-
41
Retracted: Computer Medical Image Segmentation Based on Neural Network
Published 2020-01-01“…We then applied the method to a computer-aided system to classify tumor lesions in mammograms. …”
Get full text
Article -
42
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01“…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
Get full text
Article -
43
A Novel Cost Based Model for Energy Consumption in Cloud Computing
Published 2015-01-01“…To support green cloud computing, providers also need to minimize cloud infrastructure energy consumption while conducting the QoS. …”
Get full text
Article -
44
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
Published 2025-01-01“…In-network computing (INC) offers a transformative solution by integrating computational capabilities directly into the network fabric, enabling dynamic and distributed task execution. …”
Get full text
Article -
45
Design and application research on management information system security architecture in digital campus
Published 2014-10-01“…Aiming at the university management information system security threats and challenges,a security architecture named 1C4GS was proposed.First connotation and function of five important components of 1C4GS was expounded,which named security management center,security communication network,security region boundary,security computing environment and security application.Then we used “basic personal data reporting system” as an example to construct the management information system security arrangement application based on 1C4AS,this arrangement application integrated a variety of security technologies and strategies such as transparent data encryption,user Identify,form edit cache as a whole to,and achieved the management information system’s network security,border security,computing environment security and application security.…”
Get full text
Article -
46
Joint optimization method of intelligent service arrangement and computing-networking resource allocation for MEC
Published 2023-07-01“…To solve the problems of low efficiency of network service caching and computing-networking resource allocation caused by tasks differentiation, highly dynamic network environment, and decentralized computing-networking resource deployment in edge networks, a decentralized service arrangement and computing offloading model for mobile edge computing was investigated and established.Considering the multidimensional resource constraints, e.g., computing power, storage, and bandwidth, with the objective of minimizing task processing latency, the joint optimization of service caching and computing-networking resource allocation was abstracted as a partially observable Markov decision process.Considering the temporal dependency of service request and its coupling relationship with service caching, a long short-term memory network was introduced to capture time-related network state information.Then, based on recurrent multi-agent deep reinforcement learning, a distributed service arrangement and resource allocation algorithm was proposed to autonomously decide service caching and computing-networking resource allocation strategies.Simulation results demonstrate that significant performance improvements in terms of cache hit rate and task processing latency achieved by the proposed algorithm.…”
Get full text
Article -
47
Tuning block-parallel all-pairs shortest path algorithm for efficient multi-core implementation
Published 2022-12-01“…The technique involves profiling tools in the tuning process and allows the increase of the parallel algorithm throughput. Computational experiments carried out on a rack server equipped with two Intel Xeon E5-2620 v4 processors of 8 cores and 16 hardware threads each have convincingly shown for various graph sizes that the behavior and parameters of the hierarchical cache memory operation don’t depend on the graph size and are determined only by the distance matrix’s block size. …”
Get full text
Article -
48
Refactoring BZIP2 on the new‐generation sunway supercomputer
Published 2025-01-01“…Abstract High‐performance computing is progressively assuming a fundamental role in advancing scientific research and engineering domains. …”
Get full text
Article -
49
CSRouter:router architecture for service extensibility
Published 2012-07-01“…The development of network applications ,network end-end“channel”for data transmission impeded applications,network“platform”integrating computing and storing resource with routers is a considerable efficient means to enhance the efficiency of the network transport.System area network of routers based on high performance unified switching technology is introduced to connect forwarding elements,computing elements and storing elements.The prototype were designed and implemented based on the NetMagic platform of network innovation and the IEF switch system.The testing of packets caching proves that system area network provides high performance and high reliability network bandwidths between forwarding elements and computing elements,and the novel router architecture based on system area network could utilize additional computing and storing resources to process IP packet in depth to accelerate network applications.…”
Get full text
Article -
50
Reviews of D2D technology for 5G communication networks
Published 2016-07-01“…What emerges is that still major issues shall be faced by the research community, as D2D, SDN, edge computing and IOT technologies are expected to be introduced into the future mobile communication networks. …”
Get full text
Article -
51
Research on location privacy protection of mobile terminals for maritime monitoring sensor networks
Published 2021-12-01“…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
Get full text
Article -
52
Twinkle: A GPU-based Binary-lens Microlensing Code with the Contour Integration Method
Published 2025-01-01“…We also devise an improved method for robustly identifying ghost images, thereby enhancing computational reliability. We have advanced the state of the art by optimizing Twinkle specifically for heterogeneous computing devices by taking into account the unique task and cache memory dispatching patterns of GPUs, while the compatibility with the traditional computing architectures of CPUs is still maintained. …”
Get full text
Article -
53
-
54
PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark
Published 2016-05-01“…To address the low-efficiency problem for query privacy protection on big data,parallel CPIR-V (PCPIR-V),which had a high level of privacy protection for nearest neighbor query,was presented and implemented based on spark.Two parallel strategies for PCPIR-V,Row strategy and Bit strategy,were proposed.To avoid redundant multiplications,the repeated products were cached based on a clustering technique while computing CPIR on Spark.According to the evaluation results of PCPIR-V on three datasets,the scalablity of PCPIR-V is good until the number of core is larger than 40.The cost of PCPIR-V with the method of caching partial multiplication results is reduced by 20% averagely.…”
Get full text
Article -
55
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01Get full text
Article -
56
Differential Grey Wolf Load-Balanced Stochastic Bellman Deep Reinforced Resource Allocation in Fog Environment
Published 2022-01-01“…Fog computing is becoming a dynamic and sought-after computing prototype for Internet of Things (IoT) application deployments. …”
Get full text
Article -
57
FPGA Implementation of A∗ Algorithm for Real-Time Path Planning
Published 2020-01-01Get full text
Article -
58
Parallelizing the cryo‐EM structure determination in THUNDER using GPU cluster
Published 2025-01-01“…Here, we designed a new computing approach specialized for GPU to optimize and maximize the computing power of a single GPU, multiple GPU, and the GPU cluster, highlighted by a well‐designed cache structure and mixed computing precision of single‐precision and double‐precision. …”
Get full text
Article -
59
Resource Scheduling Algorithm Based on DQN in Satellite CDN
Published 2022-12-01“…With the rapid development of space and information fi eld, hot content distribution intensive scenes will become one of the key directions of satellite network application, and satellite content delivery network (CDN) network is an important means to improve the effi ciency of air and space content distribution.In the architecture of satellite CDN network, due to the uneven time and space of business requirements, the scarcity of satellite resources and the insuffi cient adaptability of existing scheduling algorithms, scheduling algorithms for satellite resources are faced with problems such as high resource dimension, many computing states and large amount of computation, which will reduce the accuracy, response speed and computing performance of scheduling decisions.To solve this problem, a resource scheduling algorithm based on Deep Q-Learning (DQN) algorithm was proposed to improved the effi ciency and accuracy of satellite resource scheduling, and intelligently and quickly perceived the resource situation to make scheduling decisions.Firstly, the user requests were classifi ed, and the shortest path set that the satellite could communicated with was calculated according to the time-varying trajectory of the satellite and the resources of the satellite and the ground.After that, the related information of satellites and users was quantifi ed by Markov model modeling, and the optimal CDN storage node of satellites was calculated by DQN algorithm, which achieved the eff ects of reduced user request delay, reduced satellite-ground resource occupancy rate and improved cache hit rate.…”
Get full text
Article -
60
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01“…In the context of cooperative vehicle-infrastructure systems (CVIS), vehicles often offload computational tasks to roadside units (RSUs) for execution due to their own constrained computing resources. …”
Get full text
Article