Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
421
Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television
Published 2021-01-01“…Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. …”
Get full text
Article -
422
An edge cloud–based body data sensing architecture for artificial intelligence computation
Published 2019-04-01“…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
Get full text
Article -
423
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01“…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
Get full text
Article -
424
Cloud-Based Service for Fingerprint Image Matching
Published 2024-09-01“…The proposed service exploits the advantages provided by cloud computing, such as ease of use, availability of the service anytime and anywhere, and no need to own expensive devices with high specifications, in addition to being low cost. …”
Get full text
Article -
425
Survey on Giant Constellation Cloud Network Integration
Published 2023-06-01“…Thanks to the development of aerospace technology and the rise of concepts such as cloud computing and edge computing, cloud network convergence networks based on giant constellations are expected to become an important part of the integrated construction of star-ground and 6G global communication networks.Unlike terrestrial communication networks, constellation network topology is highly dynamic and time-varying, with strong resource and link heterogeneity, and other characteristics that pose challenges for cloud network convergence.The characteristics of giant constellations and the development status of terrestrial cloud network convergence was summarized, the urgent needs and challenges of cloud network convergence in giant constellations were analyzed, and the innovation of satellite internet cloud network convergence architecture, the use of resource virtualization technology, information sensing and routing path planning based on artificial intelligence algorithms, and cloud computing and edge collaborative computing were potential directions for future satellite-based cloud network convergence technology development direction were further pointed out.…”
Get full text
Article -
426
Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter
Published 2015-01-01“…Cloud computing is an on-demand computing model, which uses virtualization technology to provide cloud resources to users in the form of virtual machines through internet. …”
Get full text
Article -
427
Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
Published 2018-01-01“…Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. …”
Get full text
Article -
428
Innovative IaaS Management System for Sensor Devices and IT Resources
Published 2014-06-01“…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
Get full text
Article -
429
QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm
Published 2015-01-01“…It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE) seriously. …”
Get full text
Article -
430
An Improved DR Algorithm Based on Target Extrapolating in ROIA Cloud Platform
Published 2013-12-01“…So we try to take advantage of the cloud computing technologies to achieve higher scalability and resource utilization. …”
Get full text
Article -
431
A Service Based Adaptive U-Learning System Using UX
Published 2014-01-01“…In the cloud computing environment, a learning service application can provide a business module or process to the user via the internet. …”
Get full text
Article -
432
Application of edge-cloud collaborative intelligence technologies in power grids
Published 2021-03-01“…With the continuous development of the Internet of things on electricity (IoTE) and large-scale deployment of intelligent edge devices, an explosively increasing amount of data are being generated at the network edge.The efficient, fast and secure processing and analysis of the massive edge located data brings great challenges for the traditional cloud computing-based intelligence technologies.Instead, edge-cloud collaborative intelligence (ECCI) technologies can significantly outperform the cloud computing-based intelligence in terms of the network bandwidth saving, delay reduction and privacy protection, and therefore have shown a great potential in boosting the development of power grids.To investigate the application of ECCI in power grids, the concept and research progress of ECCI were firstly introduced.The characteristics and advantages of ECCI were summarized and its applicability in the power grids were discussed.Secondly, the key technologies of ECCI applications for power grids were discussed and the solutions based on ECCI technologies for two typical scenes were proposed respectively.Finally, a brief discussion of future work was given.…”
Get full text
Article -
433
Cloud federation three-layer architecture: game-theoretic QoS modeling
Published 2024-09-01“…The experimental results indicate that the proposed solution improved the service quality of cloud computing environments and revealed the relative advantages of running cooperation and competition modes in cloud federation.…”
Get full text
Article -
434
Cybersecurity and Liability in a Big Data World
Published 2018-10-01“… The interplay between big data and cloud computing is at the same time undoubtedly promising, challenging and puzzling. …”
Get full text
Article -
435
A Dynamic Task Scheduling Algorithm for Airborne Device Clouds
Published 2024-01-01“…The rapid development of mobile Internet has promoted the rapid rise of cloud computing technology. Mobile terminal devices have greatly expanded the service capacity of mobile terminals by migrating complex computing tasks to run in the cloud. …”
Get full text
Article -
436
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
437
A fair multi-resource allocation mechanism for time-varying discrete jobs with placement constraints
Published 2024-12-01“…A key issue in resource sharing in cloud computing is how to fairly and efficiently allocate the multi-resources to users with dynamic demand. …”
Get full text
Article -
438
Analysis on the Prewarning Distance of Expressway Traffic Based on Lane-Selection Cell Transmission Model
Published 2023-01-01Get full text
Article -
439
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Published 2015-01-01“…Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. …”
Get full text
Article -
440
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
Published 2025-01-01“…Cloud computing centralizes resources in distant data centers, leading to high latency and increased network congestion, while edge computing, though closer to data sources, lacks the agility to dynamically adapt to fluctuating workloads, user mobility, and real-time requirements. …”
Get full text
Article