Showing 1,601 - 1,620 results of 2,372 for search '"cloud"', query time: 0.05s Refine Results
  1. 1601

    A Critical Review of the Roles and Functions of Traditional Leaders by Nkareng Klaas-Makolomakwe, Tanusha Raniga

    Published 2021-06-01
    “…Yet, this institution is still mired by much controversy and the cloud of being seen as not fitting the principles of democracy, while needing to remain relevant to its subjects. …”
    Get full text
    Article
  2. 1602

    Survey on research progress for compute first networking by Qingmin JIA, Rui DING, Hui LIU, Chen ZHANG, Renchao XIE

    Published 2021-10-01
    “…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
    Get full text
    Article
  3. 1603

    Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain by Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG

    Published 2021-12-01
    “…To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and the evidence report were stored in the cloud server and the block chain respectively to realize the secure storage and sharing of the electronic evidence.The identity-based signcryption technology was used to ensure the confidentiality of data, and the proxy re-encryption technology was used to realize the sharing of electronic evidence of Internet of vehicles by insurance companies.The aggregation signature technique was introduced to reduce the computation cost of multi vehicle user signature verification.The reliability of electronic evidence was improved by using credibility incentive mechanism.Security analysis shows that the proposed scheme achieves data confidentiality, integrity, verifiability and unforgeability.Compared with the existing schemes, the proposed scheme has certain advantages in terms of computational overhead.…”
    Get full text
    Article
  4. 1604

    Adopting an Improved Genetic Algorithm for Multi-Objective Service Composition Optimization in Smart Agriculture by Shalini Sharma, Bhupendra Kumar Pathak, Rajiv Kumar

    Published 2024-12-01
    “…Hence, to resolve this issue, agriculture is shifting to "smart agriculture," whose focus is to accelerate production using wireless sensor networks, cloud computing and IoT. The service composition is thought to be a crucial component in this technology for increasing functionalities and satisfying user's complex needs. …”
    Get full text
    Article
  5. 1605

    STRUCTURE OPTIMIZATION OF ELECTRIC AUTOMOBILE TRANSMISSION HOUSING by ZHENG SongLin, QU JinQian, SHI WenShan, CHEN YouSong, LIU Hui, XU Ying

    Published 2015-01-01
    “…First, problems of manufacturing were found by 7 Diamonds troubleshooting; Then FEA of the transmission housing before optimization was implemented by Hyperworks 11. 0,proving the validity of cracking reason; Thirdly,3 structure aspects of transmission housing were optimized,then FEA of the transmission housing after optimization was carried,the stress distribution cloud image shows that the maximum stress reduces greatly and this conforms to the requirements of the strength; Finally,on the bench test 6 tests were verified,the results indicates that the optimization of transmission housing meets intensity and durability requirements and optimization scheme is feasible. …”
    Get full text
    Article
  6. 1606

    Survey on computation offloading in mobile edge computing by Renchao XIE, Xiaofei LIAN, Qingmin JIA, Tao HUANG, Yunjie LIU

    Published 2018-11-01
    “…Computation offloading in mobile edge computing would transfer the resource intensive computational tasks to the edge network.It can not only solve the shortage of mobile user equipment in resource storage,computation performance and energy efficiency,but also deal with the problem of resource occupation,high latency and network load compared to cloud computing.Firstly the architecture of MEC was introduce and a comparative analysis was made according to various deployment schemes.Then the key technologies of computation offloading was studied from three aspects of decision on computation offloading,allocation of computing resource within MEC and system implement of MEC.Based on the analysis of MEC deployment scheme in 5G,two optimization schemes on computation offloading was proposed in 5G MEC.Finally,the current challenges in the mobility management was summarized,interference management and security of computation offloading in MEC.…”
    Get full text
    Article
  7. 1607

    Key problems of telecom operators' NFV future network management system evolution by Qiu YUE, Ziyu XIAO, Lihua WU, Lei SHEN

    Published 2017-04-01
    “…Network function virtualization (NFV) is the core technology and architecture of telecom-level business to cloud,which is the inevitable trend of future network evolution.NFV brings new capabilities to the communications network,at the same time,it requires new management and orchestration (MANO) capabilities for existing equipment operations,management,maintenance and configuration models.First of all,the network management system architecture and future evolution planning of the physical network element were summarized,and by the coming of NFV technology,the changes of the existing network equipment management method and the new network management architecture and function were concluded.The coordination of NFV MANO and operation support system (OSS),NFV MANO and other peripheral network was deeply researched.Finally,from the perspective of telecom operators,the deployment and evolution strategy of NFV MANO based on decoupling level was suggested.…”
    Get full text
    Article
  8. 1608

    Digital Recruitment Using Intelligent Dialogue Systems Based on Machine Learning Principles by I. N. Kalinouskaya

    Published 2021-04-01
    “…In connection with the digital transformation of the Belarusian economy companies face the task of choosing the ways of transition from classical methods of human resources management to the model "HR 3.0", which allows to increase efficiency and speed of solving the tasks of recruitment, retention and development of personnel as a result of using cloud technologies, chat bots and artificial intelligence. …”
    Get full text
    Article
  9. 1609

    Multi-authority attribute-based encryption scheme with policy dynamic updating by Xi-xi YAN, Yuan LIU, Zi-chen LI, Yong-li TANG

    Published 2017-10-01
    “…Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.…”
    Get full text
    Article
  10. 1610

    Research on 5G high-precision indoor positioning technology for smart parks by Baoyou WANG, Jingtao YANG, Saibin YAO, Haina YE, Zhihui WANG, Qiyuan ZHANG, Junfeng FU, Taishi JIN

    Published 2023-08-01
    “…The 5G cellular network not only provides wireless communication capabilities for terminals but also offers positioning functionalities.Firstly, the 3GPP 5G positioning technology was briefly outlined, followed by the proposal of the 5G indoor positioning technology road-map.The cloud-edge collaborative integrated positioning architecture, the 5G+X fusion positioning solution, as well as the 5G positioning solution for smart parks were included, with a detailed analysis of the architecture and process.These positioning solutions seamlessly addressed the issue of locating people or objects in areas where GNSS signals cannot reach, which could meet the positioning accuracy and timeliness requirements in different scenarios.The technology solution has been applied in the industry with meter-level positioning accuracy and second-level timeliness, which has been well evaluated by customers.…”
    Get full text
    Article
  11. 1611

    Research Progress and Prospect of Reservoir Intelligent Operation by WANG Sen, WANG Xiayu, JIA Wenhao, NI Xiaokuan, LIU Xia

    Published 2023-01-01
    “…Reservoir operation is an important tool to adapt to climate changes and prevent floods and droughts.With the continuously advancing digitization,a new generation of information technology has begun to integrate with traditional reservoir operations.Based on 445 references collected by CNKI from 2000 to 2023 and 412 references in the core collection database of Web of Science,this paper employs CiteSpace to analyze the status and trend of intelligent operation research.Meanwhile,it systematically sorts out two types of operation technologies including model building and model solving,and six types of information technologies containing knowledge graphs,the internet of things,big data,cloud platform,artificial intelligence,and digital twins.Finally,the intelligent operation provides new ideas for reservoir group operation in river basins,but it still needs further breakthroughs in fields such as thorough perception,data mining,universal model building,and intelligent decision-making.…”
    Get full text
    Article
  12. 1612

    PERSONALIZED MOOCS IN BLENDED LEARNING by Vyacheslav A. Starodubtsev

    Published 2016-12-01
    “…With the aim to reduce the egalitarian nature of the MOOCs («one size fits all») the pedagogical design of personalized MOOCs suggests the differentiation contingent on individual «profiles», tiered content composition, tested previously, when creating digital manuals on local media (CD and DVD), updating content with the participation of learners, formative assessment with the participation of reviewers from different groups of the contingent, pedagogical support at the request of a user, and an integration of MOOCs platforms with social media cloud services. The certification of MOOCs as elements of the education programs at the level of universities associations is proposed.…”
    Get full text
    Article
  13. 1613

    Energy-efficient load balancing in wireless sensor network: An application of multinomial regression analysis by Ruwaida M Zuhairy, Mohammed GH Al Zamil

    Published 2018-03-01
    “…In integrated networks in which cloud systems act as a self-regulatory controller, distributing the computational load among available partitions with rich energy will positively influence the lifetime of the whole network. …”
    Get full text
    Article
  14. 1614

    Service aware base station processing resource allocation for centralized radio access network by Xinping ZHANG, Yuanyuan WANG, Lin TIAN, Shuliang HAO

    Published 2018-08-01
    “…Current research on resource allocation algorithmsmainly focuses on data centers,and cloud computing environments.These resource allocation algorithms did not consideRthe diversity of processing resources(CPU,memory,network bandwidth,FPGA,DSP)and the diversity of service types in the centralized base station,resulting in the low processing resource utilization.In ordeRto solve this problem,a service oriented base station processing resource allocation algorithm was proposed.Firstly,the Fisher partitionmethod was used to classify the base station’s processing resource requirements according to the user’s service request.Then,the resource allocation balancing strategy was used to allocate the base station processing resources.Experimental results show that the algorithm is effective to reduce the number of physi cal servers and improves the resource utilization of the servers,realizing energy conservation and communications.…”
    Get full text
    Article
  15. 1615

    Forward Kinematics and Workspace Analysis of a 6-DOF Dual-arm Operating System Based on the Screw Theory by Zheng Xuekai, Liu Fang, Yang Yan, Wei Wenqing

    Published 2023-02-01
    “…Matlab software is used to analyze the workspace, and the workspace of the dual-arm operating system is obtained by comparing the workspace cloud map.…”
    Get full text
    Article
  16. 1616

    Data sharing scheme for 5G IoT based on blockchain by Kang QIAO, Wei YOU, Lingwei WANG, Hongbo TANG

    Published 2020-08-01
    “…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
    Get full text
    Article
  17. 1617

    Design and Temperature Field Simulation of Mine Locomotive Brake and Test by Zhou Kun, Wang Jiqiang, Dong Mengshi

    Published 2018-01-01
    “…The braking system of 6 tons of mine electric locomotive is designed,by using a caliper disc brake,and the main components structure sizes of brake disc,brake and drive mechanism are analyzed and calculated,according to the structure design of the brake and the calculated size,the simulation analysis of temperature field of the motor vehicle braking process is carried out by using the finite element simulation software.The temperature distribution cloud and the temperature distribution variation and the maximum temperature in the braking process of brake disc under the different adhesion coefficient are obtained. …”
    Get full text
    Article
  18. 1618

    I will not find this image beautiful I will not find this image beautiful I will not find this image beautiful (An unfinished monument) by Omar Mismar

    Published 2021-02-01
    “…With naming the dead, the notion of a monument emerges, reinforced by the sculptural quality of the smoke cloud. The resulting video is entitled I will not find this image beautiful, I will not find this image beautiful, I will not find this image beautiful (An unfinished monument) (11h 43min). …”
    Get full text
    Article
  19. 1619

    Analysis and suggestion of future 5G directions by Shanzhi CHEN

    Published 2016-07-01
    “…Firstly,the global research progress of 5G was briefly introduced,and the requirements and challenges of 5G were analyzed.The understanding and views on 5G were shared,and 5G was pointed out as an internet of things generation,a telecom IT generation,software definition and cloud generation,a cellular structure transition generation,and serving as a link between the past and the future generation.Then,the key technologies of 5G wireless transmission and network were also analyzed,including PDMA,UUDN and virtual RAT technologies,which were proposed by the author's team.Particularly,the advantages of TDD in 5G was pointed,and the new air interface of 5G adopting TDD mode was predicted.At last,combined with China's innovative experience in TD-SCDMA and TD-LTE,suggestions on how to develop 5G in China were provided.…”
    Get full text
    Article
  20. 1620

    Sugarcane Orange Rust by Philippe Rott, Sushma Sood, Jack C. Comstock, Richard N. Raid, N. C. Glynn, Robert A. Gilbert, Hardev S. Sandhu

    Published 2014-10-01
    “…It is hypothesized that rust spores were blown into the region as a disperse spore cloud from an unknown source rather than spread from a single or several small focal points. …”
    Get full text
    Article