Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1661
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
1662
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Published 2019-02-01“…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
Get full text
Article -
1663
An optimized approach for container deployment driven by a two-stage load balancing mechanism.
Published 2025-01-01“…Lightweight container technology has emerged as a fundamental component of cloud-native computing, with the deployment of containers and the balancing of loads on virtual machines representing significant challenges. …”
Get full text
Article -
1664
IoT-Based Propane and Butane Pressure Measurement
Published 2023-12-01“…The sensor receives data then the Arduino processes the data for conversion, the final results will be sent to the cloud using the esp8266 module and then forwarded to the smartphone as a monitoring user to see and also check gas conditions.…”
Get full text
Article -
1665
Task offloading and resource allocation in vehicle heterogeneous networks with MEC
Published 2018-09-01“…Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.…”
Get full text
Article -
1666
Structural Analysis of Backfill Highway Subgrade on the Lower Bearing Capacity Foundation Using the Finite Element Method
Published 2021-01-01“…Under the condition of a given strength reduction coefficient, the calculated results obtained through FE modeling can show the development of the equivalent plastic zone in the form of cloud diagrams.…”
Get full text
Article -
1667
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…Attribute-based conditional proxy re-encryption protocols (AB-CPREs) enable a delegator to delegate his decryption rights via different policies and grant the data owner greater flexibility in allocating their encrypted private data stored in the cloud. However, existing lattice-based AB-CPREs suffer from some drawbacks such as large parameters and weak passive securities. …”
Get full text
Article -
1668
Separation and Preconcentration of Copper Ion by Micelle-Mediated Extraction in Aqueous Samples
Published 2009-01-01“…Cloud point extraction (CPE) has been used for preconcentration of copper after the formation of a complex with 5, 5-diphenylimidazolidine-2-thione-,4-one (thiophenytoin) (DFID) and later analysis by flame atomic absorption spectrometry (FAAS) using octylphenoxypolyethoxyethanol (Triton X-114) as surfactant. …”
Get full text
Article -
1669
Study on Evaluating the Sustainability of Innovative Products
Published 2019-01-01“…Finally, a case study of the cloud rail made by BYD Company in China is provided to illustrate the validity of the proposed calculation process.…”
Get full text
Article -
1670
Blowout Accident Impact Analysis Method for the Siting of Offshore Floating Nuclear Power Plant in Offshore Oil Fields
Published 2019-01-01“…The impacts of blowout accident in offshore oil field on OFNPP are comprehensively analyzed, including injection combustion and spilled oil combustion induced by well blowout, drifting and explosion of deflagration vapor clouds formed by well blowouts, seawater pollution caused by blowout oil spills, the toxic gas cloud caused by well blowout, and the impact of mobile fire source formed by a burning oil spill on OFNPP at sea. …”
Get full text
Article -
1671
Gambaran kematangan emosi mahasiswi penggemar KPOP di Jakarta
Published 2024-07-01“…The data analysis technique uses Nvivo 14 with Word cloud and Project map features. The results of the study are that kpop fans have reached emotional maturity by showing the development of independence, being able to accept reality, being able to adapt well, how to respond appropriately, having emotional balance, having a sense of empathy and being able to control anger.…”
Get full text
Article -
1672
Comparison of Tooth Root Bending Fatigue Life Between 18CrNiMo7-6 and 20CrMnTi Materials
Published 2021-04-01“…Through the finite element analysis software Workbench, the statics analysis of the single tooth of the gear is performed,and then the static analysis result is introduced into the fatigue analysis software FE-SAFE,in combination with the load spectrum information, the fatigue life of the two gears are calculated,and the obtaining life cloud maps are analyzed and compared. The feasibility of the simulation method is verified by experiments. …”
Get full text
Article -
1673
Development of the accounting system in the digital economy
Published 2022-01-01“…The current processes of globalisation and digitalisation, the use of cloud technologies, artificial intelligence capabilities, robotics, big data and tools that allow large amounts of information to be processed in a short period of time by economic actors in their practical activities affect the conceptual basis of theoretical and methodological approaches to the organisation of the accounting system, fill the concept of “accounting” with new meaning. …”
Get full text
Article -
1674
Research and prospect of intelligent internet of vehicles based on 5G technology
Published 2020-05-01“…With the rapid development of 5G communication technology,in the future,V2X will take 5G communication technology as the starting point,integrate 5G vehicle unit,5G base station,5G mobile terminal,5G cloud server and other advanced equipment,to provide comprehensive and high-quality services for multi-type users.Firstly,the key technologies of V2X and its evolution to 5G era were outlined.5G is deeply integrated with the internet of vehicles,which has the technical advantages of relatively low deployment cost and clear evolution route.Then,the application and research status of 5G emerging key technologies such as mobile edge computing (MEC) and network slicing in typical application scenarios of the Internet of vehicles was focused on.Finally,the problems of 5G internet of vehicles in communication interference,network security and privacy protection,communication interference were put forward,and the research direction was pointed out.…”
Get full text
Article -
1675
Key technologies and applications of C-V2X based vehicle-infrastructure cooperative autonomous driving
Published 2023-03-01“…With the evolution of vehicle-to-everything (V2X) technology, autonomous driving (AD) has entered a new stage of development, called vehicle-infrastructure cooperative autonomous driving (VICAD).Through the integrated complex cyber-physical system formed by the deep integration of “human-vehicle-road-cloud”, cooperative perception, cooperative decision-making and planning, and even cooperative control can be achieved with autonomous vehicles (AV), enhancing the safety of autonomous driving and helping to overcome various complex traffic environments.The concept and overall architecture of the complex cyber-physical system of VICAD was firstly introduced, and a series of typical application scenarios, technical principles, C-V2X performance requirements, and functional and performance requirements of the VICAD system were proposed.It can provide a reference and solution for the deep integration development of intelligent networked vehicles and intelligent transportation in the next stage.…”
Get full text
Article -
1676
Research and construction of new digital foundation for the fusion between IPv6 and 5G
Published 2024-11-01“…Based on the current situation of the campus network of Nankai University, new generation information network technologies such as IPv6 and 5G were studied, a new basic network integrating Wi-Fi campus network and 5G private network based on IPv6 protocol, IPv6 adaptation and application pilot deployment of the information innovation platform was built, a new digital foundation integrating IPv6 and 5G for plug and play against IPv6 was carried out and constructed, a mature cloud network fusion solution for the deployment of smart campus business system and a new basic network environment and trusted computing resources for the training, technology research and innovation of professionals in the next generation Internet related disciplines were provided, and the digital transformation of university education was enabled.…”
Get full text
Article -
1677
Resource allocation strategy based on optimal matching auction in the enterprise network
Published 2019-08-01“…To address the issue that the owners of computer are selfish in the enterprise networks,which caused the low available number of resource nodes and low efficiency of resource allocation,an optimized matching resource allocation strategy OMRA was proposed and its core was the auction mechanism.Selfishness was restrained and the number of available resources was increased by OMRA,so as the operating efficiency of the whole auction market was improved.First,the initial prices were determined by normalizing the costs of different type of resources on the beginning of auction.Secondly,an optimal matching auction algorithm was designed to maximize the interests of the auction markets.Then,service perfecting algorithm was performed such that the sellers could get more services at the current transaction value,thus ensuring the benefits of resource providers.At last,a request price updating algorithm was adopted to assurance that both sellers and buyers could get priorities in the next auction processing.Compared with the cloud resource allocating algorithm via fitness-enabled auction (CRAA/FA),the experiment results indicate that the efficiency of resource allocation improves by 10% and the benefits of market increase by 11.4%.…”
Get full text
Article -
1678
Blockchain-driven distributed consensus mechanism in defensing Byzantine attack for the Internet of spectrum device
Published 2020-03-01“…To meet the requirement of the precisely spectrum sharing triggered by large-scale and ultra-dense deployment of mobile internet and internet of things,a framework based on blockchain technology for networking the massive personal wireless devices to form the Internet of spectrum device (IoSD) was proposed.The architecture of cloud with edge computing was proposed as the architecture of IoSD,which consists of spectrum management server,mobile base station,and personal wireless devices.The mechanism of spectrum data acquisition,spectrum block appending,spectrum data transmission,and spectrum sensing incentive,consist of basic operational mechanism of IoSD.The distributed consensus mechanism,including fusion consensus among sensing-nodes,verification consensusamong checking-nodes,and confirmation consensus among head-nodes,was applied to determine whether the spectrum data was falsified by the Byzantine attack of malicious sensing-nodesunder the hypothesis test of certain confidence.The simulation results show the effectiveness and robustness of proposed distributed consensus mechanism in preventing spectrum sensing data falsification by the malicious nodes.…”
Get full text
Article -
1679
Leveraging an open access platform to provide organizational value in clinical environments
Published 2025-01-01“…The index uses an open access platform, software intended for reference management with a public-facing cloud option, to minimize expenses. This unconventional use of the platform allowed us to capitalize on the software's bibliographic database management capabilities while allowing us to input institutional-specific metadata. …”
Get full text
Article -
1680
A survey of cybersecurity for intelligent connected-automated vehicle
Published 2020-04-01“…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
Get full text
Article