Showing 1,061 - 1,080 results of 1,622 for search '"cloud computing"', query time: 0.08s Refine Results
  1. 1061

    issue of developing Digital economy of Mongolia by Badamdorj Batkhishig

    Published 2023-10-01
    “…The author believes that digital technology system consists of various technologies, such as Big Data, high-speed wireless Internet, blockchain, cloud computing, Internet of things, artificial intelligence, 3D printing, virtual reality and others. …”
    Get full text
    Article
  2. 1062

    The Development and Application of Computers and Information Technology in the Military by Zhang Yinxiong

    Published 2025-01-01
    “…It then discusses related disciplines, including big data, the Internet of Things (IoT), cloud computing, and sensor technologies, along with relevant concepts and practical applications, providing theoretical support for the research. …”
    Get full text
    Article
  3. 1063

    THE IMPACT OF INTERNET-OF-THINGS IN HIGHER EDUCATION by Logica BANICA, Emil BURTESCU, Florentina ENESCU

    Published 2017-07-01
    “…In our study, we demonstrate that the optimal technical solution for academia are IoT Platforms with real-time, limited-area service provision using Cloud Computing services.…”
    Get full text
    Article
  4. 1064

    Research on System of System Simulation Technology Based on Cloud Platform by WANG Huixia, CHEN Yicheng, TAN Lang, LIU Jiarun

    Published 2018-01-01
    “…The development of computer technology, information technology and network technology has promoted the development of simulation technology, from single platform to multi-platform, from object-oriented method to service-oriented method.With the study of systematic simulation technologies, a layered simulation architecture based on cloud computing was proposed in this paper. The simulation system can be used to verify the countermeasure strategy of system, and also provide support for making and optimizing operational plans.…”
    Get full text
    Article
  5. 1065

    Research on data integration privacy preservation mechanism for DaaS by Zhi-gang ZHOU, Hong-li ZHANG, Xiang-zhan YU, Pan-pan LI

    Published 2016-04-01
    “…The emergence of cloud computing provides a broader platform for multiple data owners to make integrated data publishing and collaborative data mining. …”
    Get full text
    Article
  6. 1066

    Time series data based AI operation and maintenance system of cloud network collaboration platform by Ruiying CHENG, Pan ZHANG, Yu XIAO, Yujie QIAO, Anyi ZHANG

    Published 2022-11-01
    “…The expansion of cloud computing in enterprise applications is not only the expansion of platform scale, but also the extension of platform applications.…”
    Get full text
    Article
  7. 1067

    Survey on research progress for compute first networking by Qingmin JIA, Rui DING, Hui LIU, Chen ZHANG, Renchao XIE

    Published 2021-10-01
    “…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
    Get full text
    Article
  8. 1068

    Survey on computation offloading in mobile edge computing by Renchao XIE, Xiaofei LIAN, Qingmin JIA, Tao HUANG, Yunjie LIU

    Published 2018-11-01
    “…Computation offloading in mobile edge computing would transfer the resource intensive computational tasks to the edge network.It can not only solve the shortage of mobile user equipment in resource storage,computation performance and energy efficiency,but also deal with the problem of resource occupation,high latency and network load compared to cloud computing.Firstly the architecture of MEC was introduce and a comparative analysis was made according to various deployment schemes.Then the key technologies of computation offloading was studied from three aspects of decision on computation offloading,allocation of computing resource within MEC and system implement of MEC.Based on the analysis of MEC deployment scheme in 5G,two optimization schemes on computation offloading was proposed in 5G MEC.Finally,the current challenges in the mobility management was summarized,interference management and security of computation offloading in MEC.…”
    Get full text
    Article
  9. 1069

    Taxing the cloud: introducing a new taxation system on data collection? by Primavera De Filippi

    Published 2013-05-01
    “…Cloud computing services are increasingly hosted on international servers and distributed amongst multiple data centres. …”
    Get full text
    Article
  10. 1070

    Sobriété numérique et traitement des données massives : vers des stratégies d’innovation plus durables by Robert VISEUR

    Published 2025-04-01
    “…This article examines challenges associated with the sustainability of the digital sector in key sectors such as cloud computing, targeted advertising, online video, cryptocurrencies, and generative artificial intelligence. …”
    Get full text
    Article
  11. 1071

    Service aware base station processing resource allocation for centralized radio access network by Xinping ZHANG, Yuanyuan WANG, Lin TIAN, Shuliang HAO

    Published 2018-08-01
    “…Current research on resource allocation algorithmsmainly focuses on data centers,and cloud computing environments.These resource allocation algorithms did not consideRthe diversity of processing resources(CPU,memory,network bandwidth,FPGA,DSP)and the diversity of service types in the centralized base station,resulting in the low processing resource utilization.In ordeRto solve this problem,a service oriented base station processing resource allocation algorithm was proposed.Firstly,the Fisher partitionmethod was used to classify the base station’s processing resource requirements according to the user’s service request.Then,the resource allocation balancing strategy was used to allocate the base station processing resources.Experimental results show that the algorithm is effective to reduce the number of physi cal servers and improves the resource utilization of the servers,realizing energy conservation and communications.…”
    Get full text
    Article
  12. 1072

    Graph Crypto-Stego System for Securing Graph Data Using Association Schemes by Anuradha Sabharwal, Pooja Yadav, Kamal Kumar

    Published 2024-01-01
    “…Many businesses now outsource sensitive data to a third party because of the rise of cloud computing and storage. Currently, the key problem is to encrypt the data such that it may be stored on an unreliable server without sacrificing the ability to use it effectively. …”
    Get full text
    Article
  13. 1073

    A Distributed Weighted Possibilistic c-Means Algorithm for Clustering Incomplete Big Sensor Data by Qingchen Zhang, Zhikui Chen

    Published 2014-05-01
    “…Finally, to improve the cluster speed of WPCM, the cloud computing technology is used to optimize the WPCM algorithm by designing the distributed weighted possibilistic c-means clustering algorithm (DWPCM) based on MapReduce. …”
    Get full text
    Article
  14. 1074

    Secure deployment strategy of virtual machines based on operating system diversity by Miao ZHANG, Xin-sheng JI, Jian-jian AI, Wen-yan LIU, Hong-chao HU, Shu-min HUO

    Published 2017-10-01
    “…The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and data by compromising the user's entire virtual machine at a smaller cost.In view of this security threat,a strategy for the security deployment of virtual machine based on operating system diversity was presented.This method firstly recommended an operating system configuration options for users applying for virtual machines with the highest degree in diversity,and then through the secure deployment strategy,maximized the effect of diversity,thus making the attacker pay more cost.The experimental results show that compared with the method of single operating system,this method can reduce the attack efficiency by 33.46% at least.…”
    Get full text
    Article
  15. 1075

    THE PERSPECTIVES OF INFORMATION AND COMMUNICATION TECHNOLOGY OF EDUCATION OF STUDENTS IN HIGHER EDUCATIONAL INSTITUTIONS OF UKRAINE by Oleksii Voronkin

    Published 2015-10-01
    “…It was determined that the greatest prospects will be: blended learning; research teaching method and heuristic teaching method; student-centered approach; increasing the role of informal education; the formation of students' abilities to independently acquire knowledge; short-term distance learning programs; portable computing devices; the new human machine interfaces; free and open-source software; cloud computing; artificial intelligence technology (search computing with elements of semantics, linguistic systems, decision support system); integrated, multidisciplinary and interdisciplinary training of teachers. …”
    Get full text
    Article
  16. 1076

    The SS-SCR Scheme for Dynamic Spectrum Access by Vinay Thumar, Taskeen Nadkar, U. B. Desai, S. N. Merchant

    Published 2012-01-01
    “…We also indicate the usefulness of cloud computing for a practical deployment of the scheme.…”
    Get full text
    Article
  17. 1077

    Cloud-Based Collaborative Media Service Framework for HealthCare by M. Shamim Hossain, Ghulam Muhammad

    Published 2014-03-01
    “…., networks, storages, servers, applications, and services). Cloud computing is such a paradigm or infrastructure to provide configurable platform to support the collaborative service. …”
    Get full text
    Article
  18. 1078

    Characteristics of the traditional management system of integrated services of intelligent supply chains: China’s experience by Sun Chunxing, Rogulenko Tatyana

    Published 2024-01-01
    “…Key elements of the integrated service management system for intelligent supply chains are discussed, including the intelligent supply chain platform, Internet of Things (IoT) technology, big data, artificial intelligence, blockchain, cloud computing, and the intelligent supply chain transportation network. …”
    Get full text
    Article
  19. 1079

    Big Data Analytics and Management in Internet of Things by Sathishkumar Karupusamy, M. Ramalingam, Boopathi Kumar Eswaran, Professor V. Thiagarasu

    Published 2021-05-01
    “…The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, Internet of Things (IoT), Algorithms, Quality of Service (QoS),Tourists Perception, Technology in higher education, integrated systems, enterprise management, Self-Service Technology (SST), cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive peer-review process, eight papers were finally selected for publication. …”
    Get full text
    Article
  20. 1080

    Fog server deployment technique: An approach based on computing resource usage by Jung-Hoon Lee, Sang-Hwa Chung, Won-Suk Kim

    Published 2019-01-01
    “…Cloud computing is a type of Internet-based computing that allows users to access computing resources that are connected to the Internet anytime and anywhere. …”
    Get full text
    Article