Showing 101 - 120 results of 411 for search 'Computer data storage', query time: 0.10s Refine Results
  1. 101

    Using the Nonuniform Dynamic Mode Decomposition to Reduce the Storage Required for PDE Simulations by Brenton T. Hall, Ching-Shan Chou, Jen-Ping Chen

    Published 2019-01-01
    “…Furthermore, different numerical experiments were performed on the NU-DMD to ascertain its behavior with respect to errors, memory usage, and computational efficiency. It was shown that the NU-DMD could reduce an advection-diffusion simulation to 6.0075% of its original memory storage size. …”
    Get full text
    Article
  2. 102
  3. 103

    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television by Youwen Ma, Yi Wan

    Published 2021-01-01
    “…Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. …”
    Get full text
    Article
  4. 104

    System and application of video surrveillance based on edge computing by Sanming PAN, Mingqiang YUAN

    Published 2020-06-01
    “…With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.…”
    Get full text
    Article
  5. 105
  6. 106

    Complexity of Deep Convolutional Neural Networks in Mobile Computing by Saad Naeem, Noreen Jamil, Habib Ullah Khan, Shah Nazir

    Published 2020-01-01
    “…These neural networks are computation-intensive, and training them requires a lot of training data. …”
    Get full text
    Article
  7. 107

    Shaping the future of commercial quantum computer and the challenge for information security by Chao WANG, Yun-jiang WANG, Feng HU

    Published 2016-03-01
    “…With the wide applications in the field of machine learning and artificial intelligence, importance to the influences of quantum artificial intelligence on the big data security on internet should be attached. Additionally, it was the first time to use the quantum computer for designing cryptography and it shed an interesting light on cryptography design based on the quantum artificial intelligence which had not been reported anywhere before.…”
    Get full text
    Article
  8. 108
  9. 109

    IoT and Cloud Computing Issues, Challenges and Opportunities: A Review by Mohammed Mohammed Sadeeq, Nasiba M. Abdulkareem, Subhi R. M. Zeebaree, Dindar Mikaeel Ahmed, Ahmed Saifullah Sami, Rizgar R. Zebari

    Published 2021-03-01
    “…The delivery of cloud computing is highly efficient, storage is becoming more and more current, and some groups are now altering their data from in house records Cloud Computing Vendors' hubs. …”
    Get full text
    Article
  10. 110

    Research progress of trusted sensor-cloud based on fog computing by Tian WANG, Xuewei SHEN, Hao LUO, Baisheng CHEN, Guojun WANG, Weijia JIA

    Published 2019-03-01
    “…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
    Get full text
    Article
  11. 111

    Building method of distributed COW disk on network computing environment by Huai-liang TAN, Zheng LUO, Zai-hong HE, Ren-fa LI

    Published 2012-07-01
    “…Aiming to distributed computing and data centralizing storage in large-scale network computing environments and combining sparse and bursting characteristic of COW(copy-on-write) disk storing modified data blocks,the distributed COW network disk architecture was presented.The system building process of network computing environments was speeded up by apportioning the aggregation spending that server manages all related COW disks of client hosts to each client host.A improving 64bit bitmap compress arithmetic was designed to reduce the size of COW disk’s bitmap,so server disk space was saved and the network communication spending of distributed COW disk was less.The modified prefetching arithmetic based on COW bursting blocks was presented to improve the hit rate of Cache relating with distributed COW disk.Experiments on the prototype show that the distributed COW mechanism can effectively reduce system building latency of multi-client hosts network computing environment based on improving COW bitmap compress and prefetching arithmetic.…”
    Get full text
    Article
  12. 112
  13. 113

    An Autonomous Planning Model for Deploying IoT Services In Fog Computing by Mansoureh Zare, Yasser Elmi sola, Hesam Hasanpour

    Published 2024-02-01
    “…Therefore, processing, analysis and storage are closer to the source of data and end users cause the delay is reduced. …”
    Get full text
    Article
  14. 114

    Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges by M. Sunil Kumar, D. Ganesh

    Published 2024-09-01
    “…Cloud computing's key role in telemedicine is investigated through its scalable data storage and processing capabilities, which manage the vast amounts of data generated by IoT devices. …”
    Get full text
    Article
  15. 115

    Research and application of mining AI video edge computing technology by ZHANG Liya, HAO Bonan, MA Zheng, YANG Zhifang

    Published 2024-12-01
    “…To address these issues, a lightweight and edge-deployable mining AI video edge computing system was designed. A lightweight software development kit (SDK) framework based on the register machine was proposed to decouple operators, improving the parallel computing ability of the algorithms and reducing the storage requirements of the SDK. …”
    Get full text
    Article
  16. 116

    NETWORK VIRTUALIZATION PERFORMANCE ANALYSIS ON OPENSTACK CLOUD COMPUTING INFRASTRUCTURES by Võ Nhân Văn, Lê Minh Chí, Nguyễn Quốc Long, Lê Đắc Nhường

    Published 2016-06-01
    “…Moreover, Cloud computing also can assist users to balance, share, and manage IT resources among customers to get better performance of compute and storage. …”
    Get full text
    Article
  17. 117
  18. 118

    Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks by Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang

    Published 2015-07-01
    “…The previous research of distributed sensor network security has focused on secure information in communication; however the research of secure data storage has been overlooked. As we know, cloud data storage and retrieval have become popular for efficient data management in distributed sensor networks; thus they can enjoy the on-demand high-quality cloud storage service. …”
    Get full text
    Article
  19. 119
  20. 120

    Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective by Ying Zhang, Zhen Xie, Xiuwei Qu

    Published 2022-01-01
    “…By analyzing the computational technologies and algorithms most commonly used in credit data collection and data storage, data transmission and data access, data analysis and processing, data calculation, result output and effect evaluation, this paper summarizes and proposes a unified general process of modern credit investigation, pointing out that in this general process, low data quality, privacy violation, algorithmic bias are the main challenges in the big data era, and countermeasures like data quality control, privacy protection, and algorithm governance need to be to be taken seriously into account in order to further explore the great potential of the credit investigation under the legal framework.…”
    Get full text
    Article