Showing 541 - 560 results of 691 for search '"cloud computing"', query time: 0.10s Refine Results
  1. 541

    Task offloading and resource allocation in vehicle heterogeneous networks with MEC by Haibo ZHANG, Qiuji LUAN, Jiang ZHU, Fangwei LI

    Published 2018-09-01
    “…Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.…”
    Get full text
    Article
  2. 542

    Resource scheduling optimization in cloud-edge collaboration by Shuling WANG, Jie SUN, Peng WANG, Aidong YANG

    Published 2023-02-01
    “…With the enrichment and diversification of business types, low latency, high bandwidth, data privacy and high reliability have become common requirements.Edge computing, fog computing, distributed cloud, computing power network and other solutions have been proposed, and have triggered in-depth research and exploration in industry, academia and research.There is a consensus within and outside the industry on the view that “multi-level computing power distribution and collaboration of computing power will be the mainstream of computing power structure in the future”.The problems related to resource scheduling optimization, such as computing power management, allocation, scheduling, have also become the current research hotspot and key research direction.Therefore, for the future computing power supply structure, focuses on the latest progress of resource scheduling optimization in academia and industry, the current main methodology and engineering implementation architecture was summarized.And then, for the two typical cloud edge collaboration scenarios, the analysis was carried out from the perspective of scene splitting, scheduling objectives, and solutions in turn, and the resource scheduling optimization reference schemes that adapted to the characteristics of the scenarios were analyzed and discussed respectively.…”
    Get full text
    Article
  3. 543

    Space-Air-Ground Integrated Network Architecture Based on Mobile Edge Computing by Jian WU, Min JIA, Qing GUO

    Published 2024-03-01
    “…The next generation of wireless communication technologies will enhance the quality of user experience by supporting services such as intelligent transportation, intelligent healthcare, virtual/augmented reality, and more.These emerging services are typically computation-intensive and delay-sensitive, and must meet stringent delay, energy consumption, and reliability requirements that cloud-based services struggle to meet.In order to solve the above problems, mobile edge computing (MEC) technology was proposed to solve the problems of high latency and high bandwidth consumption when sending offloading requests back to the cloud computing centers.As an important research direction of 6G , space-air-ground integrated network (SAGIN) could make up for the huge coverage gap in the world, and had been widely concerned.This paper introduced MEC technology, federated learning technology and artificial intelligence technology into SAGIN to efficiently manage massive and heterogeneous resources in the network, and builded low-delay, low-energy consumption and high-reliability SAGIN to support various emerging services.…”
    Get full text
    Article
  4. 544

    Application of BIM+GIS in Water Resources Allocation Project of the Pearl River Delta by DU Canyang, DENG Peng, ZHANG Zhaobo, ZHU Xiaobin

    Published 2022-01-01
    “…On this basis,new information technologies such as BIM,GIS,electronic signature,cloud computing,big data,Internet of Things (IoT),artificial intelligence (AI),and mobile Internet are applied to build a whole-life-cycle BIM+GIS system platform by integrated innovation and collaborative sharing. …”
    Get full text
    Article
  5. 545

    Cooperative game based bandwidth allocation mechanism live migration of multiple virtual machines by Yong CUI, Yu-song LIN, Run-zhi LI, Zong-min WANG

    Published 2016-04-01
    “…In IaaS cloud computing platform, live migration of virtual machines plays a significant role in resource dy-namic dispatching and management. …”
    Get full text
    Article
  6. 546

    Technologies for Interoperable Internet of Medical Things Platforms to Manage Medical Emergencies in Home and Prehospital Care: Scoping Review by Mattias Seth, Hoor Jalo, Åsa Högstedt, Otto Medin, Bengt Arne Sjöqvist, Stefan Candefjord

    Published 2025-01-01
    “…Message queuing telemetry transport (MQTT; 7/30, 23%) and WebSocket (7/30, 23%) were commonly used for real-time emergency alerts, while fog and edge computing were often combined with cloud computing for enhanced processing power and reduced latencies. …”
    Get full text
    Article
  7. 547

    Large-Scale Real-Time Semantic Processing Framework for Internet of Things by Xi Chen, Huajun Chen, Ningyu Zhang, Jue Huang, Wen Zhang

    Published 2015-10-01
    “…Nowadays, the advanced sensor technology with cloud computing and big data is generating large-scale heterogeneous and real-time IOT (Internet of Things) data. …”
    Get full text
    Article
  8. 548

    Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform by Yuancheng LI, Yongtai QIN

    Published 2023-05-01
    “…., a novel algorithm based on deep reinforcement learning for optimizing QoS in software defined security middle platforms (SDSmp) in real-time was proposed.Firstly, the fragmented security requirements and infrastructure were integrated into the SDSmp cloud model.Then by leveraging the power of deep reinforcement learning and cloud computing technology, the real-time matching and dynamic adaptation capabilities of the security middle platform were enhanced.Finally, a real-time scheduling strategy for security middle platform resources that meet QoS goals was generated.Experimental results demonstrate that compared to existing real-time methods, the proposed algorithm not only ensures load balancing but also improves job success rate by 18.7% for high QoS and reduces the average response time by 34.2%, and it is highly robust and better suited for real-time environments than existing methods.…”
    Get full text
    Article
  9. 549

    An Energy-Efficient Multisite Offloading Algorithm for Mobile Devices by Ruifang Niu, Wenfang Song, Yong Liu

    Published 2013-03-01
    “…However, with the advent and development of cloud computing, it is more promising for the mobile device to reduce energy consumption by offloading part of computation to multiple remote servers/sites. …”
    Get full text
    Article
  10. 550

    Intelligent task-oriented semantic communication method in artificial intelligence of things by Chuanhong LIU, Caili GUO, Yang YANG, Chunyan FENG, Qizheng SUN, Jiujiu CHEN

    Published 2021-11-01
    “…With the integration and development of Internet of things (IoT) and artificial intelligence (AI) technologies, traditional data centralized cloud computing processing methods are difficult to effectively remove a large amount of redundant information in data, which brings challenges to the low-latency and high-precision requirements of intelligent tasks in the artificial intelligence of things (AIoT).In response to this challenge, a semantic communication method oriented to intelligent tasks in AIoT was proposed based on the deep learning method.For image classification tasks, convolutional neural networks (CNN) were used on IoT devices to extract image feature maps.Starting from semantic concepts, semantic concepts and feature maps were associated to extract semantic relationships.Based on the semantic relationships, semantic compression was implemented to reduce the pressure of network transmission and the processing delay of intelligent tasks.Experimental and simulation results show that, compared with traditional communication scheme, the proposed method is only about 0.8% of the traditional scheme, and at the same time it has higher classification task performance.Compared with the scheme that all feature maps are transmitted, the transmission delay of the proposed method is reduced by 80% and the effective accuracy of image classification task is greatly improved.…”
    Get full text
    Article
  11. 551

    Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring by Alde Alanda, H.A Mooduto, Ronal Hadi

    Published 2023-09-01
    “… As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. …”
    Get full text
    Article
  12. 552

    Design and Realization of Jiujiang Urban Smart Water Platform Based on Digital Twin Technology by CHEN Guobiao

    Published 2022-01-01
    “…Nowadays,the digital technology based on digital twin is becoming increasingly mature.To make the water environment treatment of the Yangtze River stable and efficient for a long time,Shanghai Investigation,Design & Research Institute (SIDRI) adopted the advanced concept of smart water in the water environment treatment of the central urban area in Jiujiang,the first pilot city of the Yangtze River Protection,and developed a smart water platform with the digital twin as a core technology.With the digital twin technology,SIDRI built the data base of the city and applied the smart water platform combined with 5G Internet of things,hydraulic modeling and cloud computing technology.Integrating the data of river water regime,water quality,regional rain regime,pump station operation,real-time monitoring of pipe network and other water management content,SIDRI created a spatial-temporal model of the water environment in Jiujiang central urban area with the platform,which improves the efficiency of comprehensive treatment and integrated operation of “plant-network-river-lake-(bank).” …”
    Get full text
    Article
  13. 553

    Adaptive distributed cloud edge collaborative load control strategy for load management by LI Siwei, JIN Li, YU Long, DU Lishi, YUE Liang, ZHANG Xirun

    Published 2024-08-01
    “…Secondly, considering the similarity of computing tasks of different edge nodes, the optimization goal was to minimize the time cost of all computing tasks, and the cloud computing resource allocation strategy was given to allocate computing resources reasonably. …”
    Get full text
    Article
  14. 554

    An intelligent and simplified 5G wireless network technology by Yuhong HUANG, Qi SUN, Minli JIA, Ran DUAN, Zhuo CHEN

    Published 2021-05-01
    “…5G is the current focus of the development of the information and communication industry, and is gradually being deployed and commercialized.The 5G network will cover toC to toB, aiming at the interconnection of everything, so the complexity and challenges are unprecedented.In order to meet the needs of multiple scenarios, 5G network technology is complex and flexible in design, and the traditional management and operation methods are difficult and costly.At the same time, industry application requirements are very different and demanding.All of these require integrated solutions such as cloud-network integration and network industry collaboration.In response to the above-mentioned problems and needs, an intelligent and simplified 5G wireless network technology framework was proposed.Through innovative thinking and technology development of wireless networks, 5G and artificial intelligence, cloud computing, big data, edge computing and other new technologies were integrated and innovated to continuously improve 5G capabilities and promote the deep convergence of 5G and DOICT.A detailed introduction to the entire framework, platforms and applications in the above technology system were given.Finally, a technical outlook was proposed for shaping a new 5G ecology that supported green, smart, efficient operation, and the internet of everything.…”
    Get full text
    Article
  15. 555

    A Service Recommendation Method Based on Requirements for the Cloud Environment by Liangmin Guo, Kaixuan Luan, Xiaoyao Zheng, Jing Qian

    Published 2021-01-01
    “…In the cloud computing environment, there are huge amounts of functionally similar cloud services. …”
    Get full text
    Article
  16. 556

    Spectral Expansion Method for Cloud Reliability Analysis by K. Kotteswari, A. Bharathi

    Published 2019-01-01
    “…Cloud computing is a computing hypothesis, where a huge group of systems is linked together in private, public, or hybrid network, to offer dynamically amendable infrastructure for data storage, file storage, and application. …”
    Get full text
    Article
  17. 557

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article
  18. 558

    Energy Conservation Using Dynamic Voltage Frequency Scaling for Computational Cloud by A. Paulin Florence, V. Shanthi, C. B. Sunil Simon

    Published 2016-01-01
    “…Cloud computing is a new technology which supports resource sharing on a “Pay as you go” basis around the world. …”
    Get full text
    Article
  19. 559

    V2X offloading and resource allocation under SDN and MEC architecture by Haibo ZHANG, Zixin WANG, Xiaofan HE

    Published 2020-01-01
    “…To address the serious problem of delay and energy consumption increase and service quality degradation caused by complex network status and huge amounts of computing data in the scenario of vehicle-to-everything (V2X),a vehicular network architecture combining mobile edge computing (MEC) and software defined network (SDN) was constructed.MEC sinks cloud serviced to the edge of the wireless network to compensate for the delay fluctuation caused by remote cloud computing.The SDN controller could sense network information from a global perspective,flexibly schedule resources,and control offload traffic.To further reduce the system overhead,a joint task offloading and resource allocation scheme was proposed.By modeling the MEC-based V2X offloading and resource allocation,the optimal offloading decision,communication and computing resource allocation scheme were derived.Considering the NP-hard attribute of the problem,Agglomerative Clustering was used to select the initial offloading node,and Q-learning was used for resource allocation.The offloading decision was modeled as an exact potential game,and the existence of Nash equilibrium was proved by the potential function structure.The simulation results show that,as compared to other mechanisms,the proposed mechanism can effectively reduce the system overhead.…”
    Get full text
    Article
  20. 560

    Survey on data security and privacy-preserving for the research of edge computing by Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU

    Published 2018-03-01
    “…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
    Get full text
    Article