Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
501
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
502
Research development and forecast of automatic speech recognition technologies
Published 2018-02-01“…The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.…”
Get full text
Article -
503
Research on ciphertext search for the cloud environment
Published 2013-07-01“…On the basis of analyzing the ciphertext search technologies in cloud computing environment, a ciphertext search system architecture based on cloud c g environment was proposed and the key technologies of ciphertext search were studied. …”
Get full text
Article -
504
Survey on edge computing technology for autonomous driving
Published 2021-03-01“…Edge computing plays an extremely important role in the environment perception and data processing of autonomous driving.Autonomous driving vehicles can expand their perception scope by obtaining environmental information from edge nodes, and can also deal with the problem of insufficient computing resources by offloading tasks to edge nodes.Compared with cloud computing, edge computing avoids high latency caused by long-distance data transmission, and provides autonomous driving vehicles with faster responses, and relieves the traffic load of the backbone network.Firstly, the edge computing-based cooperative perception and task offloading technologies for autonomous vehicles were introduced firstly, and related challenging issues were also proposed.Then the state-of-the-art of cooperative perception and task offloading technologies were analyzed and summarized.Finally, the problems need to be further studied in this field were discussed.…”
Get full text
Article -
505
Attribute-based fully homomorphic encryption scheme over rings
Published 2017-04-01“…The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted its practical.To improve these drawbacks,a recoding scheme and a attribute-based encryption scheme based on learning with errors problem over rings were provided,then a attribute-based fully homomorphic encryption was constructed.The new scheme overcame the above mentioned drawbacks,because it did't need public key certificate,meanwhile,it can achieve the fine-grained access control to the ciphertext.Compared with similar results,proposed method decreases the size of keys and ciphertext greatly.…”
Get full text
Article -
506
Research on mobile stroke unit based on 5G network technology
Published 2020-01-01“…The 5G mobile stroke unit uses advanced next-generation information and communication technologies such as the Internet of things,mobile Internet,cloud computing,5G,etc.,to connect and achieve healthy interaction with people,equipment,and resources related to health care,which can guarantee people's timely access to preven-tive and therapeutic medical services.The composition design,functional modules,implementation architecture,and innovative service models of 5G mobile stroke units were discussed.The combination of 5G network technology and mobile stroke units were analyzed,and the network requirements of 5G mobile stroke units was analyzed with spe-cific cases.…”
Get full text
Article -
507
التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة
Published 2016-10-01“…Cloud storing is a basic factor in cloud computing that reducescosts for individuals and institutions, saves time and effort in seeking data fromany place in the world. …”
Get full text
Article -
508
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
Get full text
Article -
509
Apply PSO into cloud storage task scheduling with QoS preference awareness
Published 2014-03-01“…The task scheduling algorithm in cloud storage area with QoS preference awareness was studied.Firstly,the differences between cloud storage and cloud computing were pointed,and exist matrix was used to avoid the creation of useless solutions.Secondly,QoS factors were summarized into three classes:time,cost and quality classes.Based on the three classes,the fitness function of the PSO was improved by using weighted factors to adjust the QoS preference.The simulation results release that PSO is not fit for the overall scheduling when the task distributions of different degrees are unevenness because the QoS demand of wide distribution tasks may cover the QoS demand of other tasks.So a hierarchical scheduling based on degree is necessary.The simulation results show that the improved hierarchical PSO scheduling algorithm can aware the QoS preference relevantly.…”
Get full text
Article -
510
Provable Data Recoverability and Hide-Able Access Pattern Based ORAM
Published 2013-12-01“…With the development and application of cloud computing, more and more customers choose cloud storage as the storage medium, therefore, data integrity and privacy become a major problem that the customers concern. …”
Get full text
Article -
511
PCEP application in cloud-network convergence and end to end traffic assurance scheme
Published 2021-08-01“…With the booming development of new technologies such as cloud computing, big data and the continuous upgrading of communication infrastructure, the major domestic ISPs have proposed the development strategy of building a centralized control and flexible cloud network infrastructure under the trend of intelligent-traction network transformation.As a path calculation protocol widely used in the existing SDN architecture, PCEP protocol was often used to solve the problem of cross-layer and cross-domain path computing under complex network environment.The application of PCEP protocol in cloud-network convergence scenario was discussed and an end-to-end traffic guarantee scheme was introduced based on PCEP protocol which could ensure the connection-oriented network communication and make end-to-end service guarantee in native IP environment.It helps to improve the operators' ability of real-time perception, agile response and intelligent analysis of the network and meets the operation and maintenance management requirements such as global scheduling of communication resources, comprehensive opening of capabilities and flexible architecture.…”
Get full text
Article -
512
Virtualization security:the good,the bad and the ugly
Published 2016-10-01“…The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.…”
Get full text
Article -
513
Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud
Published 2021-06-01“…Container technology promotes the rapid development of cloud computing with its flexible and efficient features, but it also introduces security threats such as co-resident attacks, escape attacks, and common mode attacks.In response to these security threats, a dynamic heterogeneous scheduling method based on Stackelberg game in the container cloud was proposed.First, a heterogeneous mirrored resource pool is constructed to suppress the spread of attacks based on common-mode vulnerabilities on the cloud.Then, the offensive and defense interaction process is modeled as a Stackelberg game model.Finally, the offensive and defensive model is analyzed, and the system scheduling problem is modeled as a mixed integer non-linear programming problem to solve the system's optimal scheduling strategy.Experiments show that the proposed method can improve the defense effect of the cloud platform and reduce the system defense overhead.…”
Get full text
Article -
514
Multi-authority ABS supporting dendritic access structure
Published 2017-07-01“…Attribute-based signature (ABS),which could realize fine-grained access control,was considered to be an important method for anonymous authentication in cloud computing.However,normal ABS only provided simple access control through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud.Moreover,the attribute sets were supervised by only one attribute authority,which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached.Aiming at tackling the problems above,a novel scheme,was proposed called multi-authority ABS supporting dendritic access structure which supported any AND,OR and threshold gates and affords more flexible access control.Meanwhile,the attribute sets of users were classified by diverse attribute authorities which reduced the overhead and the risk of systems.Besides,the scheme is proved to be selective predicate chosen message attack secure in the random oracle model.…”
Get full text
Article -
515
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01“…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
Get full text
Article -
516
Bearing technology across the data center based on SDN
Published 2016-03-01“…The development of the internet industry and the rise of cloud computing have created requirements on interconnectivity across data center,and software defined network technology provides important means to solve the network bottleneck problem of data center interconnectivity.Firstly,several commonly used interconnectivity technologies across data center were introduced,and advantages of SDN technology were analyzed.Then,the operator solution of data center interconnectivity bearing technologies based on SDN was put forward,and implementation ideas of this solution were explained.It is a solution which can realize network virtualization across data center,and provide kinds of business functions,such as service customization of user,automatic accessing of network,isolation strategy between different virtual machine,traffic scheduling,the nearest access of user,disaster recovery and backup across data center.…”
Get full text
Article -
517
Cloud native based edge computing: vision and challenges
Published 2021-06-01“…Cloud native computing, featured by low-cost container technology, well fits edge computing.It was proposed to apply cloud native computing to make edge computing resource management and control transparent to application development and operation.Compared with cloud computing, edge computing resources are widely distributed, highly heterogeneous, and fragmented, which called for collaborative resource management and control.According to the development status of cloud native related technologies, through the integration of future networking technologies such as soft were defined network and network function virtualization, a full-stack cloud native based edge computing architecture was proposed.Then, considering the hierarchical characteristics of containers, a low-overhead container deployment optimization problem for resource-limited edge computing was studied.Finally, the development challenges faced by cloud native based edge computing were discussed.…”
Get full text
Article -
518
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01“…The emergence of cloud computing provides a broader platform for multiple data owners to make integrated data publishing and collaborative data mining. …”
Get full text
Article -
519
Survey on research progress for compute first networking
Published 2021-10-01“…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
Get full text
Article -
520
Adopting an Improved Genetic Algorithm for Multi-Objective Service Composition Optimization in Smart Agriculture
Published 2024-12-01“…Hence, to resolve this issue, agriculture is shifting to "smart agriculture," whose focus is to accelerate production using wireless sensor networks, cloud computing and IoT. The service composition is thought to be a crucial component in this technology for increasing functionalities and satisfying user's complex needs. …”
Get full text
Article