Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1701
Rigid-flexible Coupling Modeling and Fault Characteristic Simulation Research of Planetary Transmission System
Published 2021-03-01“…By drawing the stress change curve of the dangerous node, the equivalent stress distribution cloud graph at the time of the maximum stress is obtained. …”
Get full text
Article -
1702
Kinematics and Workspace Analysis of 2P3R Robot
Published 2022-01-01“…Based on the Monte Carlo method,in the Matlab environment,the robot workspace is solved by using the robot toolbox,and the point cloud of the reachable workspace of the end cutter of the robot is depicted. …”
Get full text
Article -
1703
Detailed Parametric Investigation and Optimization of a Composite Wing with High Aspect Ratio
Published 2019-01-01“…Then, the aerodynamic analysis of the wing is performed, and the stress cloud diagram is obtained. Next, the finite element model of the wing is designed, and the static analysis is conducted in the ANSYS ACP module, and the unreasonable component size is changed. …”
Get full text
Article -
1704
Smart bus ticketing system through IoT enabled technology
Published 2022-03-01“…As the project grows in size, all of the data will be transferred to the cloud. As we advance toward a smart bus pass generation system, the trouble of keeping change in pockets will soon be a thing of the past. …”
Get full text
Article -
1705
A LiDAR - camera fusion detection method based on weight allocation
Published 2025-01-01“…The weighted fusion method is adopted, image feature points are extracted by Fast RCNN, and then LiDAR point cloud data is fused into the model by the weighted method, environment variables are introduced, and different weight allocation methods are output under different environments through full connection layer preprocessing. …”
Get full text
Article -
1706
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01“…In order to guarantee the users’ privacy in the process of making friends in the mobile social networks,a new scheme of proxy re-encryption privacy protection in the cross-domain environment was introduced.The scheme employed the cross-domain multi-authority to sharing secret keys,so as to realize the access and shave of the cross-domain users data.And the secret keys of users’ attributes were re-encrypted,based on the technology of the proxy re-encryption and attribute encryption,to achieve the friends matching under the conditions of extending the access policy.Meanwhile,in purpose of enhancing the privacy of users’ data,the technology which contained the separation of users’ privacy ciphertext and secret keys was adopted.Based on that,problems in the existing system such as user data’s inability to be shared cross-cloud,less matching during the process of making friends and users’ inability to make friends when offline had been addressed.Security and experimental analysis show that this scheme can achieve chosen plaintext attack (CPA) security,ensure the privacy of friend discovery,and that is more effective than existing solutions.…”
Get full text
Article -
1707
Certificateless public key cryptography based provable data possession scheme in edge environment
Published 2022-07-01“…In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.…”
Get full text
Article -
1708
Research on Intelligent Networking Architecture for the Integrated Space-Terrestrial Networks
Published 2022-09-01“…The integrated space-terrestrial networks (ISTN), characterized by the high-dynamic of topology, the diversifi cation of services and the constrained resource of satellites, face great challenges in the integration of networking.To achieve network capabilities of intelligent reconstruction, on-demand adjustment, eff ective management and control, the intelligent networking method for ISTN by applying SDN, NFV and artifi cial intelligence were studied.In-depth analysis of the development status of the world-earth fusion network, an intelligent and virtualization-driven world-earth fusion network architecture was proposed.On this basis, to addressed the challenges of intelligent networking brought about by network element heterogeneity, large space-time scale, and diff erentiated service requirements, the multidimensional heterogeneous data plane resource pooling, multi-domain collaborative sensing function on-demand deployment, multi-layer multi-domain hybrid network autonomous control, centralized and distributed network intelligence for "cloud-edge" collaboration, etc.were proposed, which realized on-demand reconstruction of the world-earth fusion network and intelligent service guarantee capabilities.…”
Get full text
Article -
1709
An Energy-Efficient Multisite Offloading Algorithm for Mobile Devices
Published 2013-03-01“…However, with the advent and development of cloud computing, it is more promising for the mobile device to reduce energy consumption by offloading part of computation to multiple remote servers/sites. …”
Get full text
Article -
1710
Intelligent task-oriented semantic communication method in artificial intelligence of things
Published 2021-11-01“…With the integration and development of Internet of things (IoT) and artificial intelligence (AI) technologies, traditional data centralized cloud computing processing methods are difficult to effectively remove a large amount of redundant information in data, which brings challenges to the low-latency and high-precision requirements of intelligent tasks in the artificial intelligence of things (AIoT).In response to this challenge, a semantic communication method oriented to intelligent tasks in AIoT was proposed based on the deep learning method.For image classification tasks, convolutional neural networks (CNN) were used on IoT devices to extract image feature maps.Starting from semantic concepts, semantic concepts and feature maps were associated to extract semantic relationships.Based on the semantic relationships, semantic compression was implemented to reduce the pressure of network transmission and the processing delay of intelligent tasks.Experimental and simulation results show that, compared with traditional communication scheme, the proposed method is only about 0.8% of the traditional scheme, and at the same time it has higher classification task performance.Compared with the scheme that all feature maps are transmitted, the transmission delay of the proposed method is reduced by 80% and the effective accuracy of image classification task is greatly improved.…”
Get full text
Article -
1711
Information Models to Manage Complexity for an Integrated Knowledge Project
Published 2019-06-01“…The methodology is aimed at analysing possible criteria for the enhancement of the data detected in the transition from point cloud to a semantic model, and the management of the level of graphic detail (LoG, Level of Geometry) and information attributes (LoI, Level of Information), in order to define possible procedures to measure the Level of Reliability of the survey. …”
Get full text
Article -
1712
Structural Design of Catenary Equipment Inspection Robots
Published 2023-09-01“…The screw theory and the modern matrix exponential product formula are used to establish the kinematics model; the Matlab Robotics toolbox is used to establish the simulation model and verify the kinematics equation; the Monte Carlo method is used to solve the robot workspace and draw the point cloud map. Finally, Ansys Workbench software is used for finite element analysis of key components, and the strength and stiffness are checked and verified. …”
Get full text
Article -
1713
Design and Realization of Jiujiang Urban Smart Water Platform Based on Digital Twin Technology
Published 2022-01-01“…Nowadays,the digital technology based on digital twin is becoming increasingly mature.To make the water environment treatment of the Yangtze River stable and efficient for a long time,Shanghai Investigation,Design & Research Institute (SIDRI) adopted the advanced concept of smart water in the water environment treatment of the central urban area in Jiujiang,the first pilot city of the Yangtze River Protection,and developed a smart water platform with the digital twin as a core technology.With the digital twin technology,SIDRI built the data base of the city and applied the smart water platform combined with 5G Internet of things,hydraulic modeling and cloud computing technology.Integrating the data of river water regime,water quality,regional rain regime,pump station operation,real-time monitoring of pipe network and other water management content,SIDRI created a spatial-temporal model of the water environment in Jiujiang central urban area with the platform,which improves the efficiency of comprehensive treatment and integrated operation of “plant-network-river-lake-(bank).” …”
Get full text
Article -
1714
Pembangunan Sistem Pemantauan Populariti ahli Politik (SPPP)
Published 2025-02-01“…Matlamat kajian ini adalah untuk membangunkan sistem antara muka mesra pengguna bagi menganalisis status populariti ahli politik secara masa nyata dan seterusnya memvisualisasikan keputusan dalam bentuk grafik seperti carta bar, carta donat dan word cloud. Sistem ini menggunakan analisis sentimen dan teknik pembelajaran mesin Naïve Bayes. …”
Get full text
Article -
1715
Online placement algorithm of service function chain based on knowledge graph
Published 2022-08-01“…The emergence of new network services such as immersive cloud XR and holographic communication puts forward higher requirements for network service quality.To ensure the availability of network services, the network service delay and reliability must be controlled within a certain quality of service according to the attributes and dependencies of network functions.However, the traditional network representation forms, such as bitmap and matrix, cannot cover these key network information, resulting in the information loss in the input stage of the algorithm, which leads to the deviation of the calculation results.Therefore, in order to accurately extract user needs and reflect the dynamic changes of network resources, knowledge graph was adopted to represent the network and its services, an online placement algorithm of service function chain based on knowledge graph was proposed.Based on this, a relationship alignment method based on editing distance was designed to guide the online placement of service function chains under complex dependency relationships.Experimental results show that the proposed algorithm can improve the placement accuracy of service function chain by 10%~15% and reduce the average network energy consumption by about 13%.The proposed algorithm has low complexity and high timeliness.…”
Get full text
Article -
1716
Understanding Ambiguity in Knowledge, Value and Institutional Structure: A Case Study of Chinese Open Network Community
Published 2023-08-01“…We choose The Changtze River Cloud com- munity on TikTok as the survey unit to analyze the public space management satisfaction ratio. …”
Get full text
Article -
1717
Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
Published 2020-03-01“…Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications. …”
Get full text
Article -
1718
Reversible data hiding in encrypted images based on fine-grained embedding room reservation
Published 2022-02-01“…Reversible data hiding in encrypted images has attracted considerable attention due to the privacy-preserving requirement for cloud data management.The good performance in this area can be achieved by using the existing framework of reserving room before encryption, where the image is partitioned to two independent slices consisting of blocks and then traditional reversible data hiding techniques are utilized to vacate room.In order to better exploit the spatial correlation of images, a fine-grained scalable embedding room reservation strategy in which blocks were rearranged to constitute the textured slice and the smooth slice was proposed.The block-size can be adjusted adaptively according to the texture of the images and the size of room to be vacated.The original locations of these blocks were efficiently represented as the to-be-embedded auxiliary information for image restoration.Because pixels in the smooth slice are easier to be predicted, the smooth slice can contain more pixel bits from the textured slice to reserve more room and fewer embedding distortions are induced with traditional reversible data hiding techniques.Extensive experiments demonstrate the merits of the proposed method in terms of embedding capacity and image quality.…”
Get full text
Article -
1719
Optimization of the Intelligent Sports Health Management System Based on Big Data Technology and Internet of Things
Published 2022-01-01“…The system consists of the user, IoT, cloud, system analysis, evaluation, and data layers. …”
Get full text
Article -
1720
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article