Showing 341 - 360 results of 411 for search 'Computer data storage', query time: 0.06s Refine Results
  1. 341

    An Efficient Key Management Scheme for Wireless Sensor Networks by Dahai Du, Huagang Xiong, Hailiang Wang

    Published 2012-01-01
    “…Due to the inherent characteristics of wireless communications, WSNs are more vulnerable to be attacked than conventional networks. Authentication and data confidentiality are critical in these settings. …”
    Get full text
    Article
  2. 342

    English Phrase Speech Recognition Based on Continuous Speech Recognition Algorithm and Word Tree Constraints by Haifan Du, Haiwen Duan

    Published 2021-01-01
    “…The word tree constraint and its efficient storage structure are introduced, which improves the storage efficiency of the word tree constraint and the retrieval efficiency in the English phrase recognition search.…”
    Get full text
    Article
  3. 343
  4. 344

    Ultrasound investigation in estimation of vascular invasion and morphological verification of pancreatic tumors by S. O. Stepanov, N. A. Rubtsova, D. V. Sidorov, L. O. Petrov, L. A. Mitina, V. I. Kazakevich, Ye. N. Slavnova, E. V. Prozorova

    Published 2014-11-01
    “…Traditionally «the gold standard» in detection of tumor and estimation of vascular invasion is computer tomography. In world practice US at PT is used only at the stage of primary diagnostics, as a rule, application at specifying diagnostics stage is limited because the method is operator-dependent and storage of study data is complex. …”
    Get full text
    Article
  5. 345

    IPTV user’s on-demand behavior based on adaptive segmental stretched exponential model by Buhua CHEN, Ge CHEN, Jie LIANG

    Published 2018-05-01
    “…The IPTV user’s on-demand behavior model based on adaptive segmental stretched exponential (ASSE) was proposed to optimize the configuration of IPTV CDN system,to improve the video scheduling and storage strategy,and to provide users with better experience for video access.At the same time,the probability of the video access by using the actual IPTV user’s on-demand data of China Telecom was simulated.Experiments show that compared with the traditional modeling methods,the ASSE model proposed not only achieves the purpose of simplifying the mathematical model and reducing the computation,but also improves the accuracy of the curve fitting.It has good consistency with the actual data.…”
    Get full text
    Article
  6. 346

    Research and design of multi-tenant scheme for Kubernetes container cloud platform by Danchi HUANG, Zhenwei HE, Liyun YAN, Yuanzhi LIN, Xinzhang YANG

    Published 2020-09-01
    “…In the container cloud platform,tenants share the underlying computing,storage,network and other resources,and there are problems with the operation of the tenant container and data security.Based on the analysis of Kubernetes scheme based on access control and resource isolation,a multi-tenant cloud platform was proposed,which covers multi-tenancy management model,multi-tenant access control,computing resources isolated and network resources,etc.The proposed model can be practically improving resource isolation capability based on containers of Kubernetes cloud platform,effectively reduce the data security hidden danger.…”
    Get full text
    Article
  7. 347

    An Examination of Records Management in Private Sector Agencies in Kabale Municipality: A Case Study of Kigezi Private Sector. by Kakuru, Danis

    Published 2024
    “…The data was analyzed using Excel, a computer software to generate descriptive statistics such as frequencies and percentages and they were presented in tables and text. …”
    Get full text
    Thesis
  8. 348

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  9. 349
  10. 350

    Fast two dimensional to three dimensional registration of fluoroscopy and CT-scans using Octrees on segmentation maps by Luca Bertelli, Frédéric Gibou

    Published 2012-06-01
    “…The DRR generation process is the bottleneck of any three dimensional to two dimensional registration system, since its computational complexity scales with the number of voxels in the Computed Tomography Data, which can be of the order of tens to hundreds of millions. …”
    Get full text
    Article
  11. 351

    Exploiting Neural-Network Statistics for Low-Power DNN Inference by Lennart Bamberg, Ardalan Najafi, Alberto Garcia-Ortiz

    Published 2024-01-01
    “…This work addresses this bottleneck by contributing a low-power technique for edge-AI inference engines that combines overhead-free coding with a statistical analysis of the data and parameters of neural networks. Our approach reduces the power consumption of the logic, interconnect, and memory blocks used for data storage and movements by up to 80% for state-of-the-art benchmarks while providing additional power savings for the compute blocks by up to 39 %. …”
    Get full text
    Article
  12. 352

    Simulation Analysis of a Multiple-Vehicle, High-Speed Train Collision Using a Simplified Model by Suchao Xie, Weilin Yang, Ping Xu

    Published 2018-01-01
    “…In comparison to the full-size finite element model, it is more specific, had more rapid computational speed, and saved a large amount of computational power and storage space. …”
    Get full text
    Article
  13. 353

    Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain by Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG

    Published 2021-12-01
    “…To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and the evidence report were stored in the cloud server and the block chain respectively to realize the secure storage and sharing of the electronic evidence.The identity-based signcryption technology was used to ensure the confidentiality of data, and the proxy re-encryption technology was used to realize the sharing of electronic evidence of Internet of vehicles by insurance companies.The aggregation signature technique was introduced to reduce the computation cost of multi vehicle user signature verification.The reliability of electronic evidence was improved by using credibility incentive mechanism.Security analysis shows that the proposed scheme achieves data confidentiality, integrity, verifiability and unforgeability.Compared with the existing schemes, the proposed scheme has certain advantages in terms of computational overhead.…”
    Get full text
    Article
  14. 354

    Cross pattern hiding structured encryption for conjunctive queries by YANG Ziyi, MA Changshe, XIE Nanjiang

    Published 2024-06-01
    “…It is designed to protect the privacy of cloud storage data and supports a variety of queries on the ciphertext database. …”
    Get full text
    Article
  15. 355

    Research on content distribution mechanism of MP2P networks by Guo-yin ZHANG, Lu LI, Jian-guo SUN, Xiang-hui WANG

    Published 2013-05-01
    “…In consideration of the current MP2P network disturbance from frequent location changes of the mobile nodes,the limited computing power and storage capacity,a flexible strategy of partition management by assigning different functions to nodes according to some standards,regarding a subnet as a unit and using super-nodes to manage subnets were proposed.In order to speed up the data transmission and replacement efficiency,data was processed with partial network coding technology.Additionally,a trans-subnet query algorithm was proposed to link subnets,conduct informa-tion exchange between subnets and resource location.Results of the experiment manifested that this strategy can effi-ciently increase the resource download success rate and hit rate,reduce the average delay,improve the content distribu-tion efficiency of MP2P networks,and simultaneously enhance system robustness.…”
    Get full text
    Article
  16. 356

    A secure authentication method based on hash function for RFID system by Chuan LI, Xuejun LI

    Published 2017-06-01
    “…Limited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols,a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader,tags and server.Specifically,the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore,the proposed strategy effectively ensures the data and privacy security of the RFID system,achieving the bidirectional anonymous authentication between the terminal and server,which is very suitable for the distributed large-scale RFID system.…”
    Get full text
    Article
  17. 357

    Scaled Fenwick Trees by Matthew Cushman

    Published 2023-01-01
    “…A novel data structure that enables the storage and retrieval of linear array numeric data with logarithmic time complexity updates, range sums, and rescaling is introduced and studied. …”
    Get full text
    Article
  18. 358

    Partially policy hidden CP-ABE supporting dynamic policy updating by Zuo-bin YING, Jian-feng MA, Jiang-tao CUI

    Published 2015-12-01
    “…Ciphertext-policy attribute-based encryption (CP-ABE) was considered to be appropriate for cloud storage.However,under traditional CP-ABE scheme which was limited in terms of the scale of the data and the quantities of the attributes,computation and communication costs would be introduced correspondingly whenever the data owner wants to update the policy.Moreover,the policy which was stored in the form of plaintext would also result in privacy leakage.Aiming at tackling the above two problems,a novel scheme called partially policy hidden CP-ABE supporting dynamic policy updating (DPUPH-CP-ABE) was proposed.Through utilizing proposed scheme,the computation cost will be reduced,especially on user side,leaving the most computational work to the cloud server.Meanwhile,the value of the user’s attributes will never be revealed to any third parties,and the users’ privacy will be effectively preserved.Besides,the scheme is proved to be adaptively chosen plaintext attack (CPA) secure in the standard model and can support any types of policy updating.…”
    Get full text
    Article
  19. 359

    Quantum resonant dimensionality reduction by Fan Yang, Furong Wang, Xusheng Xu, Pan Gao, Tao Xin, ShiJie Wei, Guilu Long

    Published 2025-01-01
    “…After QRDR, the dimension of input data N can be reduced into the desired scale R, and the effective information of the original data will be preserved correspondingly, which will reduce the computational complexity of subsequent quantum machine learning algorithms or quantum storage. …”
    Get full text
    Article
  20. 360

    Innovative IaaS Management System for Sensor Devices and IT Resources by Hitomi Takahashi, Takayuki Kushida

    Published 2014-06-01
    “…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
    Get full text
    Article