Showing 43,721 - 43,740 results of 68,043 for search '"technology"', query time: 0.23s Refine Results
  1. 43721
  2. 43722
  3. 43723

    基于层次分析—模糊评价的云计算安全评估与对策 by Ai-min YANG, Fang GAO, Min-hua BIAN, Shu-lei YANG

    Published 2016-10-01
    “…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
    Get full text
    Article
  4. 43724
  5. 43725
  6. 43726
  7. 43727
  8. 43728
  9. 43729
  10. 43730
  11. 43731

    Application of the HeWuTong System in the Practice of the “River Chief System” by TAO Tao, ZENG Qingbin, HUANG Rong

    Published 2020-01-01
    “…HeWuTong application system is a modern information management platform built on the premise of fully integrating the needs of river management in the practice of “River Chief System” in Shenzhen.Through the system,the circulating water information resource base and multi-level linkage intelligent control platform shared by cities and districts are built with means of “system + responsibility + technology” and technologies of Internet of Things (IOT),GIS,big data,microservices,etc.…”
    Get full text
    Article
  12. 43732
  13. 43733

    Research on the UAV-aided data collection and trajectory design based on the deep reinforcement learning by Zhiyu MOU, Yu ZHANG, Dian FAN, Jun LIU, Feifei GAO

    Published 2020-09-01
    “…The Internet of things (IoT) era needs to realize the wide coverage and connections for the IoT nodes.However,the IoT communication technology cannot collect data timely in the remote area.UAV has been widely used in the IoT wireless sensor network for the data collection due to its flexibility and mobility.The trajectory design of the UAV assisted sensor network data acquisition was discussed in the proposed scheme,as well as the UAV charging demand in the data collection process was met.Specifically,based on the hierarchical reinforcement learning with the temporal abstraction,a novel option-DQN (option-deep Q-learning) algorithm targeted for the discrete action was proposed to improve the performance of the data collection and trajectory design,and control the UAV to recharge in time to ensure its normal flight.The simulation results show that the training rewards and speed of the proposed method are much better than the conventional DQN (deep Q-learning) algorithm.Besides,the proposed algorithm can guarantee the sufficient power supply of UAV by controlling it to recharge timely.…”
    Get full text
    Article
  14. 43734
  15. 43735
  16. 43736
  17. 43737

    Improving bandwidth utilization by compressing small-payload traffic for vehicular networks by Jianan Sun, Ping Dong, Yajuan Qin, Tao Zheng, Xiaoyun Yan, Yuyang Zhang

    Published 2019-04-01
    “…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. However, these solutions cannot be deployed in vehicular networks successfully, due to the limitations on processing capacity and routing scalability. …”
    Get full text
    Article
  18. 43738

    Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms by Lei Wang, Ying Yuan, Yan Ding

    Published 2023-01-01
    “…The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages. Blockchain technology is used to achieve decentralised and distributed storage and management of authentication data. …”
    Get full text
    Article
  19. 43739

    Mobile Multi-Agent Evaluation Method for Wireless Sensor Networks-Based Large-Scale Structural Health Monitoring by Shenfang Yuan, Dong Liang, Lei Qiu, Menglong Liu

    Published 2012-11-01
    “…This paper presents a multi-agent cooperation system based on mobile agent technology for wireless sensor network-based structural health monitoring which deals with the evaluation of large-scale structure. …”
    Get full text
    Article
  20. 43740