphertext was stored in the hospital server,the ciphertext hash value was stored in the private blockchain,and the keyword index was stored in the consortium blockchain.Searchable encryption was used to implement secure search of keywords in the consortium blockchain,and proxy re-encryption technology was used to realize the sharing of electronic medical records of patients by other data users.Security analysis shows that the proposed scheme can achieve ciphertext security and keyword security.Moreover,the performance of the scheme was analyzed by function analysis,computational efficiency analysis and numerical simulation.The performance analysis shows that the scheme can achieve high computational efficiency.…”
Get full text
Article