Showing 1,701 - 1,720 results of 2,372 for search '"cloud"', query time: 0.06s Refine Results
  1. 1701

    Rigid-flexible Coupling Modeling and Fault Characteristic Simulation Research of Planetary Transmission System by Zihan Wang, Fuzhou Feng, Hua Cong, Jie Wang

    Published 2021-03-01
    “…By drawing the stress change curve of the dangerous node, the equivalent stress distribution cloud graph at the time of the maximum stress is obtained. …”
    Get full text
    Article
  2. 1702

    Kinematics and Workspace Analysis of 2P3R Robot by Pengpeng Deng, Chunyan Zhang, Zhaolou Gao, Shengwen Zhang, Chuanlin Hu

    Published 2022-01-01
    “…Based on the Monte Carlo method,in the Matlab environment,the robot workspace is solved by using the robot toolbox,and the point cloud of the reachable workspace of the end cutter of the robot is depicted. …”
    Get full text
    Article
  3. 1703

    Detailed Parametric Investigation and Optimization of a Composite Wing with High Aspect Ratio by Yu-shan Meng, Li Yan, Wei Huang, Tian-tian Zhang

    Published 2019-01-01
    “…Then, the aerodynamic analysis of the wing is performed, and the stress cloud diagram is obtained. Next, the finite element model of the wing is designed, and the static analysis is conducted in the ANSYS ACP module, and the unreasonable component size is changed. …”
    Get full text
    Article
  4. 1704

    Smart bus ticketing system through IoT enabled technology by Agyan Kumar, Antônio Clécio Fontelles Thomaz

    Published 2022-03-01
    “…As the project grows in size, all of the data will be transferred to the cloud. As we advance toward a smart bus pass generation system, the trouble of keeping change in pockets will soon be a thing of the past. …”
    Get full text
    Article
  5. 1705

    A LiDAR - camera fusion detection method based on weight allocation by Kang Haotian, Wang Tianshu

    Published 2025-01-01
    “…The weighted fusion method is adopted, image feature points are extracted by Fast RCNN, and then LiDAR point cloud data is fused into the model by the weighted method, environment variables are introduced, and different weight allocation methods are output under different environments through full connection layer preprocessing. …”
    Get full text
    Article
  6. 1706

    Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks by En-tao LUO, Guo-jun WANG, Shu-hong CHEN, Khan-butt PINIAL

    Published 2017-10-01
    “…In order to guarantee the users’ privacy in the process of making friends in the mobile social networks,a new scheme of proxy re-encryption privacy protection in the cross-domain environment was introduced.The scheme employed the cross-domain multi-authority to sharing secret keys,so as to realize the access and shave of the cross-domain users data.And the secret keys of users’ attributes were re-encrypted,based on the technology of the proxy re-encryption and attribute encryption,to achieve the friends matching under the conditions of extending the access policy.Meanwhile,in purpose of enhancing the privacy of users’ data,the technology which contained the separation of users’ privacy ciphertext and secret keys was adopted.Based on that,problems in the existing system such as user data’s inability to be shared cross-cloud,less matching during the process of making friends and users’ inability to make friends when offline had been addressed.Security and experimental analysis show that this scheme can achieve chosen plaintext attack (CPA) security,ensure the privacy of friend discovery,and that is more effective than existing solutions.…”
    Get full text
    Article
  7. 1707

    Certificateless public key cryptography based provable data possession scheme in edge environment by Ziyuan WANG, Ruizhong DU

    Published 2022-07-01
    “…In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.…”
    Get full text
    Article
  8. 1708

    Research on Intelligent Networking Architecture for the Integrated Space-Terrestrial Networks by Tingting ZHANG, Nan WU, Haipeng YAO

    Published 2022-09-01
    “…The integrated space-terrestrial networks (ISTN), characterized by the high-dynamic of topology, the diversifi cation of services and the constrained resource of satellites, face great challenges in the integration of networking.To achieve network capabilities of intelligent reconstruction, on-demand adjustment, eff ective management and control, the intelligent networking method for ISTN by applying SDN, NFV and artifi cial intelligence were studied.In-depth analysis of the development status of the world-earth fusion network, an intelligent and virtualization-driven world-earth fusion network architecture was proposed.On this basis, to addressed the challenges of intelligent networking brought about by network element heterogeneity, large space-time scale, and diff erentiated service requirements, the multidimensional heterogeneous data plane resource pooling, multi-domain collaborative sensing function on-demand deployment, multi-layer multi-domain hybrid network autonomous control, centralized and distributed network intelligence for "cloud-edge" collaboration, etc.were proposed, which realized on-demand reconstruction of the world-earth fusion network and intelligent service guarantee capabilities.…”
    Get full text
    Article
  9. 1709

    An Energy-Efficient Multisite Offloading Algorithm for Mobile Devices by Ruifang Niu, Wenfang Song, Yong Liu

    Published 2013-03-01
    “…However, with the advent and development of cloud computing, it is more promising for the mobile device to reduce energy consumption by offloading part of computation to multiple remote servers/sites. …”
    Get full text
    Article
  10. 1710

    Intelligent task-oriented semantic communication method in artificial intelligence of things by Chuanhong LIU, Caili GUO, Yang YANG, Chunyan FENG, Qizheng SUN, Jiujiu CHEN

    Published 2021-11-01
    “…With the integration and development of Internet of things (IoT) and artificial intelligence (AI) technologies, traditional data centralized cloud computing processing methods are difficult to effectively remove a large amount of redundant information in data, which brings challenges to the low-latency and high-precision requirements of intelligent tasks in the artificial intelligence of things (AIoT).In response to this challenge, a semantic communication method oriented to intelligent tasks in AIoT was proposed based on the deep learning method.For image classification tasks, convolutional neural networks (CNN) were used on IoT devices to extract image feature maps.Starting from semantic concepts, semantic concepts and feature maps were associated to extract semantic relationships.Based on the semantic relationships, semantic compression was implemented to reduce the pressure of network transmission and the processing delay of intelligent tasks.Experimental and simulation results show that, compared with traditional communication scheme, the proposed method is only about 0.8% of the traditional scheme, and at the same time it has higher classification task performance.Compared with the scheme that all feature maps are transmitted, the transmission delay of the proposed method is reduced by 80% and the effective accuracy of image classification task is greatly improved.…”
    Get full text
    Article
  11. 1711

    Information Models to Manage Complexity for an Integrated Knowledge Project by Raissa Garozzo, Massimiliano Lo Turco, Cettina Santagati

    Published 2019-06-01
    “…The methodology is aimed at analysing possible criteria for the enhancement of the data detected in the transition from point cloud to a semantic model, and the management of the level of graphic detail (LoG, Level of Geometry) and information attributes (LoI, Level of Information), in order to define possible procedures to measure the Level of Reliability of the survey. …”
    Get full text
    Article
  12. 1712

    Structural Design of Catenary Equipment Inspection Robots by Tao Zhutong, Wang Guozhi, Li Rongduo

    Published 2023-09-01
    “…The screw theory and the modern matrix exponential product formula are used to establish the kinematics model; the Matlab Robotics toolbox is used to establish the simulation model and verify the kinematics equation; the Monte Carlo method is used to solve the robot workspace and draw the point cloud map. Finally, Ansys Workbench software is used for finite element analysis of key components, and the strength and stiffness are checked and verified. …”
    Get full text
    Article
  13. 1713

    Design and Realization of Jiujiang Urban Smart Water Platform Based on Digital Twin Technology by CHEN Guobiao

    Published 2022-01-01
    “…Nowadays,the digital technology based on digital twin is becoming increasingly mature.To make the water environment treatment of the Yangtze River stable and efficient for a long time,Shanghai Investigation,Design & Research Institute (SIDRI) adopted the advanced concept of smart water in the water environment treatment of the central urban area in Jiujiang,the first pilot city of the Yangtze River Protection,and developed a smart water platform with the digital twin as a core technology.With the digital twin technology,SIDRI built the data base of the city and applied the smart water platform combined with 5G Internet of things,hydraulic modeling and cloud computing technology.Integrating the data of river water regime,water quality,regional rain regime,pump station operation,real-time monitoring of pipe network and other water management content,SIDRI created a spatial-temporal model of the water environment in Jiujiang central urban area with the platform,which improves the efficiency of comprehensive treatment and integrated operation of “plant-network-river-lake-(bank).” …”
    Get full text
    Article
  14. 1714

    Pembangunan Sistem Pemantauan Populariti ahli Politik (SPPP) by How Yee Lu, Zuraini Zainol

    Published 2025-02-01
    “…Matlamat kajian ini adalah untuk membangunkan sistem antara muka mesra pengguna bagi menganalisis status populariti ahli politik secara masa nyata dan seterusnya memvisualisasikan keputusan dalam bentuk grafik seperti carta bar, carta donat dan word cloud. Sistem ini menggunakan analisis sentimen dan teknik pembelajaran mesin Naïve Bayes. …”
    Get full text
    Article
  15. 1715

    Online placement algorithm of service function chain based on knowledge graph by Zexi XU, Lei ZHUANG, Kunli ZHANG, Mingyu GUI

    Published 2022-08-01
    “…The emergence of new network services such as immersive cloud XR and holographic communication puts forward higher requirements for network service quality.To ensure the availability of network services, the network service delay and reliability must be controlled within a certain quality of service according to the attributes and dependencies of network functions.However, the traditional network representation forms, such as bitmap and matrix, cannot cover these key network information, resulting in the information loss in the input stage of the algorithm, which leads to the deviation of the calculation results.Therefore, in order to accurately extract user needs and reflect the dynamic changes of network resources, knowledge graph was adopted to represent the network and its services, an online placement algorithm of service function chain based on knowledge graph was proposed.Based on this, a relationship alignment method based on editing distance was designed to guide the online placement of service function chains under complex dependency relationships.Experimental results show that the proposed algorithm can improve the placement accuracy of service function chain by 10%~15% and reduce the average network energy consumption by about 13%.The proposed algorithm has low complexity and high timeliness.…”
    Get full text
    Article
  16. 1716

    Understanding Ambiguity in Knowledge, Value and Institutional Structure: A Case Study of Chinese Open Network Community by Yao Jin

    Published 2023-08-01
    “…We choose The Changtze River Cloud com- munity on TikTok as the survey unit to analyze the public space management satisfaction ratio. …”
    Get full text
    Article
  17. 1717

    Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment by Yuan Gao, Hequn Xian, Aimin Yu

    Published 2020-03-01
    “…Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications. …”
    Get full text
    Article
  18. 1718

    Reversible data hiding in encrypted images based on fine-grained embedding room reservation by Jinwei LI, Xiaoya ZHANG, Yuanzhi YAO, Nenghai YU

    Published 2022-02-01
    “…Reversible data hiding in encrypted images has attracted considerable attention due to the privacy-preserving requirement for cloud data management.The good performance in this area can be achieved by using the existing framework of reserving room before encryption, where the image is partitioned to two independent slices consisting of blocks and then traditional reversible data hiding techniques are utilized to vacate room.In order to better exploit the spatial correlation of images, a fine-grained scalable embedding room reservation strategy in which blocks were rearranged to constitute the textured slice and the smooth slice was proposed.The block-size can be adjusted adaptively according to the texture of the images and the size of room to be vacated.The original locations of these blocks were efficiently represented as the to-be-embedded auxiliary information for image restoration.Because pixels in the smooth slice are easier to be predicted, the smooth slice can contain more pixel bits from the textured slice to reserve more room and fewer embedding distortions are induced with traditional reversible data hiding techniques.Extensive experiments demonstrate the merits of the proposed method in terms of embedding capacity and image quality.…”
    Get full text
    Article
  19. 1719

    Optimization of the Intelligent Sports Health Management System Based on Big Data Technology and Internet of Things by Jian Dang

    Published 2022-01-01
    “…The system consists of the user, IoT, cloud, system analysis, evaluation, and data layers. …”
    Get full text
    Article
  20. 1720

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article