Showing 1,021 - 1,040 results of 1,622 for search '"cloud computing"', query time: 0.09s Refine Results
  1. 1021

    Optimizing strategy of computing off loading energy consumption based on Lagrangian method by Guangxue YUE, Youkang ZHU, Jiansheng LIU, Yasheng DAI, Zhenxu YOU, Hao XU

    Published 2018-12-01
    “…With the development of mobile network technology and the popularization and application of intelligent terminals,mobile edge computing has become an important application of cloud computing.Computing offloading strategy has become one of the key issues in mobile edge computing services.Targeting the total computing time of the mobile terminal and minimizing the energy consumption of the mobile terminal,the computation offloading resource allocation problem of the mobile terminal was modeled as a convex optimization problem,solved by the Lagrange multiplier method,and a threshold-based offloading was proposed.Simulation experiments show that the proposed offloading optimization strategy model can effectively balance the relationship between local computing and offloading,and provide guarantee for executing computation-intensive applications in mobile edge computing.…”
    Get full text
    Article
  2. 1022

    Research of Green Supervision and Service Project System Based on the Cloud Service by Qiuhong Ye, Jiangbo Zou

    Published 2013-05-01
    “…Therefore,depending on the problems encountered in the project management of the telecommunications industry,a green project super vision thought combined with the cloud computing concept and smart mobile devices was introduced. …”
    Get full text
    Article
  3. 1023

    Edge intelligence-assisted routing protocol for Internet of vehicles via reinforcement learning by Bingyi LIU, Yuhao LIU, Weizhen HAN, Zhenchang XIA, Libing WU, Shengwu XIONG

    Published 2023-11-01
    “…To achieve a highly reliable and adaptive packet routing protocol in a complex urban Internet of vehicles, an end-edge-cloud edge intelligence architecture was proposed which consisted of an end user layer, an edge collaboration layer, and a cloud computing layer.Based on the proposed edge intelligence architecture, an packet routing protocol based on multi-intelligent reinforcement learning technologies was designed.The experimental results show that the proposed protocol could significantly improve the transmission delay and the packet reception rate in the interval of 29.65%~44.06% and 17.08%~25.38% compared to the state-of-the-art transmission mechanism for emergency data (TMED), intersection fog-based distributed routing protocol (IDR), and double deep Q-net based routing protocol (DRP).…”
    Get full text
    Article
  4. 1024

    CP-ABE with Hidden Policy from Waters Efficient Construction by Zhiwei Wang, Mingjun He

    Published 2016-01-01
    “…ABE provides a good way for access controlling in cloud computing. However, in many application scenarios, access policies for encryption also should be protected since they may directly contain sensitive information. …”
    Get full text
    Article
  5. 1025
  6. 1026

    Post-Socialist Imaginaries of the Digital Third Front: The Case of Guizhou-Cloud Big Data by Bingchun Meng

    Published 2025-03-01
    “…I deploy the concept of “post-socialist imaginaries” to analyze how Guizhou, an economically lagging province, has positioned itself as a strategic hub for big data and cloud computing. The “politics” refers to the development policies promoting digital innovation as an engine of growth, while the “poetics” involves the discursive framing of big data through fantasies and desires. …”
    Get full text
    Article
  7. 1027

    IT Ecosystem in a Globalized World by Olga Bernikova, Daria Frolova

    Published 2024-12-01
    “…Companies are constantly looking for talent with experience in emerging technologies such as Artificial Intelligence, Cloud Computing, Cybersecurity and Data Science to remain competitive in the market. …”
    Get full text
    Article
  8. 1028

    Semantic Smart World Framework by K. ElDahshan, E. K. Elsayed, H. Mancy

    Published 2020-01-01
    “…In order to build the proposed smart world framework, technologies such as cloud computing, semantic technology, big data, data visualization, and the Internet of Things are hybrid. …”
    Get full text
    Article
  9. 1029

    The Role of Digitalization in Enhancing Green Innovation Efficiency: Examination of Multiple Sub-Dimensions, Transformation Speed, and Heterogeneity by Tingqian Pu

    Published 2025-06-01
    “…Key digitalization components, including cloud computing and digital technology applications, emerge as pivotal in improving green innovation efficiency, whereas technologies like artificial intelligence, blockchain, and big data face implementation challenges. …”
    Get full text
    Article
  10. 1030

    Silicon-Based-Chip Multiplexing Technologies and Devices by Daoxin Dai, Jian Wang, Sitao Chen

    Published 2015-10-01
    “…As the demands of the data communications increase quickly for the applications of cloud-computing as well as data centers,optical interconnects have been very attractive because of the unique advantages on the aspects of low power consumption,high speed and large bandwidth.It is effective to enhance the link capacity by utilizing multiplexing technologies like wavelength-division-multiplexing(WDM),polarization-division-multiplexing(PDM),as well as mode-division-multiplexing(MDM).It will become very useful when these multiplexing technologies are combined to work together as a hybrid multiplexing technology.Definitely the multiplexer is one of the most important devices for a multiplexed optical interconnect link.A review for the recent progress of ultracompact on-chip multiplexers was given,including WDM devices,PDM devices,MDM devices,and hybrid multiplexers.…”
    Get full text
    Article
  11. 1031

    Research on network security defense system based on dynamic camouflage technology by Ding Zhaohui, Zhang Wei, Yang Guoyu

    Published 2022-01-01
    “…With the rapid development of Internet of Things, cloud computing, big data, mobile Internet, artificial intelligence and other new technologies, the following security problems are more serious. …”
    Get full text
    Article
  12. 1032

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  13. 1033

    Reference architecture of the telecom network security protection system for cloud network convergence by Jian ZHANG, Hongyu TANG, Wentao LIU, Mingxia BO

    Published 2020-05-01
    “…Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of its connotation,typical application scenarios and the reconstruction of telecom network by cloud network convergence.Then,the security requirements of telecom network for cloud network convergencewere analyzed from three aspects.Based on the analysis of security requirements,the overall security protection architecture of telecom network for cloud network convergence was put forward,including the construction of basic security protection system and the software-defined security protection system,and the specific levels and contents of the basic security protection system and the software-defined security protection system were elaborated.Finally,the prospect of the future was prospected.…”
    Get full text
    Article
  14. 1034

    Identity-based fully homomorphic encryption from learning with error problem by Yan GUANG, Yue-fei ZHU, Jin-long FEI, Chun-xiang GU, Yong-hui ZHENG

    Published 2014-02-01
    “…The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of such schemes in the key and identity management. …”
    Get full text
    Article
  15. 1035

    Realization of vOLT and development trend by Fengchao FU, Peng WANG, Yu MAO, Yongmei HUANG, Xiaobing GAO, Aihua ZHANG, Guoqiang LIN

    Published 2018-07-01
    “…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
    Get full text
    Article
  16. 1036

    Research on the pathways of empowering ideological and political education in universities with excellent traditional Chinese culture in the age of artificial intelligence by Wu Yang

    Published 2025-01-01
    “…Leveraging the informational technology advantages of the AI era, such as the internet, big data, cloud computing, new media, and we-media, this paper delves into and develops resources from China's excellent traditional culture. …”
    Get full text
    Article
  17. 1037

    Bearing technology across the data center based on SDN by Hanjiang LIU, Liang OU, Wenhua CHEN, Hong TANG

    Published 2016-03-01
    “…The development of the internet industry and the rise of cloud computing have created requirements on interconnectivity across data center,and software defined network technology provides important means to solve the network bottleneck problem of data center interconnectivity.Firstly,several commonly used interconnectivity technologies across data center were introduced,and advantages of SDN technology were analyzed.Then,the operator solution of data center interconnectivity bearing technologies based on SDN was put forward,and implementation ideas of this solution were explained.It is a solution which can realize network virtualization across data center,and provide kinds of business functions,such as service customization of user,automatic accessing of network,isolation strategy between different virtual machine,traffic scheduling,the nearest access of user,disaster recovery and backup across data center.…”
    Get full text
    Article
  18. 1038

    Federated learning based intelligent edge computing technique for video surveillance by Yu ZHAO, Jie YANG, Miao LIU, Jinlong SUN, Guan GUI

    Published 2020-10-01
    “…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
    Get full text
    Article
  19. 1039

    Research development and forecast of automatic speech recognition technologies by Haikun WANG, Jia PAN, Cong LIU

    Published 2018-02-01
    “…The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.…”
    Get full text
    Article
  20. 1040

    A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods by M.H. Noorallahzade, R. Alimoradi, A. Gholami

    Published 2022-01-01
    “…Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. …”
    Get full text
    Article