-
441
Research on Dynamic Virtualization Distributed Mobility Management Method for LEO Satellite Network
Published 2020-09-01“…With the commercialization of 5G,the integration of satellite communication and ground 5G has become a key research direction in the industry.Low earth orbit satellite network can cover the whole world and communicate with anyone at any time and anywhere.It is an eff ective supplement and expansion of terrestrial cellular network.Especially,the deployment of low earth orbit (LEO) internet constellation such as OneWeb and Starlink accelerates the development of LEO satellite network.However,due to the high dynamic of LEO satellite and the fast change of its network topology,the network management problem caused by it has become the diff culty of LEO satellite application,and mobility management is one of the key technologies.How to build a mobility management mechanism suitable for high dynamic LEO satellite network is an urgent problem to be solved.Based on the idea of ground distributed gateway and satellite agent cluster,the dynamic virtualization distributed mobility management (DV-DMM) model was proposed,which was mainly used to solve the problems of poor scalability and single point failure of traditional mobility management.At the same time,it used satellite to build virtual gateway to solve the problem of building satellite ground station on the ground.…”
Get full text
Article -
442
Blockchain-based digital copyright trading system
Published 2018-07-01“…In the current era of digitalization and networking,the demand for digital copyright transactions is increasing.The traditional centralized copyright protection system has series of problems such as high registration costs,long work acceptance times,and being vulnerable to tampering by saboteurs.Blockchain as a decentralized network structure and based on P2P network and cryptographic technology,which can establish trust relationship on the network by pure mathematics.Without relying on the middle platform,blockchain technology can naturally alleviate the above problems.With the help of self-regulatory,traceable and decentralized features of blockchain technology and digital copyright trading scenarios,a digital copyright trading system model was designed.The new system is based on the advanced permissioned blockchain provided by IBM.The implementation of copyright registration and copyright transaction can ensure the integrity and tamper-resistant of the information.Finally,the installation time of chain code deployment was tested.The results show that the system is simple to install and has low maintenance costs.Compared with the traditional trusted third party copyright authentication mechanism,the blockchain-based digital rights trading system has a short registration time,no registration fee,and better architecture security and scalability.…”
Get full text
Article -
443
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01“…Existing solutions, like static whitelisting, struggle with scalability and adaptability in dynamic environments. …”
Get full text
Article -
444
Super group peer selection algorithm in hybrid layered P2P streaming system based on evolutionary game
Published 2013-12-01“…Due to high efficiency and good scalability,hybrid layered P2P architecture receives more and more impor-tance in P2P research and P2P streaming application fields recently.The blems about super peers selection are highly challenging because super peers must be selected from huge and dynamically changing network.A distributed super group peer(SGP) selection algorithm based on evolutionary game is proposed in this paper,in hich the SGP selection procedure is modeled based on evolutionary game framework firstly and its evolutionarily Moreover,a distributed Q-Learning algorithm (ESS-SGP) according to the mixed strategies by analysis is proposed for the peers to converge to the ESSs based on their own payoff history.Compared to the traditional random selected SGP P2P schemes,experiments results show that the proposed ESS-SGP algorithm achieves much better performance in terms of social welfare,average upload rate of SGPs,and keeps the upload capacity of the P2P streaming system increasing steadily with the number of peers increasing.…”
Get full text
Article -
445
A Chinese Knowledge Graph Dataset in the Field of Scientific Fitness
Published 2025-02-01“…The experimental results show that the model achieved an F1 score of 94.05% in entity recognition tasks and 82.00% in relation extraction tasks, validating the effectiveness of the model and improving the scalability of the dataset.…”
Get full text
Article -
446
E-module innovation: a product-based approach to database practicum
Published 2024-11-01“…The practicality of the module was rated very high, with a Reproducibility Coefficient of 0.98 and a Scalability Coefficient of 0.95. Its effectiveness was demonstrated through an improvement in student learning outcomes, with an N-Gain score of 0.73, categorized as high. …”
Get full text
Article -
447
Survey of network-layer anonymous communication protocols
Published 2020-02-01“…An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding,content encryption,and traffic obfuscation to hide communication relationships between entities and forwarded contents.However,there is a deficiency in the balance between performance and security as an anonymous communication system operating over an overlay network.With the advance of the future internet architectures,it is possible to build an infrastructure-based anonymous communication system.Such anonymous communication systems design anonymity as network infrastructure services and provide encryption operations for routers,which can solve the part problem of scalability and performance limitations of anonymous network.They can also be called network-layer anonymous communication protocols.The existing network-layer anonymous communication protocols (LAP,Dovetail,Hornet,PHI and Taranet) were studied.The classification standard of network-layer anonymous communication protocols were introduced.Its innovation point and specific encryption ideas were briefly described,and how to keep balance between security and performance was analyzed.The shortcomings and advantages of these kinds of network anonymous communication protocols were also pointed out.Finally,the challenges faced in the development of anonymous communication systems and the problems that need to be studied in depth were proposed.…”
Get full text
Article -
448
Load balancing for high performance computing using quantum annealing
Published 2025-01-01“…The primary obstacle to scalability is found to be limited coupling on current quantum annealing hardware. …”
Get full text
Article -
449
The Critical Success Factors for Sustainability Financial Technology in Vietnam: A Partial Least Squares Approach
Published 2022-01-01“…The research concluded the presented seven CSFs with the following customer centricity, low profit margin, agility, scalability, security management, innovation, and compliance easy. …”
Get full text
Article -
450
Super Partition: fast, flexible, and interpretable large-scale data reduction in R
Published 2025-01-01“…Applications to high dimensional data sets show scalability to hundreds of thousands of features with reasonable computation times. …”
Get full text
Article -
451
Exploring the potential of blockchain technology for citizen engagement in smart governance [version 4; peer review: 1 approved, 3 approved with reservations]
Published 2025-01-01“…By examining the benefits of BCT in various aspects of smart city systems, such as data security and privacy, the paper highlights the advantages of implementing consortium blockchain architecture and the Proof of Authority (PoA) consensus algorithm and discusses the challenges of scalability and security concerns. Based on the literature showed in this article, we believe that the use of BCT in smart governance could significantly enhance citizen participation and help manage and deliver public services, paving the way for more effective decision-making processes and improved quality of life for citizens.…”
Get full text
Article -
452
A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection
Published 2012-01-01“…In this work, we refine the base NetStage architecture for better management and scalability. Using dynamic partial reconfiguration, we can now update the functionality of the honeypot during operation. …”
Get full text
Article -
453
Methodological and Technological Advancements in E-Learning
Published 2025-01-01“…It underscores the importance of bridging equity gaps while maintaining scalability and sustainability, particularly in underserved regions. …”
Get full text
Article -
454
Catalysts for Transesterification of Vegetable Oils: A Review
Published 2025-02-01“…Challenges such as catalyst separation, contamination, and industrial scalability are explored alongside future directions, including the development of green and biomass-derived catalysts. …”
Get full text
Article -
455
Multi-Controller Placement Optimization Using Naked Mole-Rat Algorithm over Software-Defined Networking Environment
Published 2022-01-01“…Controller Placement Problem (CPP) involves placing the optimal number of controllers at the appropriate locations while meeting prerequisites such as latency, load balancing, energy and computational time. To achieve scalability, deployment of multiple controllers on large-scale SDN is one of the key challenges. …”
Get full text
Article -
456
Parallel Rayleigh Quotient Optimization with FSAI-Based Preconditioning
Published 2012-01-01“…The parallel DACG code accelerated by FSAI is written in MPI-Fortran 90 language and exhibits good scalability up to one thousand processors.…”
Get full text
Article -
457
An Adaptive Particle Swarm Optimization Algorithm for Distributed Search and Collective Cleanup in Complex Environment
Published 2013-12-01“…The simulation results demonstrate the feasibility, robustness, and scalability of our proposed method compared to previous methods.…”
Get full text
Article -
458
Transforming it operations management through applied engineering practices: a framework for success
Published 2024-09-01“…Continuous improvement and agile methodologies, when coached into companies, lead to longer term sustainability in terms of cost efficiency and scalability. In addition, the research illustrates the importance of organizational factors like resource allocation, employee training, and autonomy of decisions in improving the performance of these engineering practices. …”
Get full text
Article -
459
Theoretical Models for Video on Demand Services on Peer-to-Peer Networks
Published 2009-01-01“…Peer-to-peer networks (P2Ps) are becoming more and more popular in video content delivery services, such as TV broadcast and Video on Demand (VoD), thanks to their scalability feature. Such characteristic allows for higher numbers of simultaneous users at a given server load and bandwidth with respect to alternative solutions. …”
Get full text
Article -
460
Research on Access Authentication and Re-Authentication Mechanism of User Devices in Terrestrial Default Scenario in Satellite Internet
Published 2023-06-01“…For the current user device access authentication mechanism requires ground participation to bring about large communication delays and poor scalability, a user device access authentication and re-authentication protocol in the ground default scenario in the space-ground integrated network was proposed, and further for the user device authentication process may occur in the power outage reconnection and AV asynchronization and other problems, a user device fast authentication mechanism and AV fast security synchronization mechanism under power failure reconnection scenario were proposed to ensured that users could safely accessed the satellite network and obtain related services.In the proposed scheme, the AV vector generated in the initial access authentication was used to assisted the re-authentication process to completed the authentication between entities without the involvement of the network control center, which guaranteed the communication system resilience.The formal verification tool Scyther showed that the proposed protocol was resistant to common protocol attacks, guaranteed the confidentiality and integrity of the communication process, and had a small signaling, computational, and bandwidth overhead, made it suitable for the satellite internet.…”
Get full text
Article