Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
481
Model of runtime memory leak detection based on the virtual machine introspection
Published 2013-08-01“…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. …”
Get full text
Article -
482
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
483
Analysis of Bulk Queueing Model with Load Balancing and Vacation
Published 2024-12-01“…In this paper, we incorporated the load-balancing technique used in cloud computing with power business intelligence (BI) and cloud load based on the queueing theoretic approach. …”
Get full text
Article -
484
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic. …”
Get full text
Article -
485
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01“…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
Get full text
Article -
486
Analysis and modeling of Internet backbone traffic with 5G/B5G
Published 2019-08-01“…The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.…”
Get full text
Article -
487
Optimizing strategy of computing off loading energy consumption based on Lagrangian method
Published 2018-12-01“…With the development of mobile network technology and the popularization and application of intelligent terminals,mobile edge computing has become an important application of cloud computing.Computing offloading strategy has become one of the key issues in mobile edge computing services.Targeting the total computing time of the mobile terminal and minimizing the energy consumption of the mobile terminal,the computation offloading resource allocation problem of the mobile terminal was modeled as a convex optimization problem,solved by the Lagrange multiplier method,and a threshold-based offloading was proposed.Simulation experiments show that the proposed offloading optimization strategy model can effectively balance the relationship between local computing and offloading,and provide guarantee for executing computation-intensive applications in mobile edge computing.…”
Get full text
Article -
488
Research of Green Supervision and Service Project System Based on the Cloud Service
Published 2013-05-01“…Therefore,depending on the problems encountered in the project management of the telecommunications industry,a green project super vision thought combined with the cloud computing concept and smart mobile devices was introduced. …”
Get full text
Article -
489
Edge intelligence-assisted routing protocol for Internet of vehicles via reinforcement learning
Published 2023-11-01“…To achieve a highly reliable and adaptive packet routing protocol in a complex urban Internet of vehicles, an end-edge-cloud edge intelligence architecture was proposed which consisted of an end user layer, an edge collaboration layer, and a cloud computing layer.Based on the proposed edge intelligence architecture, an packet routing protocol based on multi-intelligent reinforcement learning technologies was designed.The experimental results show that the proposed protocol could significantly improve the transmission delay and the packet reception rate in the interval of 29.65%~44.06% and 17.08%~25.38% compared to the state-of-the-art transmission mechanism for emergency data (TMED), intersection fog-based distributed routing protocol (IDR), and double deep Q-net based routing protocol (DRP).…”
Get full text
Article -
490
Research on campus emergency command platform incorporating cloud conferencing technology
Published 2024-11-01“…By establishing a campus emergency command platform that integrates cloud conferencing technology, new-generation information technologies like cloud computing, 5G, artificial intelligence, and big data were leveraged to integrate conference room systems, security monitoring systems, and cloud video conferencing systems, which had resulted in a platform capable of multi-terminal on-site response, multi-venue access, secure and stable streaming media data transmission, and comprehensive decision-making assistance. …”
Get full text
Article -
491
Application of Computer-aided Rehabilitation
Published 2019-08-01“…With the rapid development of computer computing technology, big data, artificial intelligence and cloud computing, the application of computer in the field of rehabilitation medicine is more and more extensive. …”
Get full text
Article -
492
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01“…Side-channel attacks were the main ways of multi-tenant information leakage in the cloud computing and data center environments.The existing defense approaches based on dynamic migration of virtual machine have long convergence time of migration algorithm and high migration cost.Hence,a dynamic migration of virtual machine based on security level was proposed.Firstly,security level classification of virtual machines was used to reduce the number of migrating virtual machines.Then the corresponding virtual machines embedding strategy was used to reduce the frequency of virtual machines migration.Simulation experiments demonstrate that the proposed approach can reduce convergence time of migration algorithm and migration cost.…”
Get full text
Article -
493
Corrigendum: Abnormal respiratory sounds classification using deep CNN through artificial noise addition
Published 2025-01-01Get full text
Article -
494
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01“…Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.…”
Get full text
Article -
495
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
496
Development trends of the information technology and cyberspace security
Published 2015-12-01“…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
Get full text
Article -
497
Silicon-Based-Chip Multiplexing Technologies and Devices
Published 2015-10-01“…As the demands of the data communications increase quickly for the applications of cloud-computing as well as data centers,optical interconnects have been very attractive because of the unique advantages on the aspects of low power consumption,high speed and large bandwidth.It is effective to enhance the link capacity by utilizing multiplexing technologies like wavelength-division-multiplexing(WDM),polarization-division-multiplexing(PDM),as well as mode-division-multiplexing(MDM).It will become very useful when these multiplexing technologies are combined to work together as a hybrid multiplexing technology.Definitely the multiplexer is one of the most important devices for a multiplexed optical interconnect link.A review for the recent progress of ultracompact on-chip multiplexers was given,including WDM devices,PDM devices,MDM devices,and hybrid multiplexers.…”
Get full text
Article -
498
Reference architecture of the telecom network security protection system for cloud network convergence
Published 2020-05-01“…Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of its connotation,typical application scenarios and the reconstruction of telecom network by cloud network convergence.Then,the security requirements of telecom network for cloud network convergencewere analyzed from three aspects.Based on the analysis of security requirements,the overall security protection architecture of telecom network for cloud network convergence was put forward,including the construction of basic security protection system and the software-defined security protection system,and the specific levels and contents of the basic security protection system and the software-defined security protection system were elaborated.Finally,the prospect of the future was prospected.…”
Get full text
Article -
499
Identity-based fully homomorphic encryption from learning with error problem
Published 2014-02-01“…The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of such schemes in the key and identity management. …”
Get full text
Article -
500
Realization of vOLT and development trend
Published 2018-07-01“…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
Get full text
Article