Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
1021
Optimizing strategy of computing off loading energy consumption based on Lagrangian method
Published 2018-12-01“…With the development of mobile network technology and the popularization and application of intelligent terminals,mobile edge computing has become an important application of cloud computing.Computing offloading strategy has become one of the key issues in mobile edge computing services.Targeting the total computing time of the mobile terminal and minimizing the energy consumption of the mobile terminal,the computation offloading resource allocation problem of the mobile terminal was modeled as a convex optimization problem,solved by the Lagrange multiplier method,and a threshold-based offloading was proposed.Simulation experiments show that the proposed offloading optimization strategy model can effectively balance the relationship between local computing and offloading,and provide guarantee for executing computation-intensive applications in mobile edge computing.…”
Get full text
Article -
1022
Research of Green Supervision and Service Project System Based on the Cloud Service
Published 2013-05-01“…Therefore,depending on the problems encountered in the project management of the telecommunications industry,a green project super vision thought combined with the cloud computing concept and smart mobile devices was introduced. …”
Get full text
Article -
1023
Edge intelligence-assisted routing protocol for Internet of vehicles via reinforcement learning
Published 2023-11-01“…To achieve a highly reliable and adaptive packet routing protocol in a complex urban Internet of vehicles, an end-edge-cloud edge intelligence architecture was proposed which consisted of an end user layer, an edge collaboration layer, and a cloud computing layer.Based on the proposed edge intelligence architecture, an packet routing protocol based on multi-intelligent reinforcement learning technologies was designed.The experimental results show that the proposed protocol could significantly improve the transmission delay and the packet reception rate in the interval of 29.65%~44.06% and 17.08%~25.38% compared to the state-of-the-art transmission mechanism for emergency data (TMED), intersection fog-based distributed routing protocol (IDR), and double deep Q-net based routing protocol (DRP).…”
Get full text
Article -
1024
CP-ABE with Hidden Policy from Waters Efficient Construction
Published 2016-01-01“…ABE provides a good way for access controlling in cloud computing. However, in many application scenarios, access policies for encryption also should be protected since they may directly contain sensitive information. …”
Get full text
Article -
1025
Corrigendum: Abnormal respiratory sounds classification using deep CNN through artificial noise addition
Published 2025-01-01Get full text
Article -
1026
Post-Socialist Imaginaries of the Digital Third Front: The Case of Guizhou-Cloud Big Data
Published 2025-03-01“…I deploy the concept of “post-socialist imaginaries” to analyze how Guizhou, an economically lagging province, has positioned itself as a strategic hub for big data and cloud computing. The “politics” refers to the development policies promoting digital innovation as an engine of growth, while the “poetics” involves the discursive framing of big data through fantasies and desires. …”
Get full text
Article -
1027
IT Ecosystem in a Globalized World
Published 2024-12-01“…Companies are constantly looking for talent with experience in emerging technologies such as Artificial Intelligence, Cloud Computing, Cybersecurity and Data Science to remain competitive in the market. …”
Get full text
Article -
1028
Semantic Smart World Framework
Published 2020-01-01“…In order to build the proposed smart world framework, technologies such as cloud computing, semantic technology, big data, data visualization, and the Internet of Things are hybrid. …”
Get full text
Article -
1029
The Role of Digitalization in Enhancing Green Innovation Efficiency: Examination of Multiple Sub-Dimensions, Transformation Speed, and Heterogeneity
Published 2025-06-01“…Key digitalization components, including cloud computing and digital technology applications, emerge as pivotal in improving green innovation efficiency, whereas technologies like artificial intelligence, blockchain, and big data face implementation challenges. …”
Get full text
Article -
1030
Silicon-Based-Chip Multiplexing Technologies and Devices
Published 2015-10-01“…As the demands of the data communications increase quickly for the applications of cloud-computing as well as data centers,optical interconnects have been very attractive because of the unique advantages on the aspects of low power consumption,high speed and large bandwidth.It is effective to enhance the link capacity by utilizing multiplexing technologies like wavelength-division-multiplexing(WDM),polarization-division-multiplexing(PDM),as well as mode-division-multiplexing(MDM).It will become very useful when these multiplexing technologies are combined to work together as a hybrid multiplexing technology.Definitely the multiplexer is one of the most important devices for a multiplexed optical interconnect link.A review for the recent progress of ultracompact on-chip multiplexers was given,including WDM devices,PDM devices,MDM devices,and hybrid multiplexers.…”
Get full text
Article -
1031
Research on network security defense system based on dynamic camouflage technology
Published 2022-01-01“…With the rapid development of Internet of Things, cloud computing, big data, mobile Internet, artificial intelligence and other new technologies, the following security problems are more serious. …”
Get full text
Article -
1032
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
1033
Reference architecture of the telecom network security protection system for cloud network convergence
Published 2020-05-01“…Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of its connotation,typical application scenarios and the reconstruction of telecom network by cloud network convergence.Then,the security requirements of telecom network for cloud network convergencewere analyzed from three aspects.Based on the analysis of security requirements,the overall security protection architecture of telecom network for cloud network convergence was put forward,including the construction of basic security protection system and the software-defined security protection system,and the specific levels and contents of the basic security protection system and the software-defined security protection system were elaborated.Finally,the prospect of the future was prospected.…”
Get full text
Article -
1034
Identity-based fully homomorphic encryption from learning with error problem
Published 2014-02-01“…The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of such schemes in the key and identity management. …”
Get full text
Article -
1035
Realization of vOLT and development trend
Published 2018-07-01“…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
Get full text
Article -
1036
Research on the pathways of empowering ideological and political education in universities with excellent traditional Chinese culture in the age of artificial intelligence
Published 2025-01-01“…Leveraging the informational technology advantages of the AI era, such as the internet, big data, cloud computing, new media, and we-media, this paper delves into and develops resources from China's excellent traditional culture. …”
Get full text
Article -
1037
Bearing technology across the data center based on SDN
Published 2016-03-01“…The development of the internet industry and the rise of cloud computing have created requirements on interconnectivity across data center,and software defined network technology provides important means to solve the network bottleneck problem of data center interconnectivity.Firstly,several commonly used interconnectivity technologies across data center were introduced,and advantages of SDN technology were analyzed.Then,the operator solution of data center interconnectivity bearing technologies based on SDN was put forward,and implementation ideas of this solution were explained.It is a solution which can realize network virtualization across data center,and provide kinds of business functions,such as service customization of user,automatic accessing of network,isolation strategy between different virtual machine,traffic scheduling,the nearest access of user,disaster recovery and backup across data center.…”
Get full text
Article -
1038
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
1039
Research development and forecast of automatic speech recognition technologies
Published 2018-02-01“…The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.…”
Get full text
Article -
1040
A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods
Published 2022-01-01“…Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. …”
Get full text
Article