Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1641
Design and Analysis of Satellite Internet Simulation and Verification System for Space Remote Sensing Services
Published 2024-03-01“…The architecture of satellite Internet composed of LEO satellites with remote sensing/inter-satellite and satellite-earth networking, on-board edge computing functions, and ground cloud computing centers, and various types of terminals such as sky, near space, space, ground, sea terminals was put forward.The functional architecture of on-board edge computing, included resource layer, virtualization layer, service layer, service management layer and application layer was given.On the basis of proposed the construction method of on-board edge computing simulation and verification system, a satellite Internet simulation and verification system serving space sensing services was designed, and space-based sensing information processing and distribution experiments were carried out.According to the comparison of network resource occupation and user service delay with different information processing and distribution methods, the capability level of satellite Internet for space sensing services under different capability conditions were analyzed.…”
Get full text
Article -
1642
Analysis and Experimental Study of Automotive Synchronous Belt Transmission Noise
Published 2022-05-01“…The vibration freqency response results are used as boundary element conditions to conduct the acoustic simulation analysis of two pulleys drive of the synchronous belt,the field frequency domain curve and noise distribution cloud image are obtained by simulation. A noise source identification device for synchronous belt transmission is built based on the sound array technology, and the influence of speed on the noise of two kinds of synchronous belt is tested. …”
Get full text
Article -
1643
Teleoperation Robot Control of a Hybrid EEG-Based BCI Arm Manipulator Using ROS
Published 2022-01-01“…Live brain computer interface (BCI) commands from a trained user are successfully harvested and used as an input signal to pick a goal point from 3D point cloud data and calculate the goal position of the robots’ mobile base, placing the goal point in the robot arms workspace. …”
Get full text
Article -
1644
Automatic Pipelining and Vectorization of Scientific Code for FPGAs
Published 2019-01-01“…The backend first creates fine and coarse-grained pipelines and then automatically vectorizes both the memory access and the datapath based on a cost model, generating an OpenCL-HDL hybrid working solution for FPGA targets on the Amazon cloud. Our results show up to 4.2× performance improvement over baseline OpenCL code.…”
Get full text
Article -
1645
METHOD AND FINITE ELEMENT ANALYSIS FOR THE COMPRESSION INSTABILITY ULTIMATE LOAD OF A Z-SHAPED STIFFENED-WELED PLATE
Published 2017-01-01“…For improving the accuracy of the simulation,according to the strength of the welding seam with the cloud image judged the welding sequence,studied on the variation of ultimate load in welding,to determine the limit load range. …”
Get full text
Article -
1646
VMI-based virtual machine remote attestation scheme
Published 2018-12-01“…The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.…”
Get full text
Article -
1647
Resource sharing and incentive mechanism for multi-access edge computing networks
Published 2023-11-01“…A tripartite incentive-enabled edge device resource sharing algorithm was proposed to manage and allocate the shared resources for the “cloud-edge-end” three-tier edge network architecture.Considering the single-point network congestion, network-wide coverage constraint, limited resource constraint and transmission cost constraint, the edge devices were abstracted into different functional nodes to design a convex envelope-based shared node (CESN) selection algorithm to achieve a full-coverage, low-energy shared resource deployment scheme.Secondly, to address the additional cost problem caused by allocating shared resources on edge devices, a tripartite sharing incentive mechanism was designed based on the shared resource leasing model, which guaranteed the long-term and stable participation of edge devices in the sharing mechanism.The simulation results show that the proposed algorithm significantly improves the system energy consumption and node revenue compared to the existing algorithms.…”
Get full text
Article -
1648
Study on the Transmission Characteristic of Disk Type Magnetorheological Fluid with Variable Thickness
Published 2017-01-01“…Based on the finite element simulation of two-dimensional magnetic field by using ANSYS software,and the distribution cloud of magnetic induction intensity under 4 different thicknesses is obtained,then the ability of torque transmission under different thickness is analyzed. …”
Get full text
Article -
1649
Evaluation of Crypto Assets in terms of Digital Legacy Dimension and Inheritance Tax
Published 2024-06-01“…Internet technology, which has become an indispensable part of human life after the acceleration of the digitalisation process, shopping applications, social media accounts, cloud computing and finally cryptocurrencies with blockchain technology have opened the doors to an almost completely digital world. …”
Get full text
Article -
1650
Real-Time Detection of Milk Adulteration with a Portable Multispectral Analysis Device: A Multispectral Sensor and Optimized Logistic Regression Approach
Published 2024-12-01“…Future work will explore the detection of other adulterants and the integration of cloud-based analytics to enhance monitoring capabilities. …”
Get full text
Article -
1651
A Novel Massive Big Data Analysis of Educational Examination Research Using a Linear Mixed-Effects Model
Published 2021-01-01“…Second, we perform spectral clustering based on test data on the basis of defining data attributes and basic evaluation rules. Finally, based on cloud technology, a cross-regional, multiuser educational examination big data analysis and evaluation service platform is developed for evaluating the proposed method. …”
Get full text
Article -
1652
Raindrop size distribution variability associated with size‐dependent advection in convective precipitation systems
Published 2025-01-01“…This study utilized a two‐dimensional simulation with bin cloud microphysics parameterizations to investigate the spatiotemporal variability of DSDs owing to the influence of mesoscale circulation associated with the precipitation system. …”
Get full text
Article -
1653
Research on Wi-Fi indoor positioning technology based on knowledge graph
Published 2022-06-01“…Among the common Wi-Fi indoor positioning methods, most of the research focuses on the positioning accuracy, a little is on the application system to organize and process the existing indoor data efficiently in order to realize the indoor location service.To deal with these issues, the knowledge graph with the traditional indoor positioning technology was combined, and a practical positioning system was built with a variety of software development technologies.The system integrates the physical space and the information space.The information space includes indoor information acquisition, cloud services, information storage and computing parts.The physical space expresses the structure of the indoor space and data relationships.Finally, the WEBGL technology was used to display intuitive positioning and realize the visualization of indoor signal data and positioning results.The system has a complete data storage and use mechanism.After integrating the existing data information of the indoor internet of things equipment, it can provide users with room-level location services.The step-by-step positioning function of the system helps to reduce the time consumption of the system.…”
Get full text
Article -
1654
Optimized design of sensing transmission and computing collaborative industrial Internet
Published 2023-06-01“…In view of the new scenario and time-sensitive requirements of sensing-transmission end to computing end in the industrial Internet, and to solve the problem of end-to-end delay in applications that were not up to standard, a network optimized design scheme for sensing-transmission cooperative computing was proposed.First, the sensing-transmission computing cooperative network architecture based on cloud-edge-end was proposed to promote the deep integration of multidimensional systems and heterogeneous resources.Secondly, the network topology construction mode was optimized to reduce the average path length of the network, shorten the propagation distance, and offset the problem of signal decay due to the use of higher frequencies.Finally, the routing method was improved, and an integrated algorithm of topology optimization and routing strategy was designed to reduce the queuing delay in the network, control the end-to-end delay within a bounded range, and weaken the “long tail phenomenon”.The experimental results show that the scheme reduces the end-to-end delay and ensures the real-time and reliability of the network by optimizing the network topology and routing strategy and integrating the design.…”
Get full text
Article -
1655
Heterogeneous federated bidirectional knowledge distillation transfer semi-supervised modulation recognition
Published 2023-11-01“…The large-scale deployment and rapid development of the new generation mobile communication system underpin the widespread application of a massive and diverse range of Internet of things (IoT) devices.However, the distributed application of IoT devices results to significant disparities in private data and substantial heterogeneity in local processing models, which severely limits the aggregation capability of global intelligent model.Therefore, to tackle the challenges of data heterogeneity, model heterogeneity, and insufficient labeling faced by intelligent modulation recognition in cognitive IoT, an algorithm was proposed for heterogeneous federated bidirectional semi-supervised modulation recognition, which incorporated bidirectional knowledge distillation.In the proposed algorithm, a public pseudo dataset was generated by variational autoencoder in the cloud for supporting uplink global knowledge distillation, and adaptively sharing to the local devices for downlink heterogeneous knowledge distillation, while integrating a semi-supervised algorithm within the distillation process.The simulation results indicate that the proposed algorithm outperforms current federated learning algorithms in terms of effectiveness and applicability in the field of communication signal processing.…”
Get full text
Article -
1656
Simulation Analysis of the Influence Law of Belt Width on the Noise of Automotive Synchronous Belt
Published 2017-01-01“…A finite element analysis model of the ZA automotive synchronous belt drive system is established,the natural frequency characteristic of the automobile synchronous belt transverse vibration and its harmonic response under the action of meshing impact excitation are analyzed,and taking the surface vibration displacement of the synchronous belt obtained by harmonic response analysis as boundary condition,the acoustic boundary element analysis model of the automobile synchronous belt is established by the direct boundary element method that its sound field is closed,the radiated noise of automotive synchronous belt is simulated and analyzed,the sound pressure cloud picture and the frequency response curve of radiation pressure of two synchronous belt with different bandwidth are obtained,and the influence law of the belt width on the vibration and noise of the synchronous belt is studied.…”
Get full text
Article -
1657
Design of task dividing and offloading algorithm in mobile edge computing
Published 2021-06-01“…Mobile edge computing (MEC) emerges as a new paradigm that pushes the computing infrastructure from the remote cloud data center to the edge equipments.It provides a new solution to meet the delay sensitive and computing intensive requirements of Internet of things (IoT).In this work, the problem of tasks offloading and scheduling in the multi-user and multi-server MEC system was considered.Specifically, each user had a task-dependent application and the tasks could be either executed locally or remotely according to the dependence.Thus, the network performance was improved by unloading and scheduling the sub tasks.Quality of experience (QoE) and fairness between users were used to characterize the network performance, and the optimization problem was modeled as a joint dependent task offloading and scheduling (J-DTOS) problem.The J-DTOS problem was a non-linear mixed integer programming, which was NP-hard in general.The original problem was reformulated by introducing intermediate variables and proposing a near-optimal solution.Simulation results show that the proposed offloading and scheduling design can significantly improve the performance of the system.…”
Get full text
Article -
1658
Enhancing 5G Networks with Edge Computing: An Overview Study
Published 2024-01-01“…MEC is a new computing model proposed within the framework of the rapid development of IoT, AI, and big data, aiming to bring cloud capabilities closer to the network edge. Its role is to reduce the distance between the data source and processing resources. …”
Get full text
Article -
1659
Digital technologies: drivers of economic growth during COVID-19 pandemic
Published 2022-05-01“…The problems of economic activity during this period are identified. It was revealed that cloud technologies, digital platforms and blockchain technologies can act as the main drivers of the growth of the pandemic economy. …”
Get full text
Article -
1660
Early Warning Model of Sports Injury Based on RBF Neural Network Algorithm
Published 2021-01-01“…Big data network is a method of capturing Internet information by means of cloud computing, which is usually used in the construction of Wan and LAN. …”
Get full text
Article