Showing 1,661 - 1,680 results of 2,372 for search '"cloud"', query time: 0.05s Refine Results
  1. 1661

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  2. 1662

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article
  3. 1663

    An optimized approach for container deployment driven by a two-stage load balancing mechanism. by Chaoze Lu, Jianchao Zhou, Qifeng Zou

    Published 2025-01-01
    “…Lightweight container technology has emerged as a fundamental component of cloud-native computing, with the deployment of containers and the balancing of loads on virtual machines representing significant challenges. …”
    Get full text
    Article
  4. 1664

    IoT-Based Propane and Butane Pressure Measurement by Frabowo Prasetia, Andi Putra B

    Published 2023-12-01
    “…The sensor receives data then the Arduino processes the data for conversion, the final results will be sent to the cloud using the esp8266 module and then forwarded to the smartphone as a monitoring user to see and also check gas conditions.…”
    Get full text
    Article
  5. 1665

    Task offloading and resource allocation in vehicle heterogeneous networks with MEC by Haibo ZHANG, Qiuji LUAN, Jiang ZHU, Fangwei LI

    Published 2018-09-01
    “…Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.…”
    Get full text
    Article
  6. 1666

    Structural Analysis of Backfill Highway Subgrade on the Lower Bearing Capacity Foundation Using the Finite Element Method by Wenjuan Xu, Xin Huang, Jiandong Huang, Zhengjun Yang

    Published 2021-01-01
    “…Under the condition of a given strength reduction coefficient, the calculated results obtained through FE modeling can show the development of the equivalent plastic zone in the form of cloud diagrams.…”
    Get full text
    Article
  7. 1667

    Improved AB-CPREs with Revocability and HRA Security under LWE by Yang Wang, Mingqiang Wang

    Published 2024-01-01
    “…Attribute-based conditional proxy re-encryption protocols (AB-CPREs) enable a delegator to delegate his decryption rights via different policies and grant the data owner greater flexibility in allocating their encrypted private data stored in the cloud. However, existing lattice-based AB-CPREs suffer from some drawbacks such as large parameters and weak passive securities. …”
    Get full text
    Article
  8. 1668

    Separation and Preconcentration of Copper Ion by Micelle-Mediated Extraction in Aqueous Samples by F. Ahmadi, A. Khanmohammadi, Z. Tavakoli

    Published 2009-01-01
    “…Cloud point extraction (CPE) has been used for preconcentration of copper after the formation of a complex with 5, 5-diphenylimidazolidine-2-thione-,4-one (thiophenytoin) (DFID) and later analysis by flame atomic absorption spectrometry (FAAS) using octylphenoxypolyethoxyethanol (Triton X-114) as surfactant. …”
    Get full text
    Article
  9. 1669

    Study on Evaluating the Sustainability of Innovative Products by Lisha Geng, Jinge Xing, Zaojie Kong, Lixiao Geng, Haiyan Gao

    Published 2019-01-01
    “…Finally, a case study of the cloud rail made by BYD Company in China is provided to illustrate the validity of the proposed calculation process.…”
    Get full text
    Article
  10. 1670

    Blowout Accident Impact Analysis Method for the Siting of Offshore Floating Nuclear Power Plant in Offshore Oil Fields by Zhigang Lan

    Published 2019-01-01
    “…The impacts of blowout accident in offshore oil field on OFNPP are comprehensively analyzed, including injection combustion and spilled oil combustion induced by well blowout, drifting and explosion of deflagration vapor clouds formed by well blowouts, seawater pollution caused by blowout oil spills, the toxic gas cloud caused by well blowout, and the impact of mobile fire source formed by a burning oil spill on OFNPP at sea. …”
    Get full text
    Article
  11. 1671

    Gambaran kematangan emosi mahasiswi penggemar KPOP di Jakarta by Fitriyani Nurhasanah, Melina Lestari

    Published 2024-07-01
    “…The data analysis technique uses Nvivo 14 with Word cloud and Project map features. The results of the study are that kpop fans have reached emotional maturity by showing the development of independence, being able to accept reality, being able to adapt well, how to respond appropriately, having emotional balance, having a sense of empathy and being able to control anger.…”
    Get full text
    Article
  12. 1672

    Comparison of Tooth Root Bending Fatigue Life Between 18CrNiMo7-6 and 20CrMnTi Materials by Daojun Li, Qingbo Lu, Deping Liu

    Published 2021-04-01
    “…Through the finite element analysis software Workbench, the statics analysis of the single tooth of the gear is performed,and then the static analysis result is introduced into the fatigue analysis software FE-SAFE,in combination with the load spectrum information, the fatigue life of the two gears are calculated,and the obtaining life cloud maps are analyzed and compared. The feasibility of the simulation method is verified by experiments. …”
    Get full text
    Article
  13. 1673

    Development of the accounting system in the digital economy by Zh. M. Korzovatykh

    Published 2022-01-01
    “…The current processes of globalisation and digitalisation, the use of cloud technologies, artificial intelligence capabilities, robotics, big data and tools that allow large amounts of information to be processed in a short period of time by economic actors in their practical activities affect the conceptual basis of theoretical and methodological approaches to the organisation of the accounting system, fill the concept of “accounting” with new meaning. …”
    Get full text
    Article
  14. 1674

    Research and prospect of intelligent internet of vehicles based on 5G technology by Rongyue YANG, Pengzhou ZHANG, Qing SONG

    Published 2020-05-01
    “…With the rapid development of 5G communication technology,in the future,V2X will take 5G communication technology as the starting point,integrate 5G vehicle unit,5G base station,5G mobile terminal,5G cloud server and other advanced equipment,to provide comprehensive and high-quality services for multi-type users.Firstly,the key technologies of V2X and its evolution to 5G era were outlined.5G is deeply integrated with the internet of vehicles,which has the technical advantages of relatively low deployment cost and clear evolution route.Then,the application and research status of 5G emerging key technologies such as mobile edge computing (MEC) and network slicing in typical application scenarios of the Internet of vehicles was focused on.Finally,the problems of 5G internet of vehicles in communication interference,network security and privacy protection,communication interference were put forward,and the research direction was pointed out.…”
    Get full text
    Article
  15. 1675

    Key technologies and applications of C-V2X based vehicle-infrastructure cooperative autonomous driving by Kun WANG, Zhenjiang DONG, Fan YANG, Guyue ZHOU

    Published 2023-03-01
    “…With the evolution of vehicle-to-everything (V2X) technology, autonomous driving (AD) has entered a new stage of development, called vehicle-infrastructure cooperative autonomous driving (VICAD).Through the integrated complex cyber-physical system formed by the deep integration of “human-vehicle-road-cloud”, cooperative perception, cooperative decision-making and planning, and even cooperative control can be achieved with autonomous vehicles (AV), enhancing the safety of autonomous driving and helping to overcome various complex traffic environments.The concept and overall architecture of the complex cyber-physical system of VICAD was firstly introduced, and a series of typical application scenarios, technical principles, C-V2X performance requirements, and functional and performance requirements of the VICAD system were proposed.It can provide a reference and solution for the deep integration development of intelligent networked vehicles and intelligent transportation in the next stage.…”
    Get full text
    Article
  16. 1676

    Research and construction of new digital foundation for the fusion between IPv6 and 5G by LIN Chujian, JIAO Baochen, LIANG Zhelong, ZHU Yue, ZHAO Xing, LI Tao

    Published 2024-11-01
    “…Based on the current situation of the campus network of Nankai University, new generation information network technologies such as IPv6 and 5G were studied, a new basic network integrating Wi-Fi campus network and 5G private network based on IPv6 protocol, IPv6 adaptation and application pilot deployment of the information innovation platform was built, a new digital foundation integrating IPv6 and 5G for plug and play against IPv6 was carried out and constructed, a mature cloud network fusion solution for the deployment of smart campus business system and a new basic network environment and trusted computing resources for the training, technology research and innovation of professionals in the next generation Internet related disciplines were provided, and the digital transformation of university education was enabled.…”
    Get full text
    Article
  17. 1677

    Resource allocation strategy based on optimal matching auction in the enterprise network by Xin CONG, Lingling ZI, Xueli SHEN

    Published 2019-08-01
    “…To address the issue that the owners of computer are selfish in the enterprise networks,which caused the low available number of resource nodes and low efficiency of resource allocation,an optimized matching resource allocation strategy OMRA was proposed and its core was the auction mechanism.Selfishness was restrained and the number of available resources was increased by OMRA,so as the operating efficiency of the whole auction market was improved.First,the initial prices were determined by normalizing the costs of different type of resources on the beginning of auction.Secondly,an optimal matching auction algorithm was designed to maximize the interests of the auction markets.Then,service perfecting algorithm was performed such that the sellers could get more services at the current transaction value,thus ensuring the benefits of resource providers.At last,a request price updating algorithm was adopted to assurance that both sellers and buyers could get priorities in the next auction processing.Compared with the cloud resource allocating algorithm via fitness-enabled auction (CRAA/FA),the experiment results indicate that the efficiency of resource allocation improves by 10% and the benefits of market increase by 11.4%.…”
    Get full text
    Article
  18. 1678

    Blockchain-driven distributed consensus mechanism in defensing Byzantine attack for the Internet of spectrum device by Jian YANG, Xi CHEN, Guoru DING, Hangsheng ZHAO, Linyuan ZHANG, Jiachen SUN

    Published 2020-03-01
    “…To meet the requirement of the precisely spectrum sharing triggered by large-scale and ultra-dense deployment of mobile internet and internet of things,a framework based on blockchain technology for networking the massive personal wireless devices to form the Internet of spectrum device (IoSD) was proposed.The architecture of cloud with edge computing was proposed as the architecture of IoSD,which consists of spectrum management server,mobile base station,and personal wireless devices.The mechanism of spectrum data acquisition,spectrum block appending,spectrum data transmission,and spectrum sensing incentive,consist of basic operational mechanism of IoSD.The distributed consensus mechanism,including fusion consensus among sensing-nodes,verification consensusamong checking-nodes,and confirmation consensus among head-nodes,was applied to determine whether the spectrum data was falsified by the Byzantine attack of malicious sensing-nodesunder the hypothesis test of certain confidence.The simulation results show the effectiveness and robustness of proposed distributed consensus mechanism in preventing spectrum sensing data falsification by the malicious nodes.…”
    Get full text
    Article
  19. 1679

    Leveraging an open access platform to provide organizational value in clinical environments by Aida Marissa Smith, Alexia Estabrook, Mary Hyde, Michele Matucheski, Eleanor Shanklin Truex

    Published 2025-01-01
    “…The index uses an open access platform, software intended for reference management with a public-facing cloud option, to minimize expenses. This unconventional use of the platform allowed us to capitalize on the software's bibliographic database management capabilities while allowing us to input institutional-specific metadata. …”
    Get full text
    Article
  20. 1680

    A survey of cybersecurity for intelligent connected-automated vehicle by Yufeng LI, Xiaoyuan LU, Chenhong CAO, Jiangtao LI, Hongyi ZHU, Nan MENG

    Published 2020-04-01
    “…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
    Get full text
    Article