Showing 381 - 400 results of 411 for search 'Computer data storage', query time: 0.07s Refine Results
  1. 381

    Research on large-scale P2P worm simulation by WU Guo-zheng, QIN Zhi-guang

    Published 2011-01-01
    “…P2P worm has its own features and existing simulation approaches can not be used to it directly.In order to simulate large-scale P2P worm,a virtual-node based simulation approach and a double-engine based simulation architec-ture were proposed.In the virtual-node based P2P simulation solution,the data and the operation of worm nodes were separated to save computational power and storage.Therefore,large-scale P2P worms were simulated with available lim-ited physical resources in single or multiple simulating computers.In double-engine P2P simulation architecture,two en-gines,local engine and network engine,were used in simulation system.The local engine was responsible for local mes-sage processing and the network engine focused on message passing in communication network.Combined with these two engines,packet level P2P worm simulation was provided by the simulation system to enhance the fidelity and scal-ability.Experimental results showed that the novel simulation solution was practical to simulate large-scale P2P worms with high fidelity.…”
    Get full text
    Article
  2. 382

    Research Progress of Silicon based Micro Ring Resonators by HOU Linjun, FENG Song, OUYANG Jie, HU Xiangjian, LI Haojie, GUO Shaokai, LIU Yong, WANG Di, CHEN Menglin, FENG Lulu, ZHOU Ran, WU Jianyang, ZENG Yuling, HE Xinyi

    Published 2024-12-01
    “…With the rapid growth of big data demand, electronic chips and their interconnection technologies cannot meet the requirements of high-speed data transmission and high energy efficiency in computing and storage systems. …”
    Get full text
    Article
  3. 383

    An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks by Chen-Yang Cheng, Iuon-Chang Lin, Shu-Yan Huang

    Published 2015-09-01
    “…The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.…”
    Get full text
    Article
  4. 384

    Research on distributed identity authentication mechanism of IoT device based on blockchain by Chen TAN, Meijuan CHEN, Ebenezer ACKAH Amuah

    Published 2020-06-01
    “…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
    Get full text
    Article
  5. 385

    Efficient and secure electronic evidence exchange scheme for internet of things by Yulong Xiao, Liang Chen

    Published 2025-01-01
    “…Through a secure two-factor authentication mechanism, this scheme achieves identity verification between the user and the storage center, as well as confidentiality during the data transmission process. …”
    Get full text
    Article
  6. 386

    Edge intelligence empowered internet of vehicles: concept, framework, issues, implementation, and prospect by Kai JIANG, Yue CAO, Huan ZHOU, Xuefeng REN, Yongdong ZHU, Hai LIN

    Published 2023-03-01
    “…As an emerging inter discipline field, edge intelligence pushes AI to the side close to the traffic data source.Edge intelligence makes use of the computing power, storage resources, and perception ability of edge to provide a more intelligent and efficient resource allocation and processing mechanism while providing a real-time response, intelligent decision-making and network autonomy, realizing the critical leap for internet of vehicles from access “pipelining” to the intelligent enabling platform of information.However, the successful implementation of edge intelligence in internet of vehicles is still in its infancy, and there exists a demand for a comprehensive survey in this young field from a broader perspective.Based on this context of internet of vehicles, the background, concepts and key technologies of edge intelligence were introduced.Then, a holistic overview of service types based on internet of vehicles was taken, and the entire processes of model training and inference in edge intelligence were elaborated.Finally, to promote the potential research directions, the key open challenges of edge intelligence in the internet of vehicles were analyzed, and the coping strategies were discussed.…”
    Get full text
    Article
  7. 387

    Lagrange Multivariate Polynomial Interpolation: A Random Algorithmic Approach by A. Essanhaji, M. Errachid

    Published 2022-01-01
    “…RLMVPIA is easy to implement and requires no storage.…”
    Get full text
    Article
  8. 388

    A System of Remote Patients’ Monitoring and Alerting Using the Machine Learning Technique by M. Dhinakaran, Khongdet Phasinam, Joel Alanya-Beltran, Kingshuk Srivastava, D. Vijendra Babu, Sitesh Kumar Singh

    Published 2022-01-01
    “…The proposed methodology makes use of different machine learning algorithms along with cloud computing for continuous data storage. Over the years, these technologies have resulted in significant advancements in the healthcare industry. …”
    Get full text
    Article
  9. 389

    Review of optimal resource allocation scheme for 5G Internet of vehicles by Chengyu ZHENG, Yiting YAO, Hongbin LIANG, Lei WANG

    Published 2023-07-01
    “…As a necessary part of the development of intelligent transportation, the Internet of vehicles (IoV) accelerates the construction of intelligent transportation infrastructure in China, which plays an important practical significance to the construction of smart city.The number of vehicles and the massive data generated by them make the transmission conflict rate between communication vehicle nodes rise significantly, and communication resources and computing resources are in short supply.Therefore, the effective resource allocation scheme can ensure the communication quality of vehicle networking, thereby improving the reliability of vehicle communication and reducing the time delay.Firstly, the influence of IoV on the development status of intelligent transportation at home and abroad and the bottlenecks of the development of IoV were analyzed.Secondly, in terms of the efficiency and safety of smart transportation, the resource allocation problem of IoV was analyzed.Thirdly, by summarizing the advantages of 5G technology, the contribution of 5G in the optimization allocation and management of vehicle networking resources was analyzed.Finally, combined with the application of artificial intelligence technology in the context of Internet of vehicles communication, computing and storage resource optimization allocation and management, the development prospect of intelligent transportation based on 5G+V2X was proposed.…”
    Get full text
    Article
  10. 390
  11. 391

    One-Time Broadcast Encryption Schemes in Distributed Sensor Networks by Pawel Szalachowski, Zbigniew Kotulski

    Published 2012-03-01
    “…This is because of a WSN is a very dynamic network which includes nodes with limited computational, storage, and communication capabilities. …”
    Get full text
    Article
  12. 392

    Lightweight decentralized learning-based automatic modulation classification method by Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI

    Published 2022-07-01
    “…In order to solve the problems in centralized learning, a lightweight decentralized learning-based AMC method was proposed.By the proposed decentralized learning, a global model was trained through local training and model weight sharing, which made full use of the dataset of each communication nodes and avoided the user data leakage.The proposed lightweight network was stacked by a number of different lightweight neural network blocks with a relatively low space complexity and time complexity, and achieved a higher recognition accuracy compared with traditional DL models, which could effectively solve the problems of computing power and storage space limitation of edge devices and high communication overhead in decentralized learning based AMC method.The experimental results show that the classification accuracy of the proposed method is 62.41% based on RadioML.2016.10 A.Compared with centralized learning, the training efficiency is nearly 5 times higher with a slight classification accuracy loss (0.68%).In addition, the experimental results also prove that the deployment of lightweight models can effectively reduce communication overhead in decentralized learning.…”
    Get full text
    Article
  13. 393

    Ensuring Safety and Reliability: An Overview of Lithium-Ion Battery Service Assessment by Cezar Comanescu

    Published 2024-12-01
    “…Current reliability assessment techniques include experimental methods, computational models, and data-driven approaches. Emerging trends, such as advanced characterization techniques and standardized testing protocols, advocate for improved practices to enhance the reliability and safety of LIBs across all applications.…”
    Get full text
    Article
  14. 394

    Intelligent prediction method of virtual network function resource capacity for polymorphic network service slicing by Julong LAN, Di ZHU, Dan LI

    Published 2022-06-01
    “…Conclusions: With the vigorous development of artificial intelligence technology, polymorphic network has given computing, storage and transmission capabilities to virtual nodes on network slices,and has been able to realize the dual improvement of network resource utilization and user experience through the adaptive flow of business demand data on the basis of autonomously sensing data throughput and autonomously predicting the resource requirements of VNFs on nodes. …”
    Get full text
    Article
  15. 395

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
    Get full text
    Article
  16. 396

    Advances in Metal Halide Perovskite Memristors: A Review from a Co‐Design Perspective by Bowen Jiang, Xiang Chen, Xiaoxin Pan, Li Tao, Yuangqiang Huang, Jiahao Tang, Xiaoqing Li, Peixiong Wang, Guokun Ma, Jun Zhang, Hao Wang

    Published 2025-01-01
    “…Additionally, the potential of MHPs memristors in data processing, physical encryption devices, artificial synapses, and brain‐like computing advancement of MHPs memristors is evaluated. …”
    Get full text
    Article
  17. 397

    One-Shot Segmentation of Battery Cells with Gradual Learning by Johann Christopher Engster, Nele Blum, Laura Hellwege, Thorsten M. Buzug, Maik Stille

    Published 2025-02-01
    “… Due to the growing importance of electric vehicles and battery energy storage systems, battery safety must be ensured during and after production. …”
    Get full text
    Article
  18. 398

    Refined construction of semi-provincial hydrogeological models using hierarchical modeling: A case study in Western Shandong Province, China by Guangjun Ji, Zizhao Cai, Xiaobo Tan, Tao Wang, Chuanqi Wang, Qiuxiao Xu, Bo Zhou, Yang Cui

    Published 2025-04-01
    “…Additionally, a systematic design for structural and attribute models was conducted before modeling, based on hydrogeological conditions and data distribution. This ensures precise characterization of geological objects while minimizing data requirements. …”
    Get full text
    Article
  19. 399

    Three-Dimensional Inversion of Borehole-Surface Resistivity Method Based on the Unstructured Finite Element by Zhi Wang, Sinan Fang

    Published 2021-01-01
    “…The goal of electromagnetic data processing is to suppress the noise and improve the signal-to-noise ratio and the inversion of resistivity data. …”
    Get full text
    Article
  20. 400

    Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim

    Published 2020-01-01
    “…The users can store their confidential data at IOT storage and can access them anytime when they need. …”
    Get full text
    Article