-
301
The Classification of Multi-Domain Samples Based on the Cooperation of Multiple Models
Published 2022-01-01“…Furthermore, our framework achieves good scalability on multiple domains.…”
Get full text
Article -
302
Network function outsourcing system based on prefix-preserving encryption
Published 2018-04-01“…Due to the problem of high cost and limited scalability of dedicated hardware middleboxes,it is popular for enterprises to outsource middleboxes as software processes to the cloud service provider.In the current network function outsourcing schemes,the cloud service provider requires the enterprise’s communication traffic and network strategy which poses a serious threat to the enterprise’s piracy.Based on prefix-preserving encryption,a privacy preserving network function outsourcing system was proposed.Compared with other similar schemes,the system not only realizes the privacy protection of communication traffic,but also has higher throughput and lower delay.…”
Get full text
Article -
303
Research on Database Deployment Technology in Cloud Computing Environment
Published 2015-07-01“…Cloud computing virtualization technology has the characteristics of elastic scalability,automatic migration (high availability),automatic recovery (high stability).Because of the natural complexity of database systems,it makes a big challenge to deploy database systems in cloud computing virtualization environment.On the basis of research and analyzing models of deploying database systems in private cloud environment,the TPC-C benchmark test with database instances running in cloud computing virtual machines was applied.Compared with performance results of same test with database instances running in physical machines,the feasibility of deploying database systems in cloud computing virtualization environment was verified.…”
Get full text
Article -
304
Next Generation of Transport Networks
Published 2014-08-01“…While optical-specific technology advances will continue to be essential for continued scalability and cost/bit advances,it is asserted here that a combination of external drivers will have the greatest impact on shaping the form of the next generation of transport networks. …”
Get full text
Article -
305
Internationalized Satellite Internet Business Operation Platform
Published 2023-12-01“…Through quantitative analysis of the business market prospects for satellite internet and analyses of international business operation service models, the study explained the necessity of conducting satellite internet operation service.Therefore, further research on how to establish an internationalized satellite internet business operation platform becomes particularly important.On this basis, it primarily discussed a mid-tiered architecture with flexibly and scalability for the operation platform, proposes a tiered collaborative deployment architecture and mechanism for international operations, conducts research on multi-tenant management methods for global market operations, and suggests a roadmap for the integration of satellite internet operators with ground operators, which is providing valuable guidance for the future development of satellite internet operation platform.…”
Get full text
Article -
306
Engineering End-to-End Remote Labs Using IoT-Based Retrofitting
Published 2025-01-01“…The software architecture designed as part of the solution seamlessly supports the scalability of the experiments, offering compatibility with a wide range of hardware devices and IoT platforms. …”
Get full text
Article -
307
Enhancing Health Equity and Patient Engagement in Diabetes Care: Technology-Aided Continuous Glucose Monitoring Pilot Implementation Project
Published 2025-02-01“…These key lessons are generalizable for improving implementation at FQHCs and refining digital strategies for future scalability.…”
Get full text
Article -
308
Self-Emulsifying Drug Delivery Systems (SEDDS): Transition from Liquid to Solid—A Comprehensive Review of Formulation, Characterization, Applications, and Future Trends
Published 2025-01-01“…While challenges such as scalability and excipient toxicity persist, emerging technologies and multidisciplinary collaborations are paving the way for next-generation SEDDS. …”
Get full text
Article -
309
A Novel Model Using ML Techniques for Clinical Trial Design and Expedited Patient Onboarding Process
Published 2025-01-01“…XGBoost and Random Forest demonstrated robust performance for large clinical datasets in optimizing trial parameters, while ANN proved advantageous for patient eligibility classification due to its scalability. These findings underscore the potential of ML to enhance decision-making, reduce delays, and improve the accuracy of clinical trial outcomes. …”
Get full text
Article -
310
Automation of urban technological census. The historical centre of Bethlehem
Published 2022-12-01“…The model lifecycle management, from training to prediction and deployment, as well as the storage of both image data and metadata, is performed through the scalability of a Cloud enterprise architecture. Periodical scheduled monitoring enables comparisons across different periods, allowing the detection of modifications, removals, and additions, therefore identifying the insurgence of potential criticalities. …”
Get full text
Article -
311
Fast inter prediction algorithm applied in quality SVC
Published 2011-01-01“…Based on the characteristics of quality scalable video coding,a fast inter encoding algorithm was proposed on the enhancement layer for the medium-grain quality scalability(MGS).Firstly,based on the base layer macroblock mode and rate-distortion,the order of the coding mode for the current macro block was proposed.Then based on the encode structure,the correlation between layers,and the spatial correlation,desicions for the Direct coding mode,layer mode,and adjacent mode were proposed,respectively.Finally,the macroblocks were encoded in the order predicted,with the proposed three decisions to improve on the coding speed by early termination.The experimental results show that the computational complexity of the algorithm is reduced by 68% on the average compared to that of the standard method,with only negligible coding loss and bit-rate increase.…”
Get full text
Article -
312
A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration
Published 2020-05-01“…Faced with changeful network demands,users have increasingly higher requirements for traditional network.Features such as flexibility,scalability and ease of use have become essential elements of modern network.A domain adaptive hybrid genetic algorithm (DAHGA) was proposed,which could be applied to the security service chain arrangement of cloud data center tenants,to achieve automatic loading and activation of tenant cloud security services and policies,to meet tenant cloud security “customization on demand” requirements.And conducts experimental comparison research on the effective placement efficiency of each VNF on the cloud security service chain orchestration was carried out,which fully validated the proposed algorithm.Effectiveness provides a reference and reference for the realization of cloud business non-destructive security service chain orchestration technology.…”
Get full text
Article -
313
Efficient segment pattern based method for malicious URL detection
Published 2015-11-01“…,domain segment,path segment and file segment.Secondly it quickly calculated the common pattern of each semantic segment exploiting the tri-gram model based inverted index.Finally it decided whether a given URL was malicious based on the segment patterns returned by searching the inverted index.Moreover,this method also supported the Jaccard based random domain name identification technique for deciding malicious URLs with random domain name.Experimental results show that proposed method outperforms the state-of-the-art baseline methods,and can achieve good efficiency and scalability on malicious URL detection.…”
Get full text
Article -
314
Realization of smart home key management mechanism based on ECC
Published 2017-06-01“…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
Get full text
Article -
315
Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles
Published 2022-04-01“…Aiming at the efficiency problem of privacy data sharing in the Internet of vehicles (IoV), an efficient distributed model sharing strategy based on blockchain was proposed.In response to the data sharing requirements among multiple entities and roles in the IoV, a master-slave chain architecture was built between vehicles, roadside units, and base stations to achieve secure sharing of distributed models.An asynchronous federated learning algorithm based on motivate mechanism was proposed to encourage vehicles and roadside units to participate in the optimization process.An improved DPoS consensus algorithm with hybrid PBFT was constructed to reduce communication costs and improve consensus efficiency.Experimental analysis shows that the proposed mechanism can improve the efficiency of data sharing and has certain scalability.…”
Get full text
Article -
316
Distributed trust model based on parameter modeling
Published 2013-04-01“…A distributed trust model based on parameter modeling was posed.Nine functional parameters were extracted after investigating the trust mechanism and current trust models.These parameters included flexibility,subjectivity,fuzziness,time decay property,transitivity,anti-attacks property,rewards & punishment property,sensitivity and scalability.Each parameter was modeled and integrated to form a comprehensive trust model.Analytical results indicate that the proposed trust model satisfies all the nine functional parameters and thus has fair universality Experimental results show that the proposed trust model is reasonable and effective.Comparisons with previous algorithms indicate that the performance of the proposed trust model has been improved.…”
Get full text
Article -
317
Supporting Preemptive Multitasking in Wireless Sensor Networks
Published 2014-02-01“…The proposed approach has been implemented and tested on top of VirtualSense, an ultra-low-power wireless sensor mote providing a java-compatible runtime environment. Performance and scalability of the solution are discussed in light of extensive experiments performed on representative benchmarks.…”
Get full text
Article -
318
Energy-Efficient Self-Organized Clustering with Splitting and Merging for Wireless Sensor Networks
Published 2013-03-01“…The results of our experiment show good performance of EECSM, in terms of network lifetime, residual energies, scalability, and robustness.…”
Get full text
Article -
319
Beyond arrival – On the potential and shortcomings of modularity in shelter and housing for the displaced
Published 2023-12-01“…Particularly amid extreme circumstances necessitating swift spatial interventions, such as the sudden surge in demand for housing after a disaster, modularity appeals due to its potential for streamlining and scalability. This article explores how the module – both as a design concept and a construction method – can facilitate immediate design responses to accommodate large groups of people during sudden mass migration. …”
Get full text
Article -
320
Intelligent machine-type communication and network for 6G system
Published 2020-03-01“…With the rapid development of smart city,smart manufacturing and other industries,machine-type communication has gained much attention of academia and industry.The extent of function integration and intelligence of machine-type communication network has become increasingly high,which imposes more stringent requirements on network delay,reliability,number of connected devices,peak rate,security and scalability.Based on analyzing the change of performance requirements,key technology and corresponding network architecture of machine-type communication network in 4G,5G to future 6G system,the intelligent sensing-communication-computation integrated network architecture was proposed for 6G machine-type communication network.…”
Get full text
Article