Showing 221 - 240 results of 1,667 for search '"scalability"', query time: 0.05s Refine Results
  1. 221

    IP-based high-available mass network storage system by HAN De-zhi1, YU Shun-zheng1

    Published 2007-01-01
    “…An IP-based high-available mass network storage system(MNSS) was introduced,featured by the following advantages: firstly,it integrates multi-NAS and SAN with OSD through a unified multi-protocol file system(UMPFS),with greater capacity and better scalability than each of them;secondly,it simultaneously serves both the file I/O and the block I/O by an iSCSI module,with all the advantages of a NAS and a SAN;thirdly,with an autonomic storage agency(ASA),the MNSS provide two kinds of data channels,i.e.…”
    Get full text
    Article
  2. 222

    Advances in lignocellulosic feedstocks for bioenergy and bioproducts by Daniel B. Sulis, Nathalie Lavoine, Heike Sederoff, Xiao Jiang, Barbara M. Marques, Kai Lan, Carlos Cofre-Vega, Rodolphe Barrangou, Jack P. Wang

    Published 2025-02-01
    “…However, large-scale adoption of lignocellulosic feedstocks faces considerable obstacles, including scalability, bioprocessing efficiency, and resilience to climate change. …”
    Get full text
    Article
  3. 223

    An Improved DR Algorithm Based on Target Extrapolating in ROIA Cloud Platform by Dong Liu

    Published 2013-12-01
    “…Previous works are almost based on the C/S or P2P mode, and their scalability and resource utilization are relatively low. …”
    Get full text
    Article
  4. 224

    Lightweight searchable medical data sharing scheme by Xinchun YIN, Mengyu WANG, Jianting NING

    Published 2022-05-01
    “…The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the "AND gate" structure, which limited their scalability and flexibility of access control, and many schemes could not resist offline dictionary guessing attacks.In addition, attribute-based encryption involved a large number of bilinear pairing operations, which was inconvenient for user equipment with limited computing resources.A lightweight searchable medical data sharing scheme was proposed.Based on the support for keyword search and policy hiding, a large attribute university and a linear secret sharing structure were adopted to improve the scalability and flexibility of access control.The Intel SGX was used to re-encrypt data to achieve anti-offline dictionary guessing attack.The computational overhead of decryption was reduced to a constant level, which was suitable for user equipment with limited computing resources.Finally, it is proved that the proposed scheme has the security of selecting plaintext indistinguishable and can resist offline dictionary guessing attacks.…”
    Get full text
    Article
  5. 225

    Recent Advances in Peptide-Loaded PLGA Nanocarriers for Drug Delivery and Regenerative Medicine by Hossein Omidian, Renae L. Wilson, Ana M. Castejon

    Published 2025-01-01
    “…Despite remarkable progress, challenges such as production scalability, cost, and regulatory hurdles remain.…”
    Get full text
    Article
  6. 226

    A dataset of Uniswap daily transaction indices by network by Nir Chemaya, Lin William Cong, Emma Jorgensen, Dingyue Liu, Luyao Zhang

    Published 2025-01-01
    “…Layer 2 (L2) solutions are emerging to enhance the scalability and efficiency of the DeFi ecosystem, surpassing Layer 1 (L1) systems. …”
    Get full text
    Article
  7. 227

    Multipath inter-domain routing for named data networking by Xiao-yan HU, Jian GONG

    Published 2015-10-01
    “…To facilitate content retrieval among NDN domains,a multipath inter-domain routing for named data networking(MIRNDN)was proposed.Under MIRNDN,an AS(autonomous system)maintained merely the routing state of content reachable from its own network or from its customers’ networks and aggregated routing information to mitigate routing scalability issue; “valley free”routing policy was applied to guide Interest packets that solicit content unreachable from the AS’s own network nor from its customers’ networks to explore matching data packets via multiple paths,and NDN’s requests aggregation,in-network caching and adaptive forwarding optimized such exploration; the reachability information of content from multiple paths was collected to support Interest multipath forwarding.The properties of FIB size and the convergence time and communication cost of routing update under MIRNDN were analyzed in theory.The experimental results in the AS level topology of current Internet validates that MIRNDN mitigates the scalability issue of NDN inter-domain routing,has relative short convergence time and moderate communication cost for routing update,and effectively reduces unnecessary Interest forwarding.…”
    Get full text
    Article
  8. 228

    Empirical analysis of control models for different converter topologies from a statistical perspective by Hole Shreyas Rajendra

    Published 2025-01-01
    “…This text also compares the evaluated models in terms of their conversion efficiency, cost of deployment, delay needed for control, scalability and computational complexity under different scenarios. …”
    Get full text
    Article
  9. 229

    Optimization of reconfigurable SM2 algorithm over prime filed by Bin LI, Qinglei ZHOU, Xiaojie CHEN, Feng FENG

    Published 2022-03-01
    “…Aiming at the problems of inefficient of software, low utilization of hardware resources and poor scalability of SM2 algorithm, a reconfigurable optimization method of SM2 algorithm over prime filed was proposed.Through in-depth analysis of the SM2 algorithm, starting from different computation stages and characteristics, respectively using KOA fast multiplication, fast modular reduction and Barrett algorithm to achieve recommended or arbitrary parameters of the modular multiplication operation, and the radix-4 extended Euclidean algorithm was optimized and improved to accelerate the modular inverse operation.Then, in the standard projective coordinate system, the Montgomery method was used to improve the efficiency of point multiplication, and the data flow of point addition and double point was optimized to shorten the operation cycle to 12 clocks.At the same time, fast coordinate system conversion was realized inside the FPGA.Finally, the parallel scheduling management of multi-SM2 was designed and implemented to meet the computational requirements of multiple applications.The experimental results show that the optimized SM2 makes full use of FPGA resources and shortens the cycle of point multiplication.The maximum number of calculations per second is 352.48 times higher than the CPU (Intel i5-8300), which improves the performance and scalability.…”
    Get full text
    Article
  10. 230

    Addressing Technical Challenges in Large Language Model-Driven Educational Software System by Nacha Chondamrongkul, Georgi Hristov, Punnarumol Temdee

    Published 2025-01-01
    “…Additionally, ensuring scalability requires robust autoscaling mechanisms and suitable architecture design to handle fluctuating workloads. …”
    Get full text
    Article
  11. 231

    Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison by Min Hou, Yue Wu

    Published 2025-01-01
    “…Our protocol encodes participants’ secret integers directly into the amplitudes of single-photon states and introduces a novel method for secret-to-secret comparison rather than the traditional bit-to-bit comparison, resulting in improved scalability. To ensure security, the encoded single-photon states are concealed using rotation operations. …”
    Get full text
    Article
  12. 232

    ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data by Xiangyi Meng, Yuefeng Du, Cong Wang

    Published 2025-01-01
    “…Our experimental results demonstrate ECMO&#x0027;s efficiency and scalability, with a single store operation containing 500 keywords taking only <inline-formula><tex-math notation="LaTeX">$42.5 \;\mu s$</tex-math></inline-formula> on average.…”
    Get full text
    Article
  13. 233

    A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network by Hwanseok Yang

    Published 2025-01-01
    “…We will also prove efficient management of node groups in an area and better scalability, performance, and security despite frequent topology changes by using group keys. …”
    Get full text
    Article
  14. 234

    Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms by Junjun Liu

    Published 2022-01-01
    “…Based on the performance of the system, the high availability and scalability of the system are enhanced, so that the entire system can provide stable and efficient computer-assisted translation services for users. …”
    Get full text
    Article
  15. 235

    Frequency-bin-encoded entanglement-based quantum key distribution in a reconfigurable frequency-multiplexed network by Anahita Khodadad Kashi, Michael Kues

    Published 2025-01-01
    “…In perspective, our approach enables dynamic resource-minimized quantum key distribution among multiple users across diverse network topologies, and facilitates scalability to large-scale quantum networks.…”
    Get full text
    Article
  16. 236

    Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain by Xuejiao LIU, Qiang ZHONG, Yingjie XIA

    Published 2023-05-01
    “…To solve the problems of poor scalability, slow synchronization of authentication information, and high authentication overhead in cross-trust domain message authentication in the Internet of vehicles (IoV), an efficient authentication scheme for cross-trust domain of IoV based on a double-layer shard blockchain was proposed.A double-layer shard blockchain architecture was designed for lots of cross-trust domain message authentication by constructing blockchains on different entity levels in all domains to improve the scalability of the system and ensure secure and efficient sharing of cross-domain information.A blockchain sharding method based on the Metis graph partitioning algorithm for IoV was proposed to balance loads of each shard and adapt to the uneven distribution of authentication information on different road segments in IoV, thereby improving the efficiency of synchronizing a large number of authentication information on the chain.A batch authentication scheme based on certificateless public-key cryptography (CL-PKC) was proposed, which reduced the authentication overhead of cross-domain messages by enabling batch authentication of messages from different trust domains.Experimental results show that the proposed scheme effectively improves the authentication efficiency of cross-trust domain messages.Compared with other schemes, the proposed scheme reduces the computational overhead of a large number of cross-domain message authentication by more than 26.4%.…”
    Get full text
    Article
  17. 237

    Smart City Traffic Flow and Signal Optimization Using STGCN-LSTM and PPO Algorithms by Tuxiang Lin, Rongliang Lin

    Published 2025-01-01
    “…GPU acceleration ensures scalability, enabling deployment in large-scale urban networks efficiently. …”
    Get full text
    Article
  18. 238

    GATFELPA integrates graph attention networks and enhanced label propagation for robust community detection by Feiyi Tang, Junxian Li, Xi Liu, Chao Chang, Luyao Teng

    Published 2025-01-01
    “…Additionally, many models face computational inefficiency, restricting their scalability on large-scale networks. To address these challenges, we propose GATFELPA, a hybrid community detection model that combines a Graph Attention Network (GAT) with an enhanced label propagation algorithm (DPCELPA). …”
    Get full text
    Article
  19. 239

    Unstructured Big Data Threat Intelligence Parallel Mining Algorithm by Zhihua Li, Xinye Yu, Tao Wei, Junhao Qian

    Published 2024-06-01
    “…Addressing the limitations of low execution efficiency and scalability in the sequential deep forest algorithm, our PDFMLC algorithm employs broadcast variables and the Lempel-Ziv-Welch (LZW) algorithm, significantly enhancing its acceleration ratio. …”
    Get full text
    Article
  20. 240

    EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications by Zegang Li, Qian Zhang, Guangwen Yang

    Published 2025-01-01
    “…Automating pen‐testing through reinforcement learning (RL) facilitates more frequent assessments, minimizes human effort, and enhances scalability. However, real‐world pen‐testing tasks often involve incomplete knowledge of the target network system. …”
    Get full text
    Article