Showing 61 - 80 results of 109 for search 'technology’s lifecycle', query time: 0.05s Refine Results
  1. 61
  2. 62

    Research Status and Challenges of Data-Driven Construction Project Management in the Big Data Context by Yao Huang, Qian Shi, Jian Zuo, Feniosky Pena-Mora, Jindao Chen

    Published 2021-01-01
    “…However, a comprehensive review for technological change, the resulting process, and organizational changes in the Big Data context, especially from the angle of whole lifecycle of construction project, is lacking. …”
    Get full text
    Article
  3. 63
  4. 64
  5. 65

    Concept of matrix readiness methodology application development for managing innovative digitalization projects by V. A. Shiboldenkov, D. A. Bastamova, K. A. Yakovleva

    Published 2024-02-01
    “…The relationship between the product lifecycle model and the matrix readiness methodology has been analyzed thoroughly. …”
    Get full text
    Article
  6. 66

    BIM-Based Model Checking: A Scientometric Analysis and Critical Review by Sihao Li, Ziyang Jiang, Zhao Xu

    Published 2024-12-01
    “…Building information modeling (BIM) has been widely applied throughout the entire lifecycle of projects in the architecture, engineering, and construction (AEC) industry. …”
    Get full text
    Article
  7. 67
  8. 68

    Evaluation and optimization of carbon emission for federal edge intelligence network by Peng ZHANG, Yong XIAO, Jiwei HU, Liang LIAO, Jianxin LYU, Zegang BAI

    Published 2024-03-01
    “…In recent years, the continuous evolution of communication technology has led to a significant increase in energy consumption.With the widespread application and deep deployment of artificial intelligence (AI) technology and algorithms in telecommunication networks, the network architecture and technological evolution of network intelligent will pose even more severe challenges to the energy efficiency and emission reduction of future 6G.Federated edge intelligence (FEI), based on edge computing and distributed federated machine learning, has been widely acknowledged as one of the key pathway for implementing network native intelligence.However, evaluating and optimizing the comprehensive carbon emissions of federated edge intelligence networks remains a significant challenge.To address this issue, a framework and a method for assessing the carbon emissions of federated edge intelligence networks were proposed.Subsequently, three carbon emission optimization schemes for FEI networks were presented, including dynamic energy trading (DET), dynamic task allocation (DTA), and dynamic energy trading and task allocation (DETA).Finally, by utilizing a simulation network built on real hardware and employing real-world carbon intensity datasets, FEI networks lifecycle carbon emission experiments were conducted.The experimental results demonstrate that all three optimization schemes significantly reduce the carbon emissions of FEI networks under different scenarios and constraints.This provides a basis for the sustainable development of next-generation intelligent communication networks and the realization of low-carbon 6G networks.…”
    Get full text
    Article
  9. 69
  10. 70
  11. 71

    Security protection method based on mimic defense and Paillier encryption for smart IoT terminals by GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu

    Published 2024-12-01
    “…Then, a secure blind signature with Paillier encryption (SBSPE) algorithm was designed in this architecture to safeguard the data and privacy of the edge-area smart terminals throughout the data processing lifecycle of edge-area smart terminals. Blind signature technology was integrated into SBSPE algorithm on the basis of Paillier semi-homomorphic encryption algorithm. …”
    Get full text
    Article
  12. 72
  13. 73
  14. 74
  15. 75

    Review of cryptographic application security evaluation techniques for new critical infrastructures by Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG

    Published 2023-12-01
    “…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
    Get full text
    Article
  16. 76

    Cumulative earnings of Black, Chinese, South Asian and White individuals born in Canada by Aneta Bonikowska, René Morissette, Grant Schellenberg

    Published 2024-11-01
    “…The study shows that the higher cumulative earnings of Chinese (+20%) and South Asian (+15%) men (relative to White men) can be mostly or entirely accounted for by their higher education levels and their overrepresentation in science, technology, engineering, and mathematics (STEM) fields of study. …”
    Get full text
    Article
  17. 77
  18. 78
  19. 79
  20. 80

    A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review by Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, Serhat Yuksel, Hasan Dincer, Roobaea Alroobaea, Abdullah M. Baqasah, Uma Chinta

    Published 2024-01-01
    “…Malicious assaults and information leakage have grown in importance in practically every area of information and communication technology (ICT) in recent years. Enterprise ledger organization, preservation, security, and protection are all greatly aided by information security (IS). …”
    Get full text
    Article