Showing 161 - 180 results of 411 for search 'Computer data storage', query time: 0.08s Refine Results
  1. 161

    Recursive Delta-Operator-Based Subspace Identification with Fixed Data Size by Miao Yu, Wanli Wang, Youyi Wang, Liang Liu

    Published 2023-01-01
    “…By fading the impact of past data on future data, the amount of data storage can be decreased. …”
    Get full text
    Article
  2. 162
  3. 163
  4. 164

    Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment by Vikas K. Soman, V. Natarajan

    Published 2025-01-01
    “…Abstract Cloud Computing (CC) is a fast emerging field that enables consumers to access network resources on-demand. …”
    Get full text
    Article
  5. 165

    CO2 adsorption on microporous metal–organic frameworks unravelled by high-resolution X-ray computed tomography by Diponker Karmoker, Jorge Martinez-Garcia, Damian Gwerder, Benjamin Fumey, Andreas Borgschulte, Philipp Schuetz

    Published 2025-02-01
    “…The collected imaging data is used to calculate the effective permeability along the MOF’s particle through numerical simulations. …”
    Get full text
    Article
  6. 166

    High-Performance Computational Early Warning Analysis of Agricultural Economy Relying on Binary Fuzzy Cluster Analysis Algorithm by Fang Tang

    Published 2021-01-01
    “…Its functional structure includes management business, innovation business, service business, production business, and operation business functions, in addition to the design of the collection and storage scheme based on Hadoop data warehouse, to achieve accurate matching of information of science and technology agricultural services in the whole agricultural industry chain. …”
    Get full text
    Article
  7. 167

    Penerapan Machine Learning untuk Mengendalikan Parameter Budidaya Tanaman Hidroponik Berbasis Edge dan Cloud Computing by Helmy Helmy, Arif Nursyahid, Thomas Agung Setyawan

    Published 2024-08-01
    “…In this study, the control of pH and TDS utilizes machine learning with a multiple linear regression method and edge computing and cloud computing technologies. Edge computing allows real-time data processing at the hydroponic system's sensor devices, while cloud computing provides large storage and processing capacities. …”
    Get full text
    Article
  8. 168
  9. 169
  10. 170

    Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO

    Published 2017-05-01
    “…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
    Get full text
    Article
  11. 171

    Intelligent forecasting and monitoring of air index based on big data and internet of things by Yan LIU, Yong-ping ZHANG, Cheng ZHU, Jun GAO, Qi-ming LIU

    Published 2017-11-01
    “…Air quality forecast has become an urgent need.However,numerical forecast of air quality is a complex systems engineering.The intelligent forecasting of air index was studied from the perspective of big data and intelligent decision making.For the index prediction of air quality,the popular classification algorithm was introduced to realize the intelligent analysis of historical data.To obtain air quality information in real time,a monitoring system based on Internet of Things was established,and intelligent processing of real-time data collected by the classification algorithm was achieved.Due to the large amount of historical air index data and real-time data collected,the technology of cloud computing and big data was introduced to speed up the data processing and improve the storage of data.In addition,the client based on Android was developed to allow users to query the air quality anytime,anywhere.…”
    Get full text
    Article
  12. 172

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  13. 173

    Dynamic multi-keyword searchable encryption scheme by Chenghao YUAN, Yong LI, Shuang REN

    Published 2023-04-01
    “…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
    Get full text
    Article
  14. 174
  15. 175
  16. 176

    Design of Telecom Operators' Network Data Sharing Platform Based on Hadoop+MPP Architecture by Huang Xin, Xinghui Yi, Zhenyu Chen

    Published 2014-04-01
    “…Based on using distributed computing and distributed storage technology, the telecom operators' network data sharing platform based on Hadoop +MPP architectures was studied. …”
    Get full text
    Article
  17. 177

    The Role of Cognitive Science and Big Data Technology in the Design of Business Information Management Systems by Yangfan Li

    Published 2022-01-01
    “…With the surge in the amount of data in the internal and external environment, the collection, analysis, processing, and storage of the increasing data sources and data volume, as well as the problems of big data management, are the current situation and dilemmas of data management faced by enterprises today. …”
    Get full text
    Article
  18. 178

    Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System by Ruoshui Liu, Jianghui Liu, Jingjie Zhang, Moli Zhang

    Published 2018-01-01
    “…Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. …”
    Get full text
    Article
  19. 179

    Research on Network Resource Collection and Distribution Strategies in Big Data-Driven Multimedia Teaching by Jianping Han

    Published 2023-01-01
    “…The multimedia teaching information data generated in the era of big data are increasing at a huge scale, but the computing environment used before is difficult to meet users’ requirements for data integration. …”
    Get full text
    Article
  20. 180

    A Dynamic Thermal-Allocation Solution to the Complex Economic Benefit for a Data Center by Hui Liu, Wenyu Song, Tianqi Jin, Zhiyong Wu, Fusheng Yan, Jie Song

    Published 2020-01-01
    “…Data centers, which provide computing services and gain profits, are indispensable to every city in the information era. …”
    Get full text
    Article