Showing 121 - 140 results of 411 for search 'Computer data storage', query time: 0.08s Refine Results
  1. 121

    QCA: Quantum Computational Approach for Internet of Things with 5G Connectivity by Shitharth Selvarajan, Hariprasath Manoharan, Adil O. Khadidos, Alaa O. Khadidos

    Published 2024-12-01
    “…Most of the IoT devices are connected for data transmission to end users with remote monitoring units, but there are no sufficient data storage units, and more data cannot be processed at minimized time periods. …”
    Get full text
    Article
  2. 122

    Empowering drones in vehicular network through fog computing and blockchain technology. by Shivani Wadhwa, Divya Gupta, Shalli Rani, Maha Driss, Wadii Boulila

    Published 2025-01-01
    “…This research paper addresses this gap by proposing a safe, reliable, and real-time drone network service architecture, emphasizing collaboration with fog computing. The contribution includes a systematic architecture design and integration of blockchain technology for secure data storage. …”
    Get full text
    Article
  3. 123

    Interface-engineered non-volatile visible-blind photodetector for in-sensor computing by Ge Li, Donggang Xie, Qinghua Zhang, Mingzhen Zhang, Zhuohui Liu, Zheng Wang, Jiahui Xie, Erjia Guo, Meng He, Can Wang, Lin Gu, Guozhen Yang, Kuijuan Jin, Chen Ge

    Published 2025-01-01
    “…Abstract Ultraviolet (UV) detection is extensively used in a variety of applications. However, the storage and processing of information after detection require multiple components, resulting in increased energy consumption and data transmission latency. …”
    Get full text
    Article
  4. 124

    A Survey of Game-Theoretic Approach for Resource Management in Cloud Computing by M. O. Agbaje, O. B. Ohwo, T. G. Ayanwola, Ogunyolu Olufunmilola

    Published 2022-01-01
    “…Cloud computing is a groundbreaking technique that provides a whole lot of facilities such as storage, memory, and CPU as well as facilities such as servers and web service. …”
    Get full text
    Article
  5. 125

    Characterizing Perception Deep Learning Algorithms and Applications for Vehicular Edge Computing by Wang Feng, Sihai Tang, Shengze Wang, Ying He, Donger Chen, Qing Yang, Song Fu

    Published 2025-01-01
    “…Vehicular edge computing relies on the computational capabilities of interconnected edge devices to manage incoming requests from vehicles. …”
    Get full text
    Article
  6. 126
  7. 127

    An Efficient Data Analysis Framework for Online Security Processing by Jun Li, Yanzhao Liu

    Published 2021-01-01
    “…Most existing studies on traditional cloud data security analysis were focused on inspecting techniques for block storage data in the cloud. …”
    Get full text
    Article
  8. 128

    Prediction of the Bending Strength of Boltless Steel Connections in Storage Pallet Racks: An Integrated Experimental-FEM-SVM Methodology by Zhi-Jun Lyu, PeiCai Zhao, Qi Lu, Qian Xiang, HongLiang Li

    Published 2020-01-01
    “…Despite the fact that the finite element method (FEM) and physical experiment have been used to obtain the mechanical performance of beam-to-column connections (BCCs), those methods have the disadvantages of high computational complexity and test cost. Taking, for example, the boltless steel connections, this paper proposes a data-driven simulation model (DDSM) that combines the experimental test, FEM, and support vector machine (SVM) techniques to determine the bending strength of BCCs by means of data mining from the engineering database. …”
    Get full text
    Article
  9. 129

    Numerical Simulation of Flood Evolution in Pangtoupao Flood Storage Area Based on Two-Dimensional Shallow Water Equation by SUN Zhenyu, ZHOU Yunhao, ZHANG Qinxu, QIN Mengen, ZHANG Mingliang

    Published 2024-06-01
    “…The model was calibrated using multiple dam-break flow experiments and validated with an excellent capability in calculating dry and wet boundaries and static water balance. Flood data from 1998 in the Nenjiang River Basin was used to simulate and calculate flood evolution in the Pangtoupo flood storage area of the Nenjiang River Basin. …”
    Get full text
    Article
  10. 130

    Computational measurement and task scheduling: a study on IoT edge device strategies by ZHU Shuqiong, XU Qingqing, LI Xiaotao, CHEN Wei

    Published 2024-04-01
    “…The rapid advancement of mobile communications and artificial intelligence has catalyzed an exponential increase in intelligent devices and data generation. This surge necessitates enhance the computational resource capabilities, particularly in the Internet of things (IoT) environments, where there are pressing demand for improved resource management in terms of computation, latency, and energy efficiency. …”
    Get full text
    Article
  11. 131
  12. 132
  13. 133

    Detailed Nonlinear Modeling and High-Fidelity Parallel Simulation of MMC With Embedded Energy Storage for Wind Farm Grid Integration by Bingrong Shang, Ning Lin, Venkata Dinavahi

    Published 2024-01-01
    “…In this paper, a high-voltage dc (HVDC) link model based on the modular multilevel converter with embedded energy storage (MMC-EES) is presented and, utilizing the massively parallel computing feature of the graphics processing unit (GPU), its efficacy in compensating a varying wind energy generation is studied. …”
    Get full text
    Article
  14. 134

    Query-Biased Preview over Outsourced and Encrypted Data by Ningduo Peng, Guangchun Luo, Ke Qin, Aiguo Chen

    Published 2013-01-01
    “…For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. …”
    Get full text
    Article
  15. 135

    5G mobile/multi-access edge computing integrated architecture and deployment strategy by Jianmin ZHANG, Weiliang XIE, Fengyi YANG, Zhouyun WU

    Published 2018-04-01
    “…Mobile/multi-access edge computing (MEC) technology migrates computing storage capabilities and service service capabilities to the edge of the network,enabling applications,services and content to be localized,close-range and distributed.Therefore,to a certain extent,the business requirements of 5G enhanced mobile broadband,low latency and high reliability and large-scale machine communication terminal connection are solved.At the same time,the MEC fully exploits mobile network data and information to implement the awareness and analysis of context information of the mobile network and open it to third-party service applications.This effectively enhances the level of intelligence in mobile networks and promotes the deep integration of networks and services.Therefore,the value and significance of the MEC was firstly analyzed according to the typical 5G service scenario.Secondly,based on the research progress of ETSI and 3GPP,a MEC fusion architecture oriented to 5G was proposed,and the overall deployment strategy of MEC was discussed and analyzed.Furthermore,the possible problems and challenges in the future application of MEC technology in 5G networks were discussed to provide reference for subsequent research and development.…”
    Get full text
    Article
  16. 136

    IoTDQ: An Industrial IoT Data Analysis Library for Apache IoTDB by Pengyu Chen, Wendi He, Wenxuan Ma, Xiangdong Huang, Chen Wang

    Published 2024-03-01
    “…This library integrates stream computation functions on data quality analysis, data profiling, anomaly detection, data repairing, etc. …”
    Get full text
    Article
  17. 137

    Data encryption technology based on cloud and terminal collaboration by Guorong LIU, Dongxin LIU, Laifu WANG, Jun SHEN, Huamin JIN

    Published 2018-02-01
    “…With the fast increasing computing and storage capability,the intelligent terminal has gradually became the most important personal information assistant,and the data security of the terminal has turned to be essential for customers.Data encryption is a basic component of security assurance,but currently the mainstream technology scheme has a series of drawbacks,such as high technical cost.Therefore,a data encryption scheme based on cloud and terminal collaboration was proposed to promote the security of keys and data files.…”
    Get full text
    Article
  18. 138

    Applications of a big data platform based on PaaS by Haiyong XU, Yan HUANG

    Published 2018-01-01
    “…As a platform of data storage,processing,and service,big data platform needs to support internal and external various big data applications.A solution applied PaaS technology to the big data platform was proposed.Details of the key technical solutions such as the architecture of PaaS cloud computing platform,hierarchical scheduling scheme,multi-tenant management and global scheduling of Hadoop tasks were described.It was proved that the platform could remarkably improve big data application development efficiency and help application deployment fast.In the meantime,good elastic scaling capability can effectively improve big data application system resource utilization.…”
    Get full text
    Article
  19. 139

    Efficient data possession–checking protocol with deduplication in cloud by Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao

    Published 2017-08-01
    “…Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. …”
    Get full text
    Article
  20. 140

    Shape and Measurement Monitoring of Inrush Current Characteristics of a Battery-Capacitive Energy Storage Device with Two-Channel Digital Oscilloscope by V. P. Vasilevich, M. V. Zbyshinskaya

    Published 2021-12-01
    “…Obtained data was transferred to a personal computer and analyzed.The measurement results showed that 82.3 % of the energy losses compensation of the motor start is taken over by the capacitive part of the energy storage device, what makes longer LIB’s life. …”
    Get full text
    Article