Showing 1,621 - 1,640 results of 2,372 for search '"cloud"', query time: 0.06s Refine Results
  1. 1621

    Standard system of IPv6+ technologies by Zhenbin LI, Feng ZHAO

    Published 2020-08-01
    “…The vision of IPv6+ is to unleash the potential of IPv6 technology with necessary extensions and enhancement,so as to meet the requirement in 5G and cloud era to IP network,such as high scalability,high reliability,new services and intelligence network.IPv6+ consists of a series of protocol and technology innovation:such as SRv6 network programming,network slicing (VPN+),in-situ flow information telemetry (iFIT),next generation multicast (BIER),service function chaining (SFC),deterministic networking (DetNet),and application-aware IPv6 networking (APN6).These technologies are currently under development in several standard organizations,and can be classified into three phases.Standardization is one of the most important work of IPv6+ innovation.The standard system of IPv6+ technologies were defined,including the related standard organization,the whole picture of the IPv6+ standards,the three phases of IPv6+ standardization and key technologies and standard layout of each phase.…”
    Get full text
    Article
  2. 1622

    Mobile edge computing and application in traffic offloading by Jianmin ZHANG, Weiliang XIE, Fengyi YANG, Zhouyun WU, Liang XIE

    Published 2016-07-01
    “…Mobile edge computing(MEC)makes it possible to deploy and provide service locally,which is close to the users,by enabling the IT and cloud computation capacity at the radio access network (RAN).Thus,MEC can improve the quality of experience (QoE) by reducing the latency,and decrease the network operation cost through reducing backhaul capacity requirement.Meanwhile,based on the network context information (location,network traffic load,radio information,etc) exposure to applications and services,MEC can further improve the QoE of user and provide the platform to third-party partners for application and service innovation.Besides the introduction of MEC,the detailed MEC platform was presented.Furthermore,the traffic offloading solution based on MEC was proposed and compared with the solution of local IP access and selected IP traffic offload (LIPA/SIPTO).In addition,the problems and challenges of the MEC were also discussed in detail.…”
    Get full text
    Article
  3. 1623

    Data management based on blockchain and edge computing for Internet of things by Guanjie CHENG, Zhengjie HUANG, Shuiguang DENG

    Published 2020-06-01
    “…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
    Get full text
    Article
  4. 1624

    Estimation of Daily Sunshine Duration from Terra and Aqua MODIS Data by H. M. Kandirmaz, K. Kaba

    Published 2014-01-01
    “…A new quadratic correlation between daily mean cloud cover index and relative sunshine duration was also introduced and compared with the linear correlation. …”
    Get full text
    Article
  5. 1625

    Image privacy preservation scheme based on QR code and reversible visible watermarking by Yuanzhi YAO, Feng WANG, Wenbo YAN, Nenghai YU

    Published 2019-11-01
    “…With the privacy leakage problem of image delivery in networks,an image privacy preservation scheme based on QR code and reversible visible watermarking was proposed.In order to preserve the privacy information including shooting time,shooting location and detailed description,the encrypted privacy information was stored in cloud platforms and corresponding universal resource locator was generated firstly.Secondly,the universal resource locator was encoded as the QR code and it was embedded into the cover image using reversible visible watermarking.Therefore,the access control for privacy information could be achieved.The visual perceptual model was utilized to select adaptive watermark embedding parameters to balance watermark visibility and marked image quality.Experimental results demonstrate that the good visual quality of marked images can be obtained and the embedded QR code can be correctly decoded.The proposed scheme can guarantee marked image quality and reduce the risk of private information leakage.…”
    Get full text
    Article
  6. 1626

    Intelligent forecasting and monitoring of air index based on big data and internet of things by Yan LIU, Yong-ping ZHANG, Cheng ZHU, Jun GAO, Qi-ming LIU

    Published 2017-11-01
    “…Air quality forecast has become an urgent need.However,numerical forecast of air quality is a complex systems engineering.The intelligent forecasting of air index was studied from the perspective of big data and intelligent decision making.For the index prediction of air quality,the popular classification algorithm was introduced to realize the intelligent analysis of historical data.To obtain air quality information in real time,a monitoring system based on Internet of Things was established,and intelligent processing of real-time data collected by the classification algorithm was achieved.Due to the large amount of historical air index data and real-time data collected,the technology of cloud computing and big data was introduced to speed up the data processing and improve the storage of data.In addition,the client based on Android was developed to allow users to query the air quality anytime,anywhere.…”
    Get full text
    Article
  7. 1627

    Heterogeneous multi-layer mobile edge computing for 6G by Pengfei WANG, Boya DI, Lingyang SONG, Zhu HAN

    Published 2020-03-01
    “…With the development of the Internet of things,multiple real-time applications will emerge in future 6G communication network.Driven by demands on low-latency services of multiple real-time applications,mobile edge computing (MEC) will become an important technology to improve the user experience and reduce the network cost.However,the computing capacity of a single MEC server is limited,which induces that it is difficult to meet the low-latency requirement of data processing for the computation-intensive applications.A heterogeneous multi-layer mobile edge computing (HetMEC) network architecture was proposed to jointly utilize the computing and transmission resources of both the cloud computing center and multi-layer MEC servers.By reasonably dividing and offloading computing tasks,reliable and efficient computing services were provided for edge applications.Simulation results show that the proposed algorithm could effectively reduce the processing latency,improve the network processing rate and robustness.…”
    Get full text
    Article
  8. 1628

    Simulation Research of the Solid Filling Hydraulic Support Hangs Scraper Conveyor by Zhang Dongsheng, Yuan Shuai, Yuan Zhi, Song Qiushuang, Gao Hao

    Published 2017-01-01
    “…According to the result of finite element analysis and statics analysis and calculation,by using n Code software,the fatigue strength analysis is carried out on the scraper chain,the life and injury cloud chart are obtained,it in line with the finite element analysis results and can satisfy the requirements of use.…”
    Get full text
    Article
  9. 1629

    Container intrusion detection method based on host system call frequency by Yimu JI, Weidong YANG, Kui LI, Shangdong LIU, Qiang LIU, Sisi SHAO, Shuai YOU, Naijiao HUANG

    Published 2021-08-01
    “…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
    Get full text
    Article
  10. 1630

    Reviews of D2D technology for 5G communication networks by Zhi-hong QIAN, Xue WANG

    Published 2016-07-01
    “…The mechanism, the lower macro/small base stations for access whereas the upper network cloud for management, is proposed. What emerges is that still major issues shall be faced by the research community, as D2D, SDN, edge computing and IOT technologies are expected to be introduced into the future mobile communication networks. …”
    Get full text
    Article
  11. 1631

    Design and Implementation of One Map of Watershed Water Conservancy by GAN Haoxin, WANG Zhilong

    Published 2021-01-01
    “…Given the needs of watershed water conservancy management and the requirements of intelligent water conservancy construction,this study adopts the construction and operation mode of “joint construction,shared use,business update and intensive maintenance”,to build One Map of watershed water conservancy that is “dynamic,vivid,three-dimensional,intelligent,safe and reliable” based on the national water conservancy map.Through technological innovation in the fields of data,model,platform and application,this study aims to guide the construction practice of One Map of Pearl River water conservancy,so as to build One Map big data center,One Map service cloud platform,One Map intelligent application,One Map normative system,etc.for Pearl River Basin.This study supports multi-dimensional information query and analysis,rapid construction of special applications,construction of professional systems based on unified maps,and full aggregation display of business achievements,promoting the construction of digital twin watershed.…”
    Get full text
    Article
  12. 1632
  13. 1633

    Fault tolerant & priority basis task offloading and scheduling model for IoT logistics by Asif Umer, Mushtaq Ali, Ali Daud, Lal Hussain, Amal Bukhari, Ali Imran Jehangiri

    Published 2025-01-01
    “…Tasks exceeding this range are delegated to the cloud. The Euclidean formula is used to determine the proximity between the IoT logistics vehicle and fog nodes for offloading decisions. …”
    Get full text
    Article
  14. 1634

    Gaps in our understanding of ice-nucleating particle sources exposed by global simulation of the UK Earth System Model by R. J. Herbert, A. Sanchez-Marroquin, A. Sanchez-Marroquin, D. P. Grosvenor, D. P. Grosvenor, K. J. Pringle, S. R. Arnold, B. J. Murray, K. S. Carslaw

    Published 2025-01-01
    “…<p>Changes in the availability of a subset of aerosol known as ice-nucleating particles (INPs) can substantially alter cloud microphysical and radiative properties. Despite very large spatial and temporal variability in INP properties, many climate models do not currently represent the link between (i) the global distribution of aerosols and INPs and (ii) primary ice production in clouds. …”
    Get full text
    Article
  15. 1635

    Estimated Aerosol Health and Radiative Effects of the Residential Coal Ban in the Beijing-Tianjin-Hebei Region of China by Kelsey R. Bilsback, Jill Baumgartner, Michael Cheeseman, Bonne Ford, John K. Kodros, Xiaoying Li, Emily Ramnarine, Shu Tao, Yuanxun Zhang, Ellison Carter, Jeffrey R Pierce

    Published 2020-09-01
    “…Abstract Particle-phase air pollution is a leading risk factor for premature death globally and impacts climate by scattering or absorbing radiation and changing cloud properties. Within the Beijing-Tianjin-Hebei region of China, where there are severe air quality problems, several municipalities have begun implementing a coal-to-electricity program that bans residential coal and provides subsidies for electricity and electric-powered heat pumps. …”
    Get full text
    Article
  16. 1636

    Research and implementation of intelligent terminal lightweight face recognition system by Guo-jun MA, Hai-dong ZHOU

    Published 2015-11-01
    “…In order to solve this problem that traditional face recognition scheme was not efficiently suitable to intelligent terminal scene.An improved lightweight scheme of feature weighted clustering matching based on SIFT was presented.The scheme can learn automatically and adaptively add test samples to the training sample space.Reasonable division and scientific distribution of weight make this scheme has improved at run time and recognition rate.The improved algorithm has been tested in the ORL face database and Yale face database,compared with the classical SIFT algorithm the recognition rate improved by 6.13% and 14.11%,the running efficiency increased 9.1% and 4.7%.At the same time,in accordance with the test method by Zhou,in the ORL face database,the recognition rate was up to 74.05%,significantly improved than PCA,LBP and other classical algorithm.The algorithm in Android terminal is implemented,and the improved algorithm is verified to be available in the Android system by experiments.Finally,an improved scheme was proposed based on the cloud architecture.…”
    Get full text
    Article
  17. 1637
  18. 1638

    Research on new frameworks and key technologies for intelligent emergency command communication networks by Li WANG, Aiguo FEI, Ping ZHANG, Lianming XU

    Published 2023-06-01
    “…The new generation of emergency command communication network is the basic means and important support for enhancing China’s emergency response capabilities such as national natural disasters and accidents, and is a key component of establishing a scientific emergency management technology system.Focusing on the requirements of communication, navigating, and sensing capabilities in “intelligent emergency”, a theoretical method and framework for intelligent emergency command and communication networks was proposed, which was introduced from three aspects in terms of network deployment, resource allocation, and assisted decision-making.The difficulties and technical ideas of multi-objective dynamic network deployment for communication, navigating, and sensing, multi-dimension efficient resource allocation for communication, computation, and caching, and multi-level decision-making and intelligent enhancement with cloud-edge-terminal collaboration were analyzed and discussed.It provides theoretical methods and key technical supports for building a new generation of emergency command and communication network in China.…”
    Get full text
    Article
  19. 1639

    Design and application of the layered soil moisture monitor for the smart agriculture by Xiaoqiang ZHAO, Heng QUAN, Zhufeng YAN, Lujun WANG

    Published 2020-12-01
    “…With the rapid development of the smart agriculture in China,the soil moisture monitoring has become particularly important.But there exist many problems in current monitoring methods,such as difficulties in layout and installation,electrode interference,and single monitoring depth.A soil moisture monitor suitable for the farmland was designed.For the hardware structure,a tube-type non-contact design scheme was adopted,and multiple modules were designed in order to realize the layered non-contact monitoring.For the software protocol,a control strategy of the multi-node access based on the Modbus protocol was proposed,which had the characteristics of high polling efficiency,data stability,and wide monitoring nodes.The data was transmitted to the cloud server through the message queuing telemetry transport (MQTT) protocol for the agricultural analysis and decision-making.The test in the vineyard area shows that the monitor can monitor the moisture content in the range of 0~100% and accuracy of ± 2.45%,which is of certain stability and practicality.…”
    Get full text
    Article
  20. 1640

    Solar Radiation Partitioning and Surface Albedo Parameterization in the Hinterland of Taklimakan Desert by Chunlei Meng, Huoqing Li

    Published 2019-01-01
    “…The solar radiation partitioning method considers the joint influences of cloud cover, near-surface air pressure, and solar zenith angle and was compared with the method using the Simple Biosphere Model version 3 (SiB3). …”
    Get full text
    Article