-
41
Smart Internet of things aided by“terminal-edge-cloud” cooperation
Published 2018-09-01“…The further expansion of the Internet of things (IoT) traffic and the explosive growth of the terminal data require higher delay performance and computing ability of the access network.The traditional wireless network architecture has been unable to support the rapid development of IoT.Thus,the edge-driven smart IoT architecture was proposed.Firstly,the main factors that restrict the development of IoT were analyzed,and then the edge computing technology was introduced into the IoT to form a “terminal-edge-cloud” cooperative computing architecture to deal with the traffic data efficiently and timely.Finally,the challenges of the edge-driven smart IoT were analyzed and the future work of this system was proposed.…”
Get full text
Article -
42
Research and implementation on college students internet addiction disorder and anti-addict system
Published 2014-10-01“…Based on the traffic analysis on Cernet2,a new discovery mechanism of games service provider IP address is proposed,including Boilerpipe text extraction algorithm and Stanford Chinese NLP,realize this new general method and computing architecture of college student internet addiction.Three kinds of Internet addiction behaviors-online games,video viewing and social networking sites visit,including the total hours spend,length of continuous addiction,frequency,selected time of addiction are analyzed.Concept of Internet addiction disorder index is proposed with quantization on the internet addiction disorder made through AHP.Finally,Internet addiction prevention system is designed and implemented.…”
Get full text
Article -
43
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01“…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
Get full text
Article -
44
Spatial Cluster Analysis by the Bin-Packing Problem and DNA Computing Technique
Published 2013-01-01“…Typical techniques include CLARANS, density- and gravity-based clustering, and other algorithms based on traditional von Neumann's computing architecture. The purpose of this paper is to propose a technique for spatial cluster analysis based on sticker systems of DNA computing. …”
Get full text
Article -
45
Review on artificial intelligence chip technology system
Published 2019-04-01“…Artificial intelligence technology is the new focus of current countries.The development of artificial intelligence technology has put forward new requirements for computing chips.Deep learning algorithms require the training of massive data,while traditional computing architectures can’t support the large-scale computing requirements of deep learning algorithms.Therefore,artificial intelligence chips of new architectures emerge one after another.The different technical routes of artificial intelligence chips were analyzed,the characteristics of different routes were compared,the development trend of artificial intelligence chip industry and studied,the opportunities and challenges of artificial intelligence chip development in China were analyzed,and the future development of artificial intelligence chip technology was forecasted.…”
Get full text
Article -
46
Scalable network emulation on analog neuromorphic hardware
Published 2025-02-01“…The ability to emulate and train networks larger than the substrate provides a pathway for accurate performance evaluation in planned or scaled systems, ultimately advancing the development and understanding of large-scale models and neuromorphic computing architectures.…”
Get full text
Article -
47
A Massively Parallel SMC Sampler for Decision Trees
Published 2025-01-01“…A widely used approach to reducing an algorithm’s runtime is to employ modern multi-core computer architectures, either with shared memory (SM) or distributed memory (DM), and use parallel computing to accelerate the algorithm. …”
Get full text
Article -
48
Privacy-preserving image processing in cloud computing
Published 2016-01-01“…To solve this problem, the security requirements and technical challenges lain in privacy-preserving image processing based on different cloud computing architectures were studied, and several solutions to protect the security of outsourced data while enabling functionality of image processing applications were proposed. …”
Get full text
Article -
49
Cloud native based edge computing: vision and challenges
Published 2021-06-01“…Cloud native computing, featured by low-cost container technology, well fits edge computing.It was proposed to apply cloud native computing to make edge computing resource management and control transparent to application development and operation.Compared with cloud computing, edge computing resources are widely distributed, highly heterogeneous, and fragmented, which called for collaborative resource management and control.According to the development status of cloud native related technologies, through the integration of future networking technologies such as soft were defined network and network function virtualization, a full-stack cloud native based edge computing architecture was proposed.Then, considering the hierarchical characteristics of containers, a low-overhead container deployment optimization problem for resource-limited edge computing was studied.Finally, the development challenges faced by cloud native based edge computing were discussed.…”
Get full text
Article -
50
Optimization of Leaky Integrate-and-Fire Neuron Circuits Based on Nanoporous Graphene Memristors
Published 2024-01-01“…Artificial neurons form the core of neuromorphic computing which is emerging as an alternative for the von Neumann computing architecture. However, existing neuron architectures still lack in area efficiency, especially considering the huge size of modern neural networks requiring millions of neurons. …”
Get full text
Article -
51
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01“…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
Get full text
Article -
52
Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm
Published 2024-01-01“…For the characteristics of channel instability in wireless sensor networks, this paper proposes an intrusion detection algorithm based on FedAvg (federated averaging) and XGBoost (extreme gradient boosting) wireless sensor networks using fog computing architecture. First, the network edge is extended by introducing fog computing nodes to reduce the communication delay. …”
Get full text
Article -
53
Linguistic analysis of virtual course's terminology
Published 2004-12-01“… A virtual course of computers architecture is analyses in the present article. …”
Get full text
Article -
54
Overview of TRIPOLI-5, a Monte Carlo code for HPC
Published 2024-01-01“…CEA, IRSN and EDF have joined forces and started the development of the TRIPOLI-5® Monte Carlo particle transport code in 2022, with the goal of performing massively parallel simulations on hybrid computing architectures. TRIPOLI-5 benefits from the experience gained from previous investigations conducted on the PATMOS mini-app, concerning the portability of particle-transport algorithms in High Performance Computing environments. …”
Get full text
Article -
55
Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective
Published 2019-06-01“…A multidimensional cloud computing architecture is designed and a multidimensional cloud resource scheduling model is constructed based on the stakeholder perspective of cloud users and cloud service providers to meet the high QoS requirements of cloud users (such as task execution time and task completion time) with low computing costs (such as energy consumption,economic costs and system availability).For the second-level cloud resource scheduling,an MQoS cloud resource scheduling algorithm based on multiple Greedy algorithm is proposed.The experimental results show that under the four cloud computing application scenarios with no aftereffects,the MQoS cloud resource scheduling algorithm has an overall increase of 206.42%~228.99% and 34.26%~56.93 in terms of multidimensional QoS degree compared with FIFO and M2EC algorithms.It has an average overall reduction of 0.48~0.49 and 0.20~0.27 in terms of cloud data center load balance difference.…”
Get full text
Article -
56
Optical single-shot readout of spin qubits in silicon
Published 2025-01-01“…To this end, spin qubits with optical interfaces offer key advantages: they can minimize the heat load and give access to modular quantum computing architectures that eliminate cross-talk and offer a large connectivity. …”
Get full text
Article -
57
The Advances in Neuromorphic Computing and Brain-Inspired Systems (ANCBIS).
Published 2025-01-01“…This field seeks to bridge the gap between traditional computing architectures and biological neural networks by replicating brain-like functionalities. …”
Get full text
Article -
58
LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation
Published 2021-01-01“…The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. …”
Get full text
Article -
59
Research on task offloading algorithm of mobile edge computing based on deep reinforcement learning in SDCN
Published 2024-02-01“…With the continuous development of network technology, the network topology distributed network control mode based on Fat-Tree gradually reveals its limitations.Software-defined data center network (SDCN) technology, as an improved technology of Fat-Tree network topology, has attracted more and more researchers’ attention.Firstly, an edge computing architecture in SDCN and a task offloading model based on the three-layer service architecture of the mobile edge computing (MEC) platform were built, combined with the actual application scenarios of the MEC platform.Through the same strategy experience playback and entropy regularization, the traditional deep Q-leaning network (DQN) algorithm was improved, and the task offloading strategy of MEC platform was optimized.An improved DQN algorithm based on same strategy empirical playback and entropy regularization (RSS2E-DQN) was compared with three other algorithms in load balancing, energy consumption, delay and network usage.It is verified that the improved algorithm has better performance in the above four aspects.…”
Get full text
Article -
60
Dissipative Protection of a GKP Qubit in a High-Impedance Superconducting Circuit Driven by a Microwave Frequency Comb
Published 2025-01-01“…Qubit initialization, readout, and control via Clifford gates can be performed while maintaining the code stabilization, paving the way toward the assembly of GKP qubits in a fault-tolerant quantum computing architecture.…”
Get full text
Article