Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
521
Merging Agents and Cloud Services in Industrial Applications
Published 2014-01-01“…A novel idea to combine agent technology and cloud computing for monitoring a plant floor system is presented. …”
Get full text
Article -
522
Survey on computation offloading in mobile edge computing
Published 2018-11-01“…Computation offloading in mobile edge computing would transfer the resource intensive computational tasks to the edge network.It can not only solve the shortage of mobile user equipment in resource storage,computation performance and energy efficiency,but also deal with the problem of resource occupation,high latency and network load compared to cloud computing.Firstly the architecture of MEC was introduce and a comparative analysis was made according to various deployment schemes.Then the key technologies of computation offloading was studied from three aspects of decision on computation offloading,allocation of computing resource within MEC and system implement of MEC.Based on the analysis of MEC deployment scheme in 5G,two optimization schemes on computation offloading was proposed in 5G MEC.Finally,the current challenges in the mobility management was summarized,interference management and security of computation offloading in MEC.…”
Get full text
Article -
523
Service aware base station processing resource allocation for centralized radio access network
Published 2018-08-01“…Current research on resource allocation algorithmsmainly focuses on data centers,and cloud computing environments.These resource allocation algorithms did not consideRthe diversity of processing resources(CPU,memory,network bandwidth,FPGA,DSP)and the diversity of service types in the centralized base station,resulting in the low processing resource utilization.In ordeRto solve this problem,a service oriented base station processing resource allocation algorithm was proposed.Firstly,the Fisher partitionmethod was used to classify the base station’s processing resource requirements according to the user’s service request.Then,the resource allocation balancing strategy was used to allocate the base station processing resources.Experimental results show that the algorithm is effective to reduce the number of physi cal servers and improves the resource utilization of the servers,realizing energy conservation and communications.…”
Get full text
Article -
524
Secure deployment strategy of virtual machines based on operating system diversity
Published 2017-10-01“…The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and data by compromising the user's entire virtual machine at a smaller cost.In view of this security threat,a strategy for the security deployment of virtual machine based on operating system diversity was presented.This method firstly recommended an operating system configuration options for users applying for virtual machines with the highest degree in diversity,and then through the secure deployment strategy,maximized the effect of diversity,thus making the attacker pay more cost.The experimental results show that compared with the method of single operating system,this method can reduce the attack efficiency by 33.46% at least.…”
Get full text
Article -
525
Green city: An efficient task joint execution strategy for mobile micro-learning
Published 2018-06-01“…Mobile micro-learning has received extensive attention in the research of smart cities because it is a novel fusion service mode of the mobile Internet, cloud computing, and micro-learning. However, due to the explosively increased applications of the mobile micro-learning and the limited resources of mobile terminals, an effective energy saving approach for mobile micro-learning is urgently required. …”
Get full text
Article -
526
Time series data based AI operation and maintenance system of cloud network collaboration platform
Published 2022-11-01“…The expansion of cloud computing in enterprise applications is not only the expansion of platform scale, but also the extension of platform applications.…”
Get full text
Article -
527
Intelligent forecasting and monitoring of air index based on big data and internet of things
Published 2017-11-01“…Air quality forecast has become an urgent need.However,numerical forecast of air quality is a complex systems engineering.The intelligent forecasting of air index was studied from the perspective of big data and intelligent decision making.For the index prediction of air quality,the popular classification algorithm was introduced to realize the intelligent analysis of historical data.To obtain air quality information in real time,a monitoring system based on Internet of Things was established,and intelligent processing of real-time data collected by the classification algorithm was achieved.Due to the large amount of historical air index data and real-time data collected,the technology of cloud computing and big data was introduced to speed up the data processing and improve the storage of data.In addition,the client based on Android was developed to allow users to query the air quality anytime,anywhere.…”
Get full text
Article -
528
Heterogeneous multi-layer mobile edge computing for 6G
Published 2020-03-01“…With the development of the Internet of things,multiple real-time applications will emerge in future 6G communication network.Driven by demands on low-latency services of multiple real-time applications,mobile edge computing (MEC) will become an important technology to improve the user experience and reduce the network cost.However,the computing capacity of a single MEC server is limited,which induces that it is difficult to meet the low-latency requirement of data processing for the computation-intensive applications.A heterogeneous multi-layer mobile edge computing (HetMEC) network architecture was proposed to jointly utilize the computing and transmission resources of both the cloud computing center and multi-layer MEC servers.By reasonably dividing and offloading computing tasks,reliable and efficient computing services were provided for edge applications.Simulation results show that the proposed algorithm could effectively reduce the processing latency,improve the network processing rate and robustness.…”
Get full text
Article -
529
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system. …”
Get full text
Article -
530
Offshore aquaculture platform control system in intelligent fishery era
Published 2021-12-01“…The control system of offshore aquaculture platform was analyzed and the collaborative control technology with edge intelligence was introduced under the open architecture of cloud computing.A distributed intelligent control mode was established.A general framework architecture of cloud-edge collaborative control system for offshore aquaculture platform and an open architecture of intelligent aquaculture cloud platform were proposed exploratively, which could be deployed flexibly with different patterns of cloud-network-edge-terminal-intelligence.A development idea of control system and an implementation scheme of could central control and edge intelligence for offshore aquaculture platform were put forward.An attempt was made to build the theoretical framework and ideology system of cloud-edge collaborative control, and it was to construct the manner with the whole process of intelligent aquaculture and land-sea linkage operation and management mode for offshore fish-farm, with a view to finally realizing the intelligent fishery industrial ecology and green sustainable development goals.…”
Get full text
Article -
531
Blockchain empowered 6G
Published 2020-03-01“…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
Get full text
Article -
532
Dynamic and adaptive access control model
Published 2016-11-01“…With the development of cloud computing technology, smart city and mobile office and emergence of mobile smart devices, the resources' environment is increasing complex. …”
Get full text
Article -
533
Design and Analysis of Satellite Internet Simulation and Verification System for Space Remote Sensing Services
Published 2024-03-01“…The architecture of satellite Internet composed of LEO satellites with remote sensing/inter-satellite and satellite-earth networking, on-board edge computing functions, and ground cloud computing centers, and various types of terminals such as sky, near space, space, ground, sea terminals was put forward.The functional architecture of on-board edge computing, included resource layer, virtualization layer, service layer, service management layer and application layer was given.On the basis of proposed the construction method of on-board edge computing simulation and verification system, a satellite Internet simulation and verification system serving space sensing services was designed, and space-based sensing information processing and distribution experiments were carried out.According to the comparison of network resource occupation and user service delay with different information processing and distribution methods, the capability level of satellite Internet for space sensing services under different capability conditions were analyzed.…”
Get full text
Article -
534
Toward efficient dynamic virtual network embedding strategy for cloud networks
Published 2018-03-01“…Network virtualization is one of the most promising technologies for future networking and considered as a critical information technology resource that connects distributed, virtualized cloud computing services and different components such as storage, servers, and application. …”
Get full text
Article -
535
VMI-based virtual machine remote attestation scheme
Published 2018-12-01“…The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.…”
Get full text
Article -
536
Privacy cloud storage scheme based on fog computing
Published 2019-03-01“…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
Get full text
Article -
537
Evaluation of Crypto Assets in terms of Digital Legacy Dimension and Inheritance Tax
Published 2024-06-01“…Internet technology, which has become an indispensable part of human life after the acceleration of the digitalisation process, shopping applications, social media accounts, cloud computing and finally cryptocurrencies with blockchain technology have opened the doors to an almost completely digital world. …”
Get full text
Article -
538
Early Warning Model of Sports Injury Based on RBF Neural Network Algorithm
Published 2021-01-01“…Big data network is a method of capturing Internet information by means of cloud computing, which is usually used in the construction of Wan and LAN. …”
Get full text
Article -
539
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
540
Cloud-edge collaboration based computer vision inference mechanism
Published 2021-05-01“…The popularity of deep learning and cloud computing has promoted the widespread application of computer vision in various industries.However, centralized cloud inference services have problems such as high bandwidth resource consumption, image data privacy leakage, and high latency.It is hard that satisfy demand which requires diversified computer vision application.The dual gigabit upgrade of the communication network will promote depth collaboration of computer vision cloud-edge algorithms.Aiming to study the computer vision inference mechanism based on cloud-edge collaboration.Firstly, the advantages and disadvantages of the mainstream cloud and edge computer vision inference models in recent years were analyzed and explained, and on this basis, research on the cloud-edge collaborative computer vision inference model framework and deployment mechanism was carried out, model distributed reasoning model segmentation strategy, cloud-side collaborative network deployment optimization strategy was discussed in detail.In the end, the challenge and prospect of deep learning cloud-edge collaboration inference in future was discussed through data collaboration, network partition collaboration, and business function collaboration .…”
Get full text
Article