Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1621
Standard system of IPv6+ technologies
Published 2020-08-01“…The vision of IPv6+ is to unleash the potential of IPv6 technology with necessary extensions and enhancement,so as to meet the requirement in 5G and cloud era to IP network,such as high scalability,high reliability,new services and intelligence network.IPv6+ consists of a series of protocol and technology innovation:such as SRv6 network programming,network slicing (VPN+),in-situ flow information telemetry (iFIT),next generation multicast (BIER),service function chaining (SFC),deterministic networking (DetNet),and application-aware IPv6 networking (APN6).These technologies are currently under development in several standard organizations,and can be classified into three phases.Standardization is one of the most important work of IPv6+ innovation.The standard system of IPv6+ technologies were defined,including the related standard organization,the whole picture of the IPv6+ standards,the three phases of IPv6+ standardization and key technologies and standard layout of each phase.…”
Get full text
Article -
1622
Mobile edge computing and application in traffic offloading
Published 2016-07-01“…Mobile edge computing(MEC)makes it possible to deploy and provide service locally,which is close to the users,by enabling the IT and cloud computation capacity at the radio access network (RAN).Thus,MEC can improve the quality of experience (QoE) by reducing the latency,and decrease the network operation cost through reducing backhaul capacity requirement.Meanwhile,based on the network context information (location,network traffic load,radio information,etc) exposure to applications and services,MEC can further improve the QoE of user and provide the platform to third-party partners for application and service innovation.Besides the introduction of MEC,the detailed MEC platform was presented.Furthermore,the traffic offloading solution based on MEC was proposed and compared with the solution of local IP access and selected IP traffic offload (LIPA/SIPTO).In addition,the problems and challenges of the MEC were also discussed in detail.…”
Get full text
Article -
1623
Data management based on blockchain and edge computing for Internet of things
Published 2020-06-01“…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
Get full text
Article -
1624
Estimation of Daily Sunshine Duration from Terra and Aqua MODIS Data
Published 2014-01-01“…A new quadratic correlation between daily mean cloud cover index and relative sunshine duration was also introduced and compared with the linear correlation. …”
Get full text
Article -
1625
Image privacy preservation scheme based on QR code and reversible visible watermarking
Published 2019-11-01“…With the privacy leakage problem of image delivery in networks,an image privacy preservation scheme based on QR code and reversible visible watermarking was proposed.In order to preserve the privacy information including shooting time,shooting location and detailed description,the encrypted privacy information was stored in cloud platforms and corresponding universal resource locator was generated firstly.Secondly,the universal resource locator was encoded as the QR code and it was embedded into the cover image using reversible visible watermarking.Therefore,the access control for privacy information could be achieved.The visual perceptual model was utilized to select adaptive watermark embedding parameters to balance watermark visibility and marked image quality.Experimental results demonstrate that the good visual quality of marked images can be obtained and the embedded QR code can be correctly decoded.The proposed scheme can guarantee marked image quality and reduce the risk of private information leakage.…”
Get full text
Article -
1626
Intelligent forecasting and monitoring of air index based on big data and internet of things
Published 2017-11-01“…Air quality forecast has become an urgent need.However,numerical forecast of air quality is a complex systems engineering.The intelligent forecasting of air index was studied from the perspective of big data and intelligent decision making.For the index prediction of air quality,the popular classification algorithm was introduced to realize the intelligent analysis of historical data.To obtain air quality information in real time,a monitoring system based on Internet of Things was established,and intelligent processing of real-time data collected by the classification algorithm was achieved.Due to the large amount of historical air index data and real-time data collected,the technology of cloud computing and big data was introduced to speed up the data processing and improve the storage of data.In addition,the client based on Android was developed to allow users to query the air quality anytime,anywhere.…”
Get full text
Article -
1627
Heterogeneous multi-layer mobile edge computing for 6G
Published 2020-03-01“…With the development of the Internet of things,multiple real-time applications will emerge in future 6G communication network.Driven by demands on low-latency services of multiple real-time applications,mobile edge computing (MEC) will become an important technology to improve the user experience and reduce the network cost.However,the computing capacity of a single MEC server is limited,which induces that it is difficult to meet the low-latency requirement of data processing for the computation-intensive applications.A heterogeneous multi-layer mobile edge computing (HetMEC) network architecture was proposed to jointly utilize the computing and transmission resources of both the cloud computing center and multi-layer MEC servers.By reasonably dividing and offloading computing tasks,reliable and efficient computing services were provided for edge applications.Simulation results show that the proposed algorithm could effectively reduce the processing latency,improve the network processing rate and robustness.…”
Get full text
Article -
1628
Simulation Research of the Solid Filling Hydraulic Support Hangs Scraper Conveyor
Published 2017-01-01“…According to the result of finite element analysis and statics analysis and calculation,by using n Code software,the fatigue strength analysis is carried out on the scraper chain,the life and injury cloud chart are obtained,it in line with the finite element analysis results and can satisfy the requirements of use.…”
Get full text
Article -
1629
Container intrusion detection method based on host system call frequency
Published 2021-08-01“…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
Get full text
Article -
1630
Reviews of D2D technology for 5G communication networks
Published 2016-07-01“…The mechanism, the lower macro/small base stations for access whereas the upper network cloud for management, is proposed. What emerges is that still major issues shall be faced by the research community, as D2D, SDN, edge computing and IOT technologies are expected to be introduced into the future mobile communication networks. …”
Get full text
Article -
1631
Design and Implementation of One Map of Watershed Water Conservancy
Published 2021-01-01“…Given the needs of watershed water conservancy management and the requirements of intelligent water conservancy construction,this study adopts the construction and operation mode of “joint construction,shared use,business update and intensive maintenance”,to build One Map of watershed water conservancy that is “dynamic,vivid,three-dimensional,intelligent,safe and reliable” based on the national water conservancy map.Through technological innovation in the fields of data,model,platform and application,this study aims to guide the construction practice of One Map of Pearl River water conservancy,so as to build One Map big data center,One Map service cloud platform,One Map intelligent application,One Map normative system,etc.for Pearl River Basin.This study supports multi-dimensional information query and analysis,rapid construction of special applications,construction of professional systems based on unified maps,and full aggregation display of business achievements,promoting the construction of digital twin watershed.…”
Get full text
Article -
1632
-
1633
Fault tolerant & priority basis task offloading and scheduling model for IoT logistics
Published 2025-01-01“…Tasks exceeding this range are delegated to the cloud. The Euclidean formula is used to determine the proximity between the IoT logistics vehicle and fog nodes for offloading decisions. …”
Get full text
Article -
1634
Gaps in our understanding of ice-nucleating particle sources exposed by global simulation of the UK Earth System Model
Published 2025-01-01“…<p>Changes in the availability of a subset of aerosol known as ice-nucleating particles (INPs) can substantially alter cloud microphysical and radiative properties. Despite very large spatial and temporal variability in INP properties, many climate models do not currently represent the link between (i) the global distribution of aerosols and INPs and (ii) primary ice production in clouds. …”
Get full text
Article -
1635
Estimated Aerosol Health and Radiative Effects of the Residential Coal Ban in the Beijing-Tianjin-Hebei Region of China
Published 2020-09-01“…Abstract Particle-phase air pollution is a leading risk factor for premature death globally and impacts climate by scattering or absorbing radiation and changing cloud properties. Within the Beijing-Tianjin-Hebei region of China, where there are severe air quality problems, several municipalities have begun implementing a coal-to-electricity program that bans residential coal and provides subsidies for electricity and electric-powered heat pumps. …”
Get full text
Article -
1636
Research and implementation of intelligent terminal lightweight face recognition system
Published 2015-11-01“…In order to solve this problem that traditional face recognition scheme was not efficiently suitable to intelligent terminal scene.An improved lightweight scheme of feature weighted clustering matching based on SIFT was presented.The scheme can learn automatically and adaptively add test samples to the training sample space.Reasonable division and scientific distribution of weight make this scheme has improved at run time and recognition rate.The improved algorithm has been tested in the ORL face database and Yale face database,compared with the classical SIFT algorithm the recognition rate improved by 6.13% and 14.11%,the running efficiency increased 9.1% and 4.7%.At the same time,in accordance with the test method by Zhou,in the ORL face database,the recognition rate was up to 74.05%,significantly improved than PCA,LBP and other classical algorithm.The algorithm in Android terminal is implemented,and the improved algorithm is verified to be available in the Android system by experiments.Finally,an improved scheme was proposed based on the cloud architecture.…”
Get full text
Article -
1637
Optimizing vehicle routing and scheduling under time constraints
Published 2024-01-01Get full text
Article -
1638
Research on new frameworks and key technologies for intelligent emergency command communication networks
Published 2023-06-01“…The new generation of emergency command communication network is the basic means and important support for enhancing China’s emergency response capabilities such as national natural disasters and accidents, and is a key component of establishing a scientific emergency management technology system.Focusing on the requirements of communication, navigating, and sensing capabilities in “intelligent emergency”, a theoretical method and framework for intelligent emergency command and communication networks was proposed, which was introduced from three aspects in terms of network deployment, resource allocation, and assisted decision-making.The difficulties and technical ideas of multi-objective dynamic network deployment for communication, navigating, and sensing, multi-dimension efficient resource allocation for communication, computation, and caching, and multi-level decision-making and intelligent enhancement with cloud-edge-terminal collaboration were analyzed and discussed.It provides theoretical methods and key technical supports for building a new generation of emergency command and communication network in China.…”
Get full text
Article -
1639
Design and application of the layered soil moisture monitor for the smart agriculture
Published 2020-12-01“…With the rapid development of the smart agriculture in China,the soil moisture monitoring has become particularly important.But there exist many problems in current monitoring methods,such as difficulties in layout and installation,electrode interference,and single monitoring depth.A soil moisture monitor suitable for the farmland was designed.For the hardware structure,a tube-type non-contact design scheme was adopted,and multiple modules were designed in order to realize the layered non-contact monitoring.For the software protocol,a control strategy of the multi-node access based on the Modbus protocol was proposed,which had the characteristics of high polling efficiency,data stability,and wide monitoring nodes.The data was transmitted to the cloud server through the message queuing telemetry transport (MQTT) protocol for the agricultural analysis and decision-making.The test in the vineyard area shows that the monitor can monitor the moisture content in the range of 0~100% and accuracy of ± 2.45%,which is of certain stability and practicality.…”
Get full text
Article -
1640
Solar Radiation Partitioning and Surface Albedo Parameterization in the Hinterland of Taklimakan Desert
Published 2019-01-01“…The solar radiation partitioning method considers the joint influences of cloud cover, near-surface air pressure, and solar zenith angle and was compared with the method using the Simple Biosphere Model version 3 (SiB3). …”
Get full text
Article