-
101
Using the Nonuniform Dynamic Mode Decomposition to Reduce the Storage Required for PDE Simulations
Published 2019-01-01“…Furthermore, different numerical experiments were performed on the NU-DMD to ascertain its behavior with respect to errors, memory usage, and computational efficiency. It was shown that the NU-DMD could reduce an advection-diffusion simulation to 6.0075% of its original memory storage size. …”
Get full text
Article -
102
Building a High-Performance Graph Storage on Top of Tree-Structured Key-Value Stores
Published 2024-03-01Get full text
Article -
103
Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television
Published 2021-01-01“…Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. …”
Get full text
Article -
104
System and application of video surrveillance based on edge computing
Published 2020-06-01“…With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.…”
Get full text
Article -
105
Bioinformatics services for analyzing massive genomic datasets
Published 2020-03-01“…The explosive growth of next-generation sequencing data has resulted in ultra-large-scale datasets and ensuing computational problems. …”
Get full text
Article -
106
Complexity of Deep Convolutional Neural Networks in Mobile Computing
Published 2020-01-01“…These neural networks are computation-intensive, and training them requires a lot of training data. …”
Get full text
Article -
107
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01“…With the wide applications in the field of machine learning and artificial intelligence, importance to the influences of quantum artificial intelligence on the big data security on internet should be attached. Additionally, it was the first time to use the quantum computer for designing cryptography and it shed an interesting light on cryptography design based on the quantum artificial intelligence which had not been reported anywhere before.…”
Get full text
Article -
108
-
109
IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
Published 2021-03-01“…The delivery of cloud computing is highly efficient, storage is becoming more and more current, and some groups are now altering their data from in house records Cloud Computing Vendors' hubs. …”
Get full text
Article -
110
Research progress of trusted sensor-cloud based on fog computing
Published 2019-03-01“…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
Get full text
Article -
111
Building method of distributed COW disk on network computing environment
Published 2012-07-01“…Aiming to distributed computing and data centralizing storage in large-scale network computing environments and combining sparse and bursting characteristic of COW(copy-on-write) disk storing modified data blocks,the distributed COW network disk architecture was presented.The system building process of network computing environments was speeded up by apportioning the aggregation spending that server manages all related COW disks of client hosts to each client host.A improving 64bit bitmap compress arithmetic was designed to reduce the size of COW disk’s bitmap,so server disk space was saved and the network communication spending of distributed COW disk was less.The modified prefetching arithmetic based on COW bursting blocks was presented to improve the hit rate of Cache relating with distributed COW disk.Experiments on the prototype show that the distributed COW mechanism can effectively reduce system building latency of multi-client hosts network computing environment based on improving COW bitmap compress and prefetching arithmetic.…”
Get full text
Article -
112
-
113
An Autonomous Planning Model for Deploying IoT Services In Fog Computing
Published 2024-02-01“…Therefore, processing, analysis and storage are closer to the source of data and end users cause the delay is reduced. …”
Get full text
Article -
114
Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges
Published 2024-09-01“…Cloud computing's key role in telemedicine is investigated through its scalable data storage and processing capabilities, which manage the vast amounts of data generated by IoT devices. …”
Get full text
Article -
115
Research and application of mining AI video edge computing technology
Published 2024-12-01“…To address these issues, a lightweight and edge-deployable mining AI video edge computing system was designed. A lightweight software development kit (SDK) framework based on the register machine was proposed to decouple operators, improving the parallel computing ability of the algorithms and reducing the storage requirements of the SDK. …”
Get full text
Article -
116
NETWORK VIRTUALIZATION PERFORMANCE ANALYSIS ON OPENSTACK CLOUD COMPUTING INFRASTRUCTURES
Published 2016-06-01“…Moreover, Cloud computing also can assist users to balance, share, and manage IT resources among customers to get better performance of compute and storage. …”
Get full text
Article -
117
Musical Expectancy. Bridging Music Theory, Cognitive and Computational Approaches
Published 2013-01-01Get full text
Article -
118
Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks
Published 2015-07-01“…The previous research of distributed sensor network security has focused on secure information in communication; however the research of secure data storage has been overlooked. As we know, cloud data storage and retrieval have become popular for efficient data management in distributed sensor networks; thus they can enjoy the on-demand high-quality cloud storage service. …”
Get full text
Article -
119
Over 60% precipitation transformed into terrestrial water storage in global river basins from 2002 to 2021
Published 2025-01-01Get full text
Article -
120
Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective
Published 2022-01-01“…By analyzing the computational technologies and algorithms most commonly used in credit data collection and data storage, data transmission and data access, data analysis and processing, data calculation, result output and effect evaluation, this paper summarizes and proposes a unified general process of modern credit investigation, pointing out that in this general process, low data quality, privacy violation, algorithmic bias are the main challenges in the big data era, and countermeasures like data quality control, privacy protection, and algorithm governance need to be to be taken seriously into account in order to further explore the great potential of the credit investigation under the legal framework.…”
Get full text
Article