Showing 1,941 - 1,960 results of 2,372 for search '"cloud"', query time: 0.04s Refine Results
  1. 1941

    Knowledge Management in Road Accident Detection Based on Developed Deep Learning by Bvss Subbarao, Ramana K

    Published 2023-12-01
    “…The study involves creating a smartphone application that continually reads sensor data and sends it to the cloud for further processing. The crash was discovered by threshold analysis. …”
    Get full text
    Article
  2. 1942

    Investigation and Application of Water-Saving Monitoring Technology in Public Institutions by WANG Kang, ZHENG Yongjie, ZHANG Zhen, TANG Yanping, SONG Wenhao, GUO Xiaoming

    Published 2022-01-01
    “…Considering the characteristics of water use and the current situation of water facilities in public institutions,this study comprehensively employs the Internet of Things (IoT),cloud deployment,databases,three-dimensional (3D) visualization,and other advanced techniques to create a water-saving reconstruction scheme with integrated software and hardware for public institutions.Therefore,a smart water management platform for public institutions is built to implement advanced water-saving concepts and improve the water management level.The main research results are as follows:① By intelligent remote monitoring equipment,the multiclass water measurement network is designed to realize the fine collection of zonal water use data;② this study designs a reconstruction scheme of water facilities and explores the utilization mode of unconventional water sources to improve the utilization efficiency of water resources;③ multiple algorithms and statistical methods are used to analyze the time series of water use data,and thus this study realizes the analysis of pipeline network leakage and damage,identification of water use anomalies,and water-saving statistical analysis,and the investigation of water use laws;④ the platform with functions of monitoring and early warning is established to achieve real-time remote monitoring of water use,statistical analysis of historical water use,and identification and warning of pipe network leakage,so as to detect water anomalies in time and save water.The research results are first applied to the construction of the water-saving institution of the Pearl River Water Resources Commission to build a benchmark for the construction of water-saving institutions in the southern region.On the basis of application experience,the comprehensively integrated monitoring technology for water-saving in public institutions is developed,which provides a new idea for public institutions to save water.…”
    Get full text
    Article
  3. 1943

    Sherlock-Genome: an R Shiny application for genomic analysis and visualization by Alyssa Klein, Jun Zhong, Maria Teresa Landi, Tongwu Zhang

    Published 2025-01-01
    “…Sherlock-Genome supports both local and cloud deployment, facilitating the sharing of results for related publications. …”
    Get full text
    Article
  4. 1944

    The Three-Dimensional Structure of Transatlantic African Dust Transport: A New Perspective from CALIPSO LIDAR Measurements by Dong Liu, Yingjian Wang, Zhien Wang, Jun Zhou

    Published 2012-01-01
    “…We analyzed over two years of LIDAR measurements from NASA’s CALIPSO and CloudSat satellites to document the vertical pathways of transatlantic transport of Saharan dust. …”
    Get full text
    Article
  5. 1945

    STUDY ON ESTIMATION METHOD OF TENSILE STRENGTH OF AIRCRAFT STIFFENED-WELED PLATE by BAI ChengZheng, SONG Xin, SHENG HongWei, SHEN Yang, ZHANG JiaZhen

    Published 2019-01-01
    “…The results show that the cracking state of the weld has no great influence on the tensile strength of the stiffened-welded plate,and through the finite element stress cloud can be observed in the welding plate of the high stress area,showing the failure process,in the future for the new civil welding wall structure design and selection of preresearch stage. …”
    Get full text
    Article
  6. 1946

    A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods by Guangchun Luo, Ningduo Peng, Ke Qin, Aiguo Chen

    Published 2014-01-01
    “…Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. …”
    Get full text
    Article
  7. 1947

    3D Monitoring Model for Real-Time Displacement of Metro Tunnel under “Dual Carbon” Background by Jianyong Chai, Limin Jia, Jian Cao, Jianfeng Liu, Zhe Chen, Shubin Li, Xuejuan Wang, Hong Han

    Published 2024-01-01
    “…This article takes the Jinan Metro Tunnel Displacement Real-time Monitoring Project in China as a case study and constructs a comprehensive monitoring framework using robotic total stations, intelligent automated deformation monitoring data collectors, and cloud servers. The implementation details of the project, displacement monitoring principles, monitoring system construction, and data analysis processes are elaborated in detail. …”
    Get full text
    Article
  8. 1948

    Assessing urban vegetation inequalities: Methodological insights and evidence by Alicia González-Marín, Marco Garrido-Cumbrera

    Published 2025-05-01
    “…ArcGIS was the most widely used GIS platform, closely followed by the cloud-based geospatial analysis platform Google Earth Engine, while R-Studio and Statistical Package for the Social Sciences (SPSS) were popular for statistical analysis. …”
    Get full text
    Article
  9. 1949

    Digital maturity of business: Technological gap and limitations of digital transformation by I. S. Prokhorova, P. M. Gureev

    Published 2023-06-01
    “…As a result of the study, it was found that the main reasons for the unsystematic processes of digitalization of Russian business are the low quality of business digitalization with high digital activity and low technological capabilities for implementing Industry 4.0 technologies due to the limited use of the Internet mobile network in business, business cybersecurity tools, Internet communications and cloud services. The increment of knowledge consists in determining the technological principle of digital business transformation at the global level – this is a mobile device operating on the principles of machine-to-machine interaction M2M with big data IoT (Internet of things) based on 5G speeds and Wi-Fi 6 communication standards, as well as identifying a system of indicators for monitoring the technological basis for managing the “digital maturity” of a business.…”
    Get full text
    Article
  10. 1950

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  11. 1951

    A Bibliometrical Analysis of the Articles on Environmental Education Published between 1973 and 2019 by Muhammed Akif Kurtulus, Nilgun Tatar

    Published 2021-07-01
    “…The database was scanned using “environment/environmental education” keywords and results regarding the annual distributions of the articles; the journals and the authors with the highest number of related articles; h-index scores of the authors; research collaboration networks; the articles that were cited at the highest rates; the average annual citation scores; the citation burst scores of the authors; the results for word cloud and the conceptual mapping patterns obtained were analyzed. …”
    Get full text
    Article
  12. 1952

    Learning a Quantum Computer's Capability by Daniel Hothem, Kevin Young, Tommie Catanach, Timothy Proctor

    Published 2024-01-01
    “…We also apply our CNNs to model the capabilities of cloud-access quantum computing systems, obtaining moderate prediction accuracy (average absolute error around 2–5%), and we highlight the challenges to building better neural network capability models.…”
    Get full text
    Article
  13. 1953

    Teaching a neural network modeling socio-economic development of the region by S. V. Romanchukov, O. G. Berestneva, L. A. Petrova

    Published 2019-11-01
    “…The use of third-party cloud-based software platforms (primarily IBM and Google infrastructures) allows to bypass the problem of the research team’s lack of expensive material and technical base, however they impose a number of limitations dictated by the requirements of the existing machine learning algorithms and the specific architecture provided platforms This puts the research team in front of the need to prepare the accumulated data set for processing: reducing the dimension, checking the data for compliance with the platform requirements and eliminating potential problem areas: “data leaks”, “learning distortions” and others. …”
    Get full text
    Article
  14. 1954

    Enhancing DataOps practices through innovative collaborative models: A systematic review by Aymen Fannouch, Jihane Gharib, Youssef Gahi

    Published 2025-06-01
    “…The study highlights the value of frameworks, methodologies, and advanced technologies—such as automation, cloud platforms, and continuous delivery pipelines—that have reshaped the DataOps landscape. …”
    Get full text
    Article
  15. 1955

    Impact Evaluation of Assimilating Surface Sensitive Infrared Radiance Observations over Land and Sea Ice from Observing System Simulation Experiments by S. K. Dutta, L. Garand, S. Heilliette

    Published 2015-01-01
    “…Some limitations of the OSSE approach are identified, linked to the different forecast systems used for the NR and the assimilation and higher cloud contamination in Polar Regions. This analysis provides useful insight in preparation for the assimilation of real radiance observations.…”
    Get full text
    Article
  16. 1956

    The Impact of Digitalization on the Efficiency of Investment Activity in the Main Sectors of the Ukrainian Economy by Kushnerenko Serhii M.

    Published 2024-06-01
    “…The key role of analyzing the current state of digitalization, determining such key indicators as Internet penetration, the level of automation and the use of cloud technologies is noted, and a comparison of these indicators in accordance with international rankings is carried out. …”
    Get full text
    Article
  17. 1957

    Research on the incentive mechanism of trusted transactions based on blockchain by ZHANG Guiyu, LIU Bowen, LIANG Xiaochen, ZHANG Xiaoyan, LYU Chengjin, YU Sijia, LI Shuo

    Published 2024-08-01
    “…With the development of cloud-network resource transaction technology based on smart contracts, computing power transactions have reached a multi-party scale, seriously affecting the efficiency and credibility of computing network resource transactions. …”
    Get full text
    Article
  18. 1958

    Ear Leaf Photosynthesis and Related Parameters of Transgenic and Non-GMO Maize Hybrids by H. Arnold Bruns

    Published 2015-01-01
    “…Measurements were made between 08:30 h and 11:30 h CST, within 48 h of 25 ha mm irrigation and ≥33.0% cloud cover. Transgenic traits did not influence the physiological parameters of A, gs, Em, IWUE, or Ci during the critical growth stages of R1 or R2.…”
    Get full text
    Article
  19. 1959

    Complex Structure around a Circumstellar Disk Caused by Interchange Instability by Masahiro N. Machida, Shantanu Basu

    Published 2025-01-01
    “…We perform a three-dimensional nonideal magnetohydrodynamic simulation of a strongly magnetized cloud core and investigate the complex structure caused by the interchange instability. …”
    Get full text
    Article
  20. 1960

    Instruments for assessing healthcare professionals’ knowledge, attitudes and practices regarding deprescribing: a scoping review protocol by Luciane Cruz Lopes, Jardel Corrêa de Oliveira, Luis Phillipe Nagem Lopes, Mariana Del Grossi Moura, Ana Carolina Figueiredo Modesto, Laís Lessa Neiva Pantuzza

    Published 2025-01-01
    “…Data will be presented as absolute and relative frequencies, a world heatmap, heatmaps, bar plots or as a word cloud when appropriate.Ethics and dissemination The findings from this review will be discussed with stakeholders and healthcare professionals directly involved in deprescribing processes. …”
    Get full text
    Article