-
221
IP-based high-available mass network storage system
Published 2007-01-01“…An IP-based high-available mass network storage system(MNSS) was introduced,featured by the following advantages: firstly,it integrates multi-NAS and SAN with OSD through a unified multi-protocol file system(UMPFS),with greater capacity and better scalability than each of them;secondly,it simultaneously serves both the file I/O and the block I/O by an iSCSI module,with all the advantages of a NAS and a SAN;thirdly,with an autonomic storage agency(ASA),the MNSS provide two kinds of data channels,i.e.…”
Get full text
Article -
222
Advances in lignocellulosic feedstocks for bioenergy and bioproducts
Published 2025-02-01“…However, large-scale adoption of lignocellulosic feedstocks faces considerable obstacles, including scalability, bioprocessing efficiency, and resilience to climate change. …”
Get full text
Article -
223
An Improved DR Algorithm Based on Target Extrapolating in ROIA Cloud Platform
Published 2013-12-01“…Previous works are almost based on the C/S or P2P mode, and their scalability and resource utilization are relatively low. …”
Get full text
Article -
224
Lightweight searchable medical data sharing scheme
Published 2022-05-01“…The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the "AND gate" structure, which limited their scalability and flexibility of access control, and many schemes could not resist offline dictionary guessing attacks.In addition, attribute-based encryption involved a large number of bilinear pairing operations, which was inconvenient for user equipment with limited computing resources.A lightweight searchable medical data sharing scheme was proposed.Based on the support for keyword search and policy hiding, a large attribute university and a linear secret sharing structure were adopted to improve the scalability and flexibility of access control.The Intel SGX was used to re-encrypt data to achieve anti-offline dictionary guessing attack.The computational overhead of decryption was reduced to a constant level, which was suitable for user equipment with limited computing resources.Finally, it is proved that the proposed scheme has the security of selecting plaintext indistinguishable and can resist offline dictionary guessing attacks.…”
Get full text
Article -
225
Recent Advances in Peptide-Loaded PLGA Nanocarriers for Drug Delivery and Regenerative Medicine
Published 2025-01-01“…Despite remarkable progress, challenges such as production scalability, cost, and regulatory hurdles remain.…”
Get full text
Article -
226
A dataset of Uniswap daily transaction indices by network
Published 2025-01-01“…Layer 2 (L2) solutions are emerging to enhance the scalability and efficiency of the DeFi ecosystem, surpassing Layer 1 (L1) systems. …”
Get full text
Article -
227
Multipath inter-domain routing for named data networking
Published 2015-10-01“…To facilitate content retrieval among NDN domains,a multipath inter-domain routing for named data networking(MIRNDN)was proposed.Under MIRNDN,an AS(autonomous system)maintained merely the routing state of content reachable from its own network or from its customers’ networks and aggregated routing information to mitigate routing scalability issue; “valley free”routing policy was applied to guide Interest packets that solicit content unreachable from the AS’s own network nor from its customers’ networks to explore matching data packets via multiple paths,and NDN’s requests aggregation,in-network caching and adaptive forwarding optimized such exploration; the reachability information of content from multiple paths was collected to support Interest multipath forwarding.The properties of FIB size and the convergence time and communication cost of routing update under MIRNDN were analyzed in theory.The experimental results in the AS level topology of current Internet validates that MIRNDN mitigates the scalability issue of NDN inter-domain routing,has relative short convergence time and moderate communication cost for routing update,and effectively reduces unnecessary Interest forwarding.…”
Get full text
Article -
228
Empirical analysis of control models for different converter topologies from a statistical perspective
Published 2025-01-01“…This text also compares the evaluated models in terms of their conversion efficiency, cost of deployment, delay needed for control, scalability and computational complexity under different scenarios. …”
Get full text
Article -
229
Optimization of reconfigurable SM2 algorithm over prime filed
Published 2022-03-01“…Aiming at the problems of inefficient of software, low utilization of hardware resources and poor scalability of SM2 algorithm, a reconfigurable optimization method of SM2 algorithm over prime filed was proposed.Through in-depth analysis of the SM2 algorithm, starting from different computation stages and characteristics, respectively using KOA fast multiplication, fast modular reduction and Barrett algorithm to achieve recommended or arbitrary parameters of the modular multiplication operation, and the radix-4 extended Euclidean algorithm was optimized and improved to accelerate the modular inverse operation.Then, in the standard projective coordinate system, the Montgomery method was used to improve the efficiency of point multiplication, and the data flow of point addition and double point was optimized to shorten the operation cycle to 12 clocks.At the same time, fast coordinate system conversion was realized inside the FPGA.Finally, the parallel scheduling management of multi-SM2 was designed and implemented to meet the computational requirements of multiple applications.The experimental results show that the optimized SM2 makes full use of FPGA resources and shortens the cycle of point multiplication.The maximum number of calculations per second is 352.48 times higher than the CPU (Intel i5-8300), which improves the performance and scalability.…”
Get full text
Article -
230
Addressing Technical Challenges in Large Language Model-Driven Educational Software System
Published 2025-01-01“…Additionally, ensuring scalability requires robust autoscaling mechanisms and suitable architecture design to handle fluctuating workloads. …”
Get full text
Article -
231
Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison
Published 2025-01-01“…Our protocol encodes participants’ secret integers directly into the amplitudes of single-photon states and introduces a novel method for secret-to-secret comparison rather than the traditional bit-to-bit comparison, resulting in improved scalability. To ensure security, the encoded single-photon states are concealed using rotation operations. …”
Get full text
Article -
232
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
Published 2025-01-01“…Our experimental results demonstrate ECMO's efficiency and scalability, with a single store operation containing 500 keywords taking only <inline-formula><tex-math notation="LaTeX">$42.5 \;\mu s$</tex-math></inline-formula> on average.…”
Get full text
Article -
233
A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network
Published 2025-01-01“…We will also prove efficient management of node groups in an area and better scalability, performance, and security despite frequent topology changes by using group keys. …”
Get full text
Article -
234
Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms
Published 2022-01-01“…Based on the performance of the system, the high availability and scalability of the system are enhanced, so that the entire system can provide stable and efficient computer-assisted translation services for users. …”
Get full text
Article -
235
Frequency-bin-encoded entanglement-based quantum key distribution in a reconfigurable frequency-multiplexed network
Published 2025-01-01“…In perspective, our approach enables dynamic resource-minimized quantum key distribution among multiple users across diverse network topologies, and facilitates scalability to large-scale quantum networks.…”
Get full text
Article -
236
Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain
Published 2023-05-01“…To solve the problems of poor scalability, slow synchronization of authentication information, and high authentication overhead in cross-trust domain message authentication in the Internet of vehicles (IoV), an efficient authentication scheme for cross-trust domain of IoV based on a double-layer shard blockchain was proposed.A double-layer shard blockchain architecture was designed for lots of cross-trust domain message authentication by constructing blockchains on different entity levels in all domains to improve the scalability of the system and ensure secure and efficient sharing of cross-domain information.A blockchain sharding method based on the Metis graph partitioning algorithm for IoV was proposed to balance loads of each shard and adapt to the uneven distribution of authentication information on different road segments in IoV, thereby improving the efficiency of synchronizing a large number of authentication information on the chain.A batch authentication scheme based on certificateless public-key cryptography (CL-PKC) was proposed, which reduced the authentication overhead of cross-domain messages by enabling batch authentication of messages from different trust domains.Experimental results show that the proposed scheme effectively improves the authentication efficiency of cross-trust domain messages.Compared with other schemes, the proposed scheme reduces the computational overhead of a large number of cross-domain message authentication by more than 26.4%.…”
Get full text
Article -
237
Smart City Traffic Flow and Signal Optimization Using STGCN-LSTM and PPO Algorithms
Published 2025-01-01“…GPU acceleration ensures scalability, enabling deployment in large-scale urban networks efficiently. …”
Get full text
Article -
238
GATFELPA integrates graph attention networks and enhanced label propagation for robust community detection
Published 2025-01-01“…Additionally, many models face computational inefficiency, restricting their scalability on large-scale networks. To address these challenges, we propose GATFELPA, a hybrid community detection model that combines a Graph Attention Network (GAT) with an enhanced label propagation algorithm (DPCELPA). …”
Get full text
Article -
239
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
Published 2024-06-01“…Addressing the limitations of low execution efficiency and scalability in the sequential deep forest algorithm, our PDFMLC algorithm employs broadcast variables and the Lempel-Ziv-Welch (LZW) algorithm, significantly enhancing its acceleration ratio. …”
Get full text
Article -
240
EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications
Published 2025-01-01“…Automating pen‐testing through reinforcement learning (RL) facilitates more frequent assessments, minimizes human effort, and enhances scalability. However, real‐world pen‐testing tasks often involve incomplete knowledge of the target network system. …”
Get full text
Article