Showing 421 - 440 results of 691 for search '"cloud computing"', query time: 0.12s Refine Results
  1. 421

    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television by Youwen Ma, Yi Wan

    Published 2021-01-01
    “…Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. …”
    Get full text
    Article
  2. 422

    An edge cloud–based body data sensing architecture for artificial intelligence computation by TaeYoung Kim, JongBeom Lim

    Published 2019-04-01
    “…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
    Get full text
    Article
  3. 423

    Research on the trusted environment of container cloud based on the TPCM by Guojie LIU, Jianbiao ZHANG, Ping YANG, Zheng LI

    Published 2021-08-01
    “…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
    Get full text
    Article
  4. 424

    Cloud-Based Service for Fingerprint Image Matching by Ethar Abdul Wahhab Hachim

    Published 2024-09-01
    “…The proposed service exploits the advantages provided by cloud computing, such as ease of use, availability of the service anytime and anywhere, and no need to own expensive devices with high specifications, in addition to being low cost. …”
    Get full text
    Article
  5. 425

    Survey on Giant Constellation Cloud Network Integration by Dan ZHANG, Jingjing LI, Tian LIU, Sunjie TAO, Ziping LYU

    Published 2023-06-01
    “…Thanks to the development of aerospace technology and the rise of concepts such as cloud computing and edge computing, cloud network convergence networks based on giant constellations are expected to become an important part of the integrated construction of star-ground and 6G global communication networks.Unlike terrestrial communication networks, constellation network topology is highly dynamic and time-varying, with strong resource and link heterogeneity, and other characteristics that pose challenges for cloud network convergence.The characteristics of giant constellations and the development status of terrestrial cloud network convergence was summarized, the urgent needs and challenges of cloud network convergence in giant constellations were analyzed, and the innovation of satellite internet cloud network convergence architecture, the use of resource virtualization technology, information sensing and routing path planning based on artificial intelligence algorithms, and cloud computing and edge collaborative computing were potential directions for future satellite-based cloud network convergence technology development direction were further pointed out.…”
    Get full text
    Article
  6. 426

    Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter by Shyamala Loganathan, Saswati Mukherjee

    Published 2015-01-01
    “…Cloud computing is an on-demand computing model, which uses virtualization technology to provide cloud resources to users in the form of virtual machines through internet. …”
    Get full text
    Article
  7. 427

    Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System by Ruoshui Liu, Jianghui Liu, Jingjie Zhang, Moli Zhang

    Published 2018-01-01
    “…Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. …”
    Get full text
    Article
  8. 428

    Innovative IaaS Management System for Sensor Devices and IT Resources by Hitomi Takahashi, Takayuki Kushida

    Published 2014-06-01
    “…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
    Get full text
    Article
  9. 429

    QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm by Weihang Shi

    Published 2015-01-01
    “…It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE) seriously. …”
    Get full text
    Article
  10. 430

    An Improved DR Algorithm Based on Target Extrapolating in ROIA Cloud Platform by Dong Liu

    Published 2013-12-01
    “…So we try to take advantage of the cloud computing technologies to achieve higher scalability and resource utilization. …”
    Get full text
    Article
  11. 431

    A Service Based Adaptive U-Learning System Using UX by Hwa-Young Jeong, Gangman Yi

    Published 2014-01-01
    “…In the cloud computing environment, a learning service application can provide a business module or process to the user via the internet. …”
    Get full text
    Article
  12. 432

    Application of edge-cloud collaborative intelligence technologies in power grids by Qing HAN, Kunlun GAO, Ting ZHAO, Jiangqi CHEN, Xinyu YANG, Shusen YANG

    Published 2021-03-01
    “…With the continuous development of the Internet of things on electricity (IoTE) and large-scale deployment of intelligent edge devices, an explosively increasing amount of data are being generated at the network edge.The efficient, fast and secure processing and analysis of the massive edge located data brings great challenges for the traditional cloud computing-based intelligence technologies.Instead, edge-cloud collaborative intelligence (ECCI) technologies can significantly outperform the cloud computing-based intelligence in terms of the network bandwidth saving, delay reduction and privacy protection, and therefore have shown a great potential in boosting the development of power grids.To investigate the application of ECCI in power grids, the concept and research progress of ECCI were firstly introduced.The characteristics and advantages of ECCI were summarized and its applicability in the power grids were discussed.Secondly, the key technologies of ECCI applications for power grids were discussed and the solutions based on ECCI technologies for two typical scenes were proposed respectively.Finally, a brief discussion of future work was given.…”
    Get full text
    Article
  13. 433

    Cloud federation three-layer architecture: game-theoretic QoS modeling by MA Kun, HU Chuangyue, ZHANG Yuzhi, MA Fangchao, WANG Xiaodong, DANG Zhonghua, XIAO Wenhong, CHEN Shuangxi

    Published 2024-09-01
    “…The experimental results indicate that the proposed solution improved the service quality of cloud computing environments and revealed the relative advantages of running cooperation and competition modes in cloud federation.…”
    Get full text
    Article
  14. 434

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “… The interplay between big data and cloud computing is at the same time undoubtedly promising, challenging and puzzling. …”
    Get full text
    Article
  15. 435

    A Dynamic Task Scheduling Algorithm for Airborne Device Clouds by Bao Deng, Zhengjun Zhai

    Published 2024-01-01
    “…The rapid development of mobile Internet has promoted the rapid rise of cloud computing technology. Mobile terminal devices have greatly expanded the service capacity of mobile terminals by migrating complex computing tasks to run in the cloud. …”
    Get full text
    Article
  16. 436

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  17. 437

    A fair multi-resource allocation mechanism for time-varying discrete jobs with placement constraints by LI Jie, WANG Jianzhou

    Published 2024-12-01
    “…A key issue in resource sharing in cloud computing is how to fairly and efficiently allocate the multi-resources to users with dynamic demand. …”
    Get full text
    Article
  18. 438
  19. 439

    Investigation Methodology of a Virtual Desktop Infrastructure for IoT by Doowon Jeong, Jungheum Park, Sangjin Lee, Chulhoon Kang

    Published 2015-01-01
    “…Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. …”
    Get full text
    Article
  20. 440

    Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities by Marica Amadeo, Giuseppe Ruggeri

    Published 2025-01-01
    “…Cloud computing centralizes resources in distant data centers, leading to high latency and increased network congestion, while edge computing, though closer to data sources, lacks the agility to dynamically adapt to fluctuating workloads, user mobility, and real-time requirements. …”
    Get full text
    Article