期刊文献+
共找到82,344篇文章
< 1 2 250 >
每页显示 20 50 100
Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage 被引量:4
1
作者 LUO Yuchuan FU Shaojing +1 位作者 XU Ming WANG Dongsheng 《China Communications》 SCIE CSCD 2014年第11期114-124,共11页
Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server a... Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server anywhere and anytime.However,this new paradigm of data outsourcing services also introduces new security challenges,among which is how to ensure the integrity of the outsourced data.Although the cloud storage providers commit a reliable and secure environment to users,the integrity of data can still be damaged owing to the carelessness of humans and failures of hardwares/softwares or the attacks from external adversaries.Therefore,it is of great importance for users to audit the integrity of their data outsourced to the cloud.In this paper,we first design an auditing framework for cloud storage and proposed an algebraic signature based remote data possession checking protocol,which allows a third-party to auditing the integrity of the outsourced data on behalf of the users and supports unlimited number of verifications.Then we extends our auditing protocol to support data dynamic operations,including data update,data insertion and data deletion.The analysis and experiment results demonstrate that our proposed schemes are secure and efficient. 展开更多
关键词 cloud computing cloud storage data integrity algebraic signatures datadynamics
下载PDF
Enhancing Reliability via Checkpointing in Cloud Computing Systems 被引量:4
2
作者 Ao Zhou Qibo Sun Jinglin Li 《China Communications》 SCIE CSCD 2017年第7期108-117,共10页
Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial.... Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method. 展开更多
关键词 cloud computing cloud service RELIABILITY fault tolerance data center network
下载PDF
基于Spring Cloud的分布式医疗数据平台建设 被引量:1
3
作者 汪睿 胡珊珊 +1 位作者 陈敏莲 徐骁 《设备管理与维修》 2024年第4期16-19,共4页
为解决互联网时代医疗大数据的可靠存储问题,探索异构数据的有效处理方案,加强医疗数据检索能力。提出一种基于Spring Cloud的分布式医疗数据平台建设方案,该方案通过Spring Cloud技术构建分布式架构,选取MongoDB非关系型数据库作为分... 为解决互联网时代医疗大数据的可靠存储问题,探索异构数据的有效处理方案,加强医疗数据检索能力。提出一种基于Spring Cloud的分布式医疗数据平台建设方案,该方案通过Spring Cloud技术构建分布式架构,选取MongoDB非关系型数据库作为分布式存储,同时对数据进行标准化、分词等操作,从而实现一个异构数据可存储、系统高可用、规模易扩展、检索高效率的医疗数据平台。 展开更多
关键词 分布式 医疗数据 Spring cloud MONGODB
下载PDF
An Efficient Method for Checking the Integrity of Data in the Cloud 被引量:2
4
作者 TAN Shuang TAN Lin +1 位作者 LI Xiaoling JIA Yan 《China Communications》 SCIE CSCD 2014年第9期68-81,共14页
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch... Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure. 展开更多
关键词 cloud computing storage security public auditability provable data integrity
下载PDF
CT-CloudDetect:用于遥感卫星云检测的混合模型
5
作者 方巍 陶恩屹 《遥感信息》 CSCD 北大核心 2024年第5期1-11,共11页
云检测是在遥感卫星云图中检测云的任务。近年来,人们提出了基于深度学习的云检测方法,并取得了良好的性能。然而,现有的基于深度学习的云检测模型大多还是基于卷积神经网络(convolutional neural network,CNN),由于卷积运算的固有局部... 云检测是在遥感卫星云图中检测云的任务。近年来,人们提出了基于深度学习的云检测方法,并取得了良好的性能。然而,现有的基于深度学习的云检测模型大多还是基于卷积神经网络(convolutional neural network,CNN),由于卷积运算的固有局部性,难以捕获长距离依赖关系。针对上述问题,文章提出一个基于CNN和ViT(Vision Transformer)的混合型云检测模型,并提出一种基于CNN和ViT的编码器,使网络具备捕捉局部和全局信息的能力。为了更好地融合语义和尺度不一致的特征,提出了一个双尺度注意力融合模块,通过注意力机制有选择地融合特征。此外,提出了轻量级路由解码器,该解码器通过路由结构降低模型复杂度。在3个公开云检测数据集上对模型进行了评估。大量实验表明,所提出的模型具有比现有模型更好的性能。 展开更多
关键词 深度学习 卷积神经网络 空间Vision Transformer 混合模型 云检测
下载PDF
Influence of initial check, information exchange, final accuracy check, reaction information nursing on the psychology of elderly with lung cancer 被引量:2
6
作者 Cui Jiang Jing Ma +1 位作者 Wen He Hai-Ying Zhang 《World Journal of Clinical Cases》 SCIE 2024年第4期737-745,共9页
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi... BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities. 展开更多
关键词 Initial check information exchange final accuracy check reaction information care model Lung cancer Mental health
下载PDF
Point Cloud Classification Using Content-Based Transformer via Clustering in Feature Space 被引量:2
7
作者 Yahui Liu Bin Tian +2 位作者 Yisheng Lv Lingxi Li Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期231-239,共9页
Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to est... Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://github.com/yahuiliu99/PointC onT. 展开更多
关键词 Content-based Transformer deep learning feature aggregator local attention point cloud classification
下载PDF
基于POC CLOUD智能管理云平台的即时检验教学探索
8
作者 曾芜薇 肖威 +2 位作者 胡亮杉 方晓琳 曹东林 《现代医院》 2024年第11期1792-1796,共5页
目的探讨使用POC CLOUD智能管理云平台培养住培学员掌握即时检验(point-of-care testing,POCT)各设备的工作原理、操作技能,使其具备一定的质量控制管理能力,保证结果的准确性。方法结合《住培学员规范化培训内容与标准(2022年版)》要... 目的探讨使用POC CLOUD智能管理云平台培养住培学员掌握即时检验(point-of-care testing,POCT)各设备的工作原理、操作技能,使其具备一定的质量控制管理能力,保证结果的准确性。方法结合《住培学员规范化培训内容与标准(2022年版)》要求及科室POCT教学开展情况,利用POC CLOUD智能管理云平台,信息化、规范化地培养住培学员。结果通过POC CLOUD智能管理云平台管理住培学员操作POCT设备的资格准入,帮助住培学员快速了解轮转科室POCT设备的使用现状,提高住培学员的学习能力及质量控制能力,帮助住培学员分析与审核检验结果。结论基于POC CLOUD智能管理云平台的即时检验教学,有助于系统化培养住培学员,提升其在POCT操作和质量控制方面的能力,确保检验结果的准确性和可靠性,提高住培学员的综合素质。 展开更多
关键词 即时检验(POCT) POC cloud智能管理云平台 规范化培养 住培基地
下载PDF
A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health 被引量:1
9
作者 Ye Lu Tao Feng +1 位作者 Chunyan Liu Wenbo Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期2787-2811,共25页
The Access control scheme is an effective method to protect user data privacy.The access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of... The Access control scheme is an effective method to protect user data privacy.The access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of failure and lack of trust in the centralized system.However,it also brings new problems to the health information in the cloud storage environment,such as attribute leakage,low consensus efficiency,complex permission updates,and so on.This paper proposes an access control scheme with fine-grained attribute revocation,keyword search,and traceability of the attribute private key distribution process.Blockchain technology tracks the authorization of attribute private keys.The credit scoring method improves the Raft protocol in consensus efficiency.Besides,the interplanetary file system(IPFS)addresses the capacity deficit of blockchain.Under the premise of hiding policy,the research proposes a fine-grained access control method based on users,user attributes,and file structure.It optimizes the data-sharing mode.At the same time,Proxy Re-Encryption(PRE)technology is used to update the access rights.The proposed scheme proved to be secure.Comparative analysis and experimental results show that the proposed scheme has higher efficiency and more functions.It can meet the needs of medical institutions. 展开更多
关键词 Blockchain access-control CP-ABE cloud health
下载PDF
Quafu-Qcover:Explore combinatorial optimization problems on cloud-based quantum computers 被引量:1
10
作者 许宏泽 庄伟峰 +29 位作者 王正安 黄凯旋 时运豪 马卫国 李天铭 陈驰通 许凯 冯玉龙 刘培 陈墨 李尚书 杨智鹏 钱辰 靳羽欣 马运恒 肖骁 钱鹏 顾炎武 柴绪丹 普亚南 张翼鹏 魏世杰 增进峰 李行 龙桂鲁 金贻荣 于海峰 范桁 刘东 胡孟军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期104-115,共12页
We introduce Quafu-Qcover,an open-source cloud-based software package developed for solving combinatorial optimization problems using quantum simulators and hardware backends.Quafu-Qcover provides a standardized and c... We introduce Quafu-Qcover,an open-source cloud-based software package developed for solving combinatorial optimization problems using quantum simulators and hardware backends.Quafu-Qcover provides a standardized and comprehensive workflow that utilizes the quantum approximate optimization algorithm(QAOA).It facilitates the automatic conversion of the original problem into a quadratic unconstrained binary optimization(QUBO)model and its corresponding Ising model,which can be subsequently transformed into a weight graph.The core of Qcover relies on a graph decomposition-based classical algorithm,which efficiently derives the optimal parameters for the shallow QAOA circuit.Quafu-Qcover incorporates a dedicated compiler capable of translating QAOA circuits into physical quantum circuits that can be executed on Quafu cloud quantum computers.Compared to a general-purpose compiler,our compiler demonstrates the ability to generate shorter circuit depths,while also exhibiting superior speed performance.Additionally,the Qcover compiler has the capability to dynamically create a library of qubits coupling substructures in real-time,utilizing the most recent calibration data from the superconducting quantum devices.This ensures that computational tasks can be assigned to connected physical qubits with the highest fidelity.The Quafu-Qcover allows us to retrieve quantum computing sampling results using a task ID at any time,enabling asynchronous processing.Moreover,it incorporates modules for results preprocessing and visualization,facilitating an intuitive display of solutions for combinatorial optimization problems.We hope that Quafu-Qcover can serve as an instructive illustration for how to explore application problems on the Quafu cloud quantum computers. 展开更多
关键词 quantum cloud platform combinatorial optimization problems quantum software
下载PDF
MCWOA Scheduler:Modified Chimp-Whale Optimization Algorithm for Task Scheduling in Cloud Computing 被引量:1
11
作者 Chirag Chandrashekar Pradeep Krishnadoss +1 位作者 Vijayakumar Kedalu Poornachary Balasundaram Ananthakrishnan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2593-2616,共24页
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as needed.It has been seen as a robust solution to relevant challenges.A significant delay ... Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as needed.It has been seen as a robust solution to relevant challenges.A significant delay can hamper the performance of IoT-enabled cloud platforms.However,efficient task scheduling can lower the cloud infrastructure’s energy consumption,thus maximizing the service provider’s revenue by decreasing user job processing times.The proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm(MCWOA),combines elements of the Chimp Optimization Algorithm(COA)and the Whale Optimization Algorithm(WOA).To enhance MCWOA’s identification precision,the Sobol sequence is used in the population initialization phase,ensuring an even distribution of the population across the solution space.Moreover,the traditional MCWOA’s local search capabilities are augmented by incorporating the whale optimization algorithm’s bubble-net hunting and random search mechanisms into MCWOA’s position-updating process.This study demonstrates the effectiveness of the proposed approach using a two-story rigid frame and a simply supported beam model.Simulated outcomes reveal that the new method outperforms the original MCWOA,especially in multi-damage detection scenarios.MCWOA excels in avoiding false positives and enhancing computational speed,making it an optimal choice for structural damage detection.The efficiency of the proposed MCWOA is assessed against metrics such as energy usage,computational expense,task duration,and delay.The simulated data indicates that the new MCWOA outpaces other methods across all metrics.The study also references the Whale Optimization Algorithm(WOA),Chimp Algorithm(CA),Ant Lion Optimizer(ALO),Genetic Algorithm(GA)and Grey Wolf Optimizer(GWO). 展开更多
关键词 cloud computing SCHEDULING chimp optimization algorithm whale optimization algorithm
下载PDF
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
12
作者 Junjie Feng Shigong Long 《International Journal of Communications, Network and System Sciences》 2017年第5期274-282,共9页
We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work... We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol which allows an unlimited number of file integrity verifications and efficiently supports dynamic operations, such as data modification, deletion, insertion and append. The proposed protocol supports public verifiability. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a specific analysis, we show the correctness and security of the protocol. After that, we demonstrate the proposed protocol has a good performance. 展开更多
关键词 Provable DATA POSSESSION (PDP) cloud Storage DATA DYNAMICS Public Verifiability DATA INTEGRITY
下载PDF
Quafu-RL:The cloud quantum computers based quantum reinforcement learning 被引量:1
13
作者 靳羽欣 许宏泽 +29 位作者 王正安 庄伟峰 黄凯旋 时运豪 马卫国 李天铭 陈驰通 许凯 冯玉龙 刘培 陈墨 李尚书 杨智鹏 钱辰 马运恒 肖骁 钱鹏 顾炎武 柴绪丹 普亚南 张翼鹏 魏世杰 曾进峰 李行 龙桂鲁 金贻荣 于海峰 范桁 刘东 胡孟军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期29-34,共6页
With the rapid advancement of quantum computing,hybrid quantum–classical machine learning has shown numerous potential applications at the current stage,with expectations of being achievable in the noisy intermediate... With the rapid advancement of quantum computing,hybrid quantum–classical machine learning has shown numerous potential applications at the current stage,with expectations of being achievable in the noisy intermediate-scale quantum(NISQ)era.Quantum reinforcement learning,as an indispensable study,has recently demonstrated its ability to solve standard benchmark environments with formally provable theoretical advantages over classical counterparts.However,despite the progress of quantum processors and the emergence of quantum computing clouds,implementing quantum reinforcement learning algorithms utilizing parameterized quantum circuits(PQCs)on NISQ devices remains infrequent.In this work,we take the first step towards executing benchmark quantum reinforcement problems on real devices equipped with at most 136 qubits on the BAQIS Quafu quantum computing cloud.The experimental results demonstrate that the policy agents can successfully accomplish objectives under modified conditions in both the training and inference phases.Moreover,we design hardware-efficient PQC architectures in the quantum model using a multi-objective evolutionary algorithm and develop a learning algorithm that is adaptable to quantum devices.We hope that the Quafu-RL can be a guiding example to show how to realize machine learning tasks by taking advantage of quantum computers on the quantum cloud platform. 展开更多
关键词 quantum cloud platform quantum reinforcement learning evolutionary quantum architecture search
下载PDF
基于Spring Cloud微服务架构的非物质文化遗产展示与学习系统的设计与实现
14
作者 杜俊 李金忠 +1 位作者 何新武 李志鸿 《广东轻工职业技术学院学报》 2024年第1期14-21,共8页
针对目前人民群众对非物质文化遗产认识不够全面,以及市面上利用系统软件来有效保护和传承非物质文化遗产的软件很缺乏等问题,结合相应软件开发技术和数字可视化技术,设计和实现了一款非物质文化遗产展示与学习系统以实现对非物质文化... 针对目前人民群众对非物质文化遗产认识不够全面,以及市面上利用系统软件来有效保护和传承非物质文化遗产的软件很缺乏等问题,结合相应软件开发技术和数字可视化技术,设计和实现了一款非物质文化遗产展示与学习系统以实现对非物质文化遗产项目的传承和保护创新。本系统以江西省范围内的主要非物质文化遗产项目为例,设置有移动App端和PC端,采用前后端分离的开发模式,以当前主流的Spring Cloud微服务架构技术为基础,结合SpringBoot框架,在华为云服务器上搭建起弹性可伸缩的后端服务。使用Uni-App开发移动端,以解决无法在Android、IOS及各大小程序平台运行的问题。经测试,本系统具有操作简单,易于使用、维护和扩展,高并发性等优点。 展开更多
关键词 非物质文化遗产 Spring cloud微服务架构 Uni-App框架 Vue框架 ECharts可视化图表
下载PDF
Automatic Extraction Method of 3D Feature Guidelines for Complex Cultural Relic Surfaces Based on Point Cloud 被引量:1
15
作者 GENG Yuxin ZHONG Ruofei +1 位作者 HUANG Yuqin SUN Haili 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第1期16-41,共26页
Cultural relics line graphic serves as a crucial form of traditional artifact information documentation,which is a simple and intuitive product with low cost of displaying compared with 3D models.Dimensionality reduct... Cultural relics line graphic serves as a crucial form of traditional artifact information documentation,which is a simple and intuitive product with low cost of displaying compared with 3D models.Dimensionality reduction is undoubtedly necessary for line drawings.However,most existing methods for artifact drawing rely on the principles of orthographic projection that always cannot avoid angle occlusion and data overlapping while the surface of cultural relics is complex.Therefore,conformal mapping was introduced as a dimensionality reduction way to compensate for the limitation of orthographic projection.Based on the given criteria for assessing surface complexity,this paper proposed a three-dimensional feature guideline extraction method for complex cultural relic surfaces.A 2D and 3D combined factor that measured the importance of points on describing surface features,vertex weight,was designed.Then the selection threshold for feature guideline extraction was determined based on the differences between vertex weight and shape index distributions.The feasibility and stability were verified through experiments conducted on real cultural relic surface data.Results demonstrated the ability of the method to address the challenges associated with the automatic generation of line drawings for complex surfaces.The extraction method and the obtained results will be useful for line graphic drawing,displaying and propaganda of cultural relics. 展开更多
关键词 point cloud conformal parameterization vertex weight surface mesh cultural relics feature extraction
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
16
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing cloud Networks Artificial Intelligence Machine Learning cloud Security
下载PDF
Unveiling Cloud Vertical Structures over the Interior Tibetan Plateau through Anomaly Detection in Synergetic Lidar and Radar Observations
17
作者 Wei ZHAO Yinan WANG +9 位作者 Yongheng BI Xue WU Yufang TIAN Lingxiao WU Jingxuan LUO Xiaoru HU Zhengchao QI Jian LI Yubing PAN Daren LYU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第12期2381-2398,共18页
Cloud vertical structure(CVS)strongly affects atmospheric circulation and radiative transfer.Yet,long-term,groundbased observations are scarce over the Tibetan Plateau(TP)despite its vital role in global climate.This ... Cloud vertical structure(CVS)strongly affects atmospheric circulation and radiative transfer.Yet,long-term,groundbased observations are scarce over the Tibetan Plateau(TP)despite its vital role in global climate.This study utilizes ground-based lidar and Ka-band cloud profiling radar(KaCR)measurements at Yangbajain(YBJ),TP,from October 2021 to September 2022 to characterize cloud properties.A satisfactorily performing novel anomaly detection algorithm(LevelShiftAD)is proposed for lidar and KaCR profiles to identify cloud boundaries.Cloud base heights(CBH)retrieved from KaCR and lidar observations show good consistency,with a correlation coefficient of 0.78 and a mean difference of-0.06 km.Cloud top heights(CTH)derived from KaCR match the FengYun-4A and Himawari-8 products well.Thus,KaCR measurements serve as the primary dataset for investigating CVSs over the TP.Different diurnal cycles occur in summer and winter.The diurnal cycle is characterized by a pronounced increase in cloud occurrence frequency in the afternoon with an early-morning decrease in winter,while cloud amounts remain high all day,with scattered nocturnal increases in summer.Summer features more frequent clouds with larger geometrical thicknesses,a higher multi-layer ratio,and greater inter-cloud spacing.Around 26%of the cloud bases occur below 0.5 km.Winter exhibits a bimodal distribution of cloud base heights with peaks at 0-0.5 km and 2-2.5 km.Single-layer and geometrically thin clouds prevail at YBJ.This study enriches long-term measurements of CVSs over the TP,and the robust anomaly detection method helps quantify cloud macro-physical properties via synergistic lidar and radar observations. 展开更多
关键词 Ka-band cloud profiling radar LIDAR anomaly detection cloud base heights cloud top heights Tibetan Plateau
下载PDF
Large Eddy Simulation of Vertical Structure and Size Density of Deep Layer Clouds
18
作者 Bangjun CAO Xianyu YANG +2 位作者 Jun WEN Qin HU Ziyuan ZHU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第8期1629-1642,1668-1670,共17页
In a convective scheme featuring a discretized cloud size density, the assumed lateral mixing rate is inversely proportional to the exponential coefficient of plume size. This follows a typical assumption of-1, but it... In a convective scheme featuring a discretized cloud size density, the assumed lateral mixing rate is inversely proportional to the exponential coefficient of plume size. This follows a typical assumption of-1, but it has unveiled inherent uncertainties, especially for deep layer clouds. Addressing this knowledge gap, we conducted comprehensive large eddy simulations and comparative analyses focused on terrestrial regions. Our investigation revealed that cloud formation adheres to the tenets of Bernoulli trials, illustrating power-law scaling that remains consistent regardless of the inherent deep layer cloud attributes existing between cloud size and the number of clouds. This scaling paradigm encompasses liquid, ice, and mixed phases in deep layer clouds. The exponent characterizing the interplay between cloud scale and number in the deep layer cloud, specifically for liquid, ice, or mixed-phase clouds, resembles that of shallow convection,but converges closely to zero. This convergence signifies a propensity for diminished cloud numbers and sizes within deep layer clouds. Notably, the infusion of abundant moisture and the release of latent heat by condensation within the lower atmospheric strata make substantial contributions. However, this role in ice phase formation is limited. The emergence of liquid and ice phases in deep layer clouds is facilitated by the latent heat and influenced by the wind shear inherent in the middle levels. These interrelationships hold potential applications in formulating parameterizations and post-processing model outcomes. 展开更多
关键词 deep layer cloud cloud spatial structure cloud size density large eddy simulation
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
19
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
20
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 cloud Computing Information Security cloud Infrastructure Offerings cloud Migration Security Measures Data Breaches cloud Service Providers CYBERSECURITY cloud Security Case Studies cloud Threat Landscape Data Encryption COMPLIANCE cloud Security Tools
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部