Showing 361 - 380 results of 1,667 for search '"scalability"', query time: 0.05s Refine Results
  1. 361

    Inter-domain routing security mechanism for crossing autonomous system alliance by Ling-jing KONG, Hua-xin ZENG, Jun DOU, Yao LI

    Published 2014-10-01
    “…Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed.Based on CAHS,using the idea of passport visa and the features of AdHASH (additive hash),a cross-alliance BGP security mechanism SCA-BGP (secure crossing alliance for BGP) was proposed.The mechanism has higher security,which is able to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message carried by them.The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time overhead to get better scalability and convergence performance.…”
    Get full text
    Article
  2. 362

    Secure deduplication and integrity audit system based on convergent encryption for cloud storage by Xiao-yong GUO, An-min FU, Bo-yu KUANG, Wei-jia DING

    Published 2017-11-01
    “…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
    Get full text
    Article
  3. 363

    Framework for a Cloud-Based Multimedia Surveillance System by M. Anwar Hossain

    Published 2014-05-01
    “…Some of the major concerns facing these systems are scalability, ubiquitous access to sensory data, event processing overhead, and massive storage requirements—all of which demand novel scalable approach. …”
    Get full text
    Article
  4. 364

    Low-hit frequency-hopping communication systems for power Internet of things random access by Shu DU, Mei MA, Bo ZHAO, Qi ZENG, Xing LIU

    Published 2023-01-01
    “…The communication network is an essential component of the data acquisition and information transmission in power Internet of things (IoT).To meet the development requirements of multiple power service in the future, the wireless communication technique with flexible-access and high scalability is one of the development directions for power IoT.Due to the features of large-scale access, random access time, high security and reliability for information transmission of power IoT, a frequency-hopping (FH) technique with low-hit rate for random access was proposed.The construction algorithm of such FH pattern was based upon the combination and shift operation of conventional FH sequences.By the theoretical arithmetic and numerical simulation, the properties of the proposed FH pattern and the error-rate of the FH-based power IoT were evaluated.The analysis reveals that the new class of FH sequences and the system can meet the requirements of large-scale access and highly reliable communication for the power IoT, which has good application prospects.…”
    Get full text
    Article
  5. 365

    Design and implementation of software router supporting segment routing by Xiaomin GAO, Xuejing LIU, Jiawei LI, Hongbin LUO, Ping DONG

    Published 2017-02-01
    “…Segment routing (SR) is a routing mechanism proposed by IETF in recent years,which aims to make the IP/MPLS network service-oriented and more efficient.SR eliminates the complex control plane protocol (LDP/RSVP-TE) of the MPLS network,while SR implements the traffic engineering mechanism.Different from the explicit path in the RSVP tunnel which maintains the state of each flow in the middle of the tunnel,the explicit path based on SR only maintains the state of flow at the entrance border router of the SR domain.For this reason,SR improves the scalability of the network.Therefore the research of the SR mechanism is very important to the next generation internet.The realization mechanism of SR was studied,using the click router.The SR control plane subsystem based on PCE architecture and each module of MPLS-based SR data plane subsystem were implemented and deployed in practice to verify the feasibility of the software router in actual deployment.…”
    Get full text
    Article
  6. 366

    Multiplexed Quantum Communication with Surface and Hypergraph Product Codes by Shin Nishio, Nicholas Connolly, Nicolò Lo Piparo, William John Munro, Thomas Rowan Scruby, Kae Nemoto

    Published 2025-01-01
    “…Connecting multiple processors via quantum interconnect technologies could help overcome scalability issues in single-processor quantum computers. …”
    Get full text
    Article
  7. 367

    Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine by Jialin WANG, Jiqiang LIU, Di ZHAO, Yingdi WANG, Yingxiao XIANG, Tong CHEN, Endong TONG, Wenjia NIU

    Published 2018-11-01
    “…Network intrusion detection system plays an important role in protecting network security.With the continuous development of science and technology,the current intrusion technology cannot cope with the modern complex and volatile network abnormal traffic,without taking into account the scalability,sustainability and training time of the detection technology.Aiming at these problems,a new deep learning method was proposed,which used unsupervised non-symmetric convolutional auto-encoder to learn the characteristics of the data.In addition,a new method based on the combination of non-symmetric convolutional auto-encoder and multi-class support vector machine was proposed.Experiments on the data set of KDD99 show that the method achieves good results,significantly reduces training time compared with other methods,and further improves the network intrusion detection technology.…”
    Get full text
    Article
  8. 368

    Continuous flow aqueous tandem conversion of trans-ferulic acid into high added value chemicals by Kelvin Adrian Sanoja-López, Rafael Luque

    Published 2025-03-01
    “…This continuous flow approach offers several advantages over batch methods, including the ability to achieve high yields with precise control of parameters such as temperature, pressure, and flow rate, thereby facilitating process optimization and scalability.…”
    Get full text
    Article
  9. 369

    Software-defined protocol independent parser based on FPGA by Lixin MIAO, Qinrang LIU, Xin WANG

    Published 2020-02-01
    “…With the boom of information technology,heterogeneous networks with various functions emerge in endlessly,heterogeneous fusion network has become the inevitable trend of the development of the next generation network.To realize communication between heterogeneous networks,network forwarding equipment is essential.Traditional forwarding devices only support fixed protocol configuration and lack scalability,so they cannot support new network protocols.In view of this situation,a software defined protocol independent parser based on FPGA was proposed.The software defined the parsing process,giving the parser flexible and programmable features.It can analyze multiple protocol packets and extract key information needed for protocol conversion without changing hardware devices.The parser through a high-performance FPGA platform were implemented and hardware resource overhead and performance were evaluated.Experimental results show that it can complete the fast parsing of various heterogeneous network protocols and obtain complete analytical data.…”
    Get full text
    Article
  10. 370

    Protocol to develop A 3D tumor model for drug testing applications by Prasiddha Guragain, Sunil Singh, Hossein Tavana

    Published 2025-01-01
    “…Compatible with robotic automation, our protocol significantly enhances reproducibility and scalability of creating a tumor model to study tumor-stromal interactions and test therapeutic compounds…”
    Get full text
    Article
  11. 371

    Research on the subtractive clustering algorithm for mobile ad hoc network based on the Akaike information criterion by Liu Banteng, Haibo Yang, Qiuxia Chen, Zhangquan Wang

    Published 2019-09-01
    “…Large and dense mobile ad hoc networks often meet scalability problems, the hierarchical structures are needed to achieve performance of network such as cluster control structure. …”
    Get full text
    Article
  12. 372

    Paramounts of Intent-based Networking: Overview by Martins Mihaeljans, Andris Skrastins, Jurgis Porins

    Published 2024-12-01
    “…The current IBN model detains its adaptation as network assurance requirements of ensuring network security and scalability, and continuity are unfulfillable via conduct of network analysis and track of intent drift. …”
    Get full text
    Article
  13. 373

    Managing startups in a globally competitive environment: the role of venture capital in improving business process efficiency by Vadim Limar

    Published 2024-12-01
    “…These companies are outperforming their sectors both on revenue per employee and long-term competitiveness by making more effective use of resources on topics such as research and development, marketing and operational scalability. …”
    Get full text
    Article
  14. 374

    Query Processing Algorithm Based on Neighbor Information in Delay Tolerant Network by Dameng Wu, Jiangbo Qian, Yefang Chen, Yihong Dong

    Published 2014-04-01
    “…Experimental results show that the efficiency and effectiveness of the IA approach are as well as its scalability in a volatile environment.…”
    Get full text
    Article
  15. 375

    A Carrier Class IoT Service Architecture Integrating IMS with SWE by Dongliang Xie, Chao Shang, Jinchao Chen, Yongfang Lai, Chuanxiao Pang

    Published 2014-05-01
    “…On the other hand, the architecture extends the telecom context-aware service and realizes service operability and network scalability. Moreover, the key components of the architecture and the detailed service procedure were introduced in the paper. …”
    Get full text
    Article
  16. 376

    Standard system of IPv6+ technologies by Zhenbin LI, Feng ZHAO

    Published 2020-08-01
    “…The vision of IPv6+ is to unleash the potential of IPv6 technology with necessary extensions and enhancement,so as to meet the requirement in 5G and cloud era to IP network,such as high scalability,high reliability,new services and intelligence network.IPv6+ consists of a series of protocol and technology innovation:such as SRv6 network programming,network slicing (VPN+),in-situ flow information telemetry (iFIT),next generation multicast (BIER),service function chaining (SFC),deterministic networking (DetNet),and application-aware IPv6 networking (APN6).These technologies are currently under development in several standard organizations,and can be classified into three phases.Standardization is one of the most important work of IPv6+ innovation.The standard system of IPv6+ technologies were defined,including the related standard organization,the whole picture of the IPv6+ standards,the three phases of IPv6+ standardization and key technologies and standard layout of each phase.…”
    Get full text
    Article
  17. 377

    Data management based on blockchain and edge computing for Internet of things by Guanjie CHENG, Zhengjie HUANG, Shuiguang DENG

    Published 2020-06-01
    “…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
    Get full text
    Article
  18. 378

    An Energy-Heterogeneous Clustering Scheme to Avoid Energy Holes in Wireless Sensor Networks by Gong Bencan, Jiang Tingyao, Xu Shouzhi, Chen Peng

    Published 2013-10-01
    “…Clustering techniques can reduce energy consumption of nodes and increase the scalability of the network. However, in uniformly deployed clustering wireless sensor networks, the uneven distribution of communication loads often causes the energy-hole problem, which means that the energy of the nodes in the hole region will be used up sooner than the nodes in other regions. …”
    Get full text
    Article
  19. 379

    Survey on decentralized security-enhanced technologies for RPKI by QIN Chaoyi, ZHANG Yu, FANG Binxing

    Published 2024-07-01
    “…Thirdly, technologies were compared in terms of security, scalability, and incremental deployment. Finally, the existing problems in current technologies were summarized and the future research directions were prospected.…”
    Get full text
    Article
  20. 380

    CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory by Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad

    Published 2023-03-01
    “…Researching the problems with blockchain regulation is crucial.In view of this, CHA (cross-chain based hierarchical architecture) was proposed to address the problems in blockchain regulatory, and a “chain of custody-business chain” cross-chain collaboration chain-based regulatory model was designed.The decentralized of information system regulatory was improved by building a decentralized governance chain, which realized regulatory by separating the strategy layer from the regulatory layer and the business layer, and achieved separation of regulatory behavior and regulatory technology, thus ensuring the versatility of the blockchain regulatory structure.Finally, the distributed feasibility of the regulatory framework is demonstrated through a formal analysis method, and then the technical feasibility of the scheme in terms of cross-chain regulatory reliability, general feasibility and scalability applicable to different regulatory services are proved.…”
    Get full text
    Article