期刊文献+
共找到56,863篇文章
< 1 2 250 >
每页显示 20 50 100
从习语看“云”和“cloud”的隐喻比较 被引量:1
1
作者 张荣 《山西农业大学学报(社会科学版)》 2011年第4期402-405,共4页
习语是语言的精华,有着深厚的社会历史渊源和丰富的文化内涵。通过分析"云"隐喻在习语中的种种隐喻和比较汉英两种语言中有关"云"隐喻的历史渊源和文化内涵,以发现"云"隐喻在这两种文化中的共性和差异。... 习语是语言的精华,有着深厚的社会历史渊源和丰富的文化内涵。通过分析"云"隐喻在习语中的种种隐喻和比较汉英两种语言中有关"云"隐喻的历史渊源和文化内涵,以发现"云"隐喻在这两种文化中的共性和差异。并在此基础上,对隐喻的翻译做了初步探讨。 展开更多
关键词 隐喻 汉语 英语
下载PDF
CT-CloudDetect:用于遥感卫星云检测的混合模型
2
作者 方巍 陶恩屹 《遥感信息》 CSCD 北大核心 2024年第5期1-11,共11页
云检测是在遥感卫星云图中检测云的任务。近年来,人们提出了基于深度学习的云检测方法,并取得了良好的性能。然而,现有的基于深度学习的云检测模型大多还是基于卷积神经网络(convolutional neural network,CNN),由于卷积运算的固有局部... 云检测是在遥感卫星云图中检测云的任务。近年来,人们提出了基于深度学习的云检测方法,并取得了良好的性能。然而,现有的基于深度学习的云检测模型大多还是基于卷积神经网络(convolutional neural network,CNN),由于卷积运算的固有局部性,难以捕获长距离依赖关系。针对上述问题,文章提出一个基于CNN和ViT(Vision Transformer)的混合型云检测模型,并提出一种基于CNN和ViT的编码器,使网络具备捕捉局部和全局信息的能力。为了更好地融合语义和尺度不一致的特征,提出了一个双尺度注意力融合模块,通过注意力机制有选择地融合特征。此外,提出了轻量级路由解码器,该解码器通过路由结构降低模型复杂度。在3个公开云检测数据集上对模型进行了评估。大量实验表明,所提出的模型具有比现有模型更好的性能。 展开更多
关键词 深度学习 卷积神经网络 空间Vision Transformer 混合模型 云检测
下载PDF
Cloudless-Training:基于serverless的高效跨地域分布式ML训练框架
3
作者 谭文婷 吕存驰 +1 位作者 史骁 赵晓芳 《高技术通讯》 CAS 北大核心 2024年第3期219-232,共14页
跨地域分布式机器学习(ML)训练能够联合多区域的云资源协作训练,可满足许多新兴ML场景(比如大型模型训练、联邦学习)的训练需求。但其训练效率仍受2方面挑战的制约。首先,多区域云资源缺乏有效的弹性调度,这会影响训练的资源利用率和性... 跨地域分布式机器学习(ML)训练能够联合多区域的云资源协作训练,可满足许多新兴ML场景(比如大型模型训练、联邦学习)的训练需求。但其训练效率仍受2方面挑战的制约。首先,多区域云资源缺乏有效的弹性调度,这会影响训练的资源利用率和性能;其次,模型跨地域同步需要在广域网(WAN)上高频通信,受WAN的低带宽和高波动的影响,会产生巨大通信开销。本文提出Cloudless-Training,从3个方面实现高效的跨地域分布式ML训练。首先,它基于serverless计算模式实现,使用控制层和训练执行层的2层架构,支持多云区域的弹性调度和通信。其次,它提供一种弹性调度策略,根据可用云资源的异构性和训练数据集的分布自适应地部署训练工作流。最后,它提供了2种高效的跨云同步策略,包括基于梯度累积的异步随机梯度下降(ASGD-GA)和跨云参数服务器(PS)间的模型平均(MA)。Cloudless-Training是基于OpenFaaS实现的,并被部署在腾讯云上评估,实验结果表明Cloudless-Training可显著地提高跨地域分布式ML训练的资源利用率(训练成本降低了9.2%~24.0%)和同步效率(训练速度最多比基线快1.7倍),并能保证模型的收敛精度。 展开更多
关键词 跨地域分布式机器学习(ML)训练 跨云ML训练 分布式训练框架 serverless 跨云模型同步
下载PDF
基于RuoYi-Cloud的劳动教育平台建设
4
作者 张家铭 周杰 周北平 《电子技术应用》 2024年第3期92-99,共8页
为帮助学生学习劳动文化、进行劳动实践,辅助教师精准地安排和开展劳动教学活动,设计且实现了一款基于RuoYi-Cloud框架的劳动教育系统,具有劳动教育管理、选课管理、在线学习、学业预警、系统监控、数据分析等功能,使用RuoYi-Cloud框架... 为帮助学生学习劳动文化、进行劳动实践,辅助教师精准地安排和开展劳动教学活动,设计且实现了一款基于RuoYi-Cloud框架的劳动教育系统,具有劳动教育管理、选课管理、在线学习、学业预警、系统监控、数据分析等功能,使用RuoYi-Cloud框架开发降低了开发和维护成本,提高了开发效率。采用微服务架构,实现对用户友好的界面和高度可扩展的后端功能,优化了系统的响应时间和资源利用率确保系统高效运行,系统的灵活性和扩展性为未来的功能扩展提供良好的基础。系统为劳动教育实施提供可靠解决方案,通过对系统的实际应用和用户反馈,系统对劳动教育领域有一定参考价值。 展开更多
关键词 劳动教育 RuoYi-cloud 微服务 低代码
下载PDF
基于POC CLOUD智能管理云平台的即时检验教学探索
5
作者 曾芜薇 肖威 +2 位作者 胡亮杉 方晓琳 曹东林 《现代医院》 2024年第11期1792-1796,共5页
目的探讨使用POC CLOUD智能管理云平台培养住培学员掌握即时检验(point-of-care testing,POCT)各设备的工作原理、操作技能,使其具备一定的质量控制管理能力,保证结果的准确性。方法结合《住培学员规范化培训内容与标准(2022年版)》要... 目的探讨使用POC CLOUD智能管理云平台培养住培学员掌握即时检验(point-of-care testing,POCT)各设备的工作原理、操作技能,使其具备一定的质量控制管理能力,保证结果的准确性。方法结合《住培学员规范化培训内容与标准(2022年版)》要求及科室POCT教学开展情况,利用POC CLOUD智能管理云平台,信息化、规范化地培养住培学员。结果通过POC CLOUD智能管理云平台管理住培学员操作POCT设备的资格准入,帮助住培学员快速了解轮转科室POCT设备的使用现状,提高住培学员的学习能力及质量控制能力,帮助住培学员分析与审核检验结果。结论基于POC CLOUD智能管理云平台的即时检验教学,有助于系统化培养住培学员,提升其在POCT操作和质量控制方面的能力,确保检验结果的准确性和可靠性,提高住培学员的综合素质。 展开更多
关键词 即时检验(POCT) POC cloud智能管理云平台 规范化培养 住培基地
下载PDF
基于SpringCloud框架微服务架构的融合媒体云平台设计 被引量:3
6
作者 谢颐 胡黎 《软件》 2024年第1期134-136,173,共4页
设计基于SpringCloud框架微服务架构的融合媒体云平台,提高媒体业务流程效率。对SpringCloud的基本情况与相关组件进行概述,提出融合媒体云平台设计思路与原则,以此为基础构建有三层服务层的融合媒体云平台,设计融合媒体云平台的安全,... 设计基于SpringCloud框架微服务架构的融合媒体云平台,提高媒体业务流程效率。对SpringCloud的基本情况与相关组件进行概述,提出融合媒体云平台设计思路与原则,以此为基础构建有三层服务层的融合媒体云平台,设计融合媒体云平台的安全,基于“一次采集、多种生成、多元传播”的融合媒体云平台设计思路,最终构成融合媒体云平台的业务流程。 展开更多
关键词 Springcloud框架 微服务架构 融合媒体 云平台
下载PDF
基于PointCloudTransformer和优化集成学习的三维点云分类
7
作者 于喜俊 段勇 《电子测量与仪器学报》 CSCD 北大核心 2024年第6期143-153,共11页
针对三维点云的不规则性和无序性所导致的难于提取特征并进行分类的问题,提出了一种融合深度学习和集成学习的三维点云分类方法。首先,训练深度学习点云分类网络PointCloudTransformer,并使用主干网络提取点云特征,进而训练基分类器,获... 针对三维点云的不规则性和无序性所导致的难于提取特征并进行分类的问题,提出了一种融合深度学习和集成学习的三维点云分类方法。首先,训练深度学习点云分类网络PointCloudTransformer,并使用主干网络提取点云特征,进而训练基分类器,获得基分类器集合;然后,针对集成学习算法设计基分类器选择模型,模型的优化目标为基分类器组合的差异性和平均总体精度。为了降低集成规模,本文基于增强后的白鲸优化算法提出了二元多目标白鲸优化算法,并使用该算法优化基分类器选择模型,获得集成剪枝方案集合;最后,采用多数投票法集成每个基分类器组合在测试集点云特征上的分类结果,获得最优基分类器组合,从而构建基于多目标优化剪枝的集成学习点云分类模型。在点云分类数据集上的实验结果表明,本文方法使用了更小的集成规模,获得了更高的集成精度,能够对多类别三维点云进行准确分类。 展开更多
关键词 三维点云分类 深度学习 集成学习 白鲸优化算法 多目标优化
下载PDF
基于CloudSim的电力系统计算云原生模型与仿真方法
8
作者 陈元榉 刘媛媛 +3 位作者 张延旭 蔡煜 胡春潮 蔡泽祥 《电力自动化设备》 EI CSCD 北大核心 2024年第9期189-196,204,共9页
分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,... 分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,分析电力云任务调配时的资源供需平衡问题。建立基于微服务的电力云任务模型,分析微服务的处理时序逻辑及其层级关系并生成微服务队列。据此提出微服务的动态调配模型,采用微服务-容器映射策略与实体动态整合策略,实现微服务在实体间的动态映射。利用CloudSim进行仿真分析,结果证明所提方法可行且有效,可为电力云计算的资源配置、任务调度等提供基本的仿真工具与方法。 展开更多
关键词 电力系统 cloudSim 云原生建模 电力系统计算架构 动态调配 时序逻辑 微服务队列
下载PDF
基于Spring Cloud微服务架构的非物质文化遗产展示与学习系统的设计与实现
9
作者 杜俊 李金忠 +1 位作者 何新武 李志鸿 《广东轻工职业技术学院学报》 2024年第1期14-21,共8页
针对目前人民群众对非物质文化遗产认识不够全面,以及市面上利用系统软件来有效保护和传承非物质文化遗产的软件很缺乏等问题,结合相应软件开发技术和数字可视化技术,设计和实现了一款非物质文化遗产展示与学习系统以实现对非物质文化... 针对目前人民群众对非物质文化遗产认识不够全面,以及市面上利用系统软件来有效保护和传承非物质文化遗产的软件很缺乏等问题,结合相应软件开发技术和数字可视化技术,设计和实现了一款非物质文化遗产展示与学习系统以实现对非物质文化遗产项目的传承和保护创新。本系统以江西省范围内的主要非物质文化遗产项目为例,设置有移动App端和PC端,采用前后端分离的开发模式,以当前主流的Spring Cloud微服务架构技术为基础,结合SpringBoot框架,在华为云服务器上搭建起弹性可伸缩的后端服务。使用Uni-App开发移动端,以解决无法在Android、IOS及各大小程序平台运行的问题。经测试,本系统具有操作简单,易于使用、维护和扩展,高并发性等优点。 展开更多
关键词 非物质文化遗产 Spring cloud微服务架构 Uni-App框架 Vue框架 ECharts可视化图表
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
10
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing cloud Networks Artificial Intelligence Machine Learning cloud Security
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
11
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 cloud Computing Information Security cloud Infrastructure Offerings cloud Migration Security Measures Data Breaches cloud Service Providers CYBERSECURITY cloud Security Case Studies cloud Threat Landscape Data Encryption COMPLIANCE cloud Security Tools
下载PDF
Cloud Computing: Purpose and Future
12
作者 Robb Shawe 《Journal of Software Engineering and Applications》 2024年第10期763-769,共7页
Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing o... Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency. 展开更多
关键词 cloud Computing Hybrid cloud Private cloud Public cloud IAAS PAAS SAAS On-Premises PLATFORM Data Security Systems
下载PDF
基于CloudSat-CALIPSO数据的黄土高原地区云特征分析
13
作者 尤丹丹 张淑花 +1 位作者 金存银 王倩茹 《高原气象》 CSCD 北大核心 2024年第3期583-594,共12页
云是地气系统的重要组成部分,为深入分析黄土高原地区云特征,利用2007-2016年搭载首部云探测雷达云卫星(CloudSat)与云-气溶胶激光雷达和红外探测者观测卫星(The Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observation, C... 云是地气系统的重要组成部分,为深入分析黄土高原地区云特征,利用2007-2016年搭载首部云探测雷达云卫星(CloudSat)与云-气溶胶激光雷达和红外探测者观测卫星(The Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observation, CALIPSO)资料,选取黄土高原半湿润、半干旱、干旱和寒旱四个区域,对云的宏、微观物理特征进行了分析。结果表明:(1)黄土高原各区域云出现频率年均值达到了55%以上,其中,春、夏季云出现频率最高,秋冬两季相对较低;半湿润区云出现频率高于其他区域,但其他三个区域云出现频率最高的月份均早于半湿润区。(2)各区域中单层云出现频率最高,占到总云量的60%以上,多层云中主要是双层云,约占总云量的25%。云层高度在不同区域表现为春、夏季节大于秋、冬季节,半湿润区的云层高度在四季均大于其他区域。各区域云几何厚度季节变化不显著,均在1~4 km之间,主要以薄云为主,且78.13%的云几何厚度不超过2 km。(3)各区域的云液态水含量年均值均达到了220.5 mg·m^(-3),约为冰水含量年均值的6.5倍,主要分布在8.5 km以下的高度层。随着高度的减小,液态水含量逐渐增多,其中半湿润区云液态水含量大于其他区域。各区域全年冰水含量占比较小,主要分布在16.5 km以下的高度层。(4)液滴有效半径在各区域的值主要集中在12~16μm,在半干旱区的春季出现了最大值,约为24μm;冰粒子有效半径最大值出现在半湿润区的夏季。液滴数浓度在各区域的值集中在60~80 cm^(-3),均小于冰粒子数浓度平均值,其峰值出现在各区域的夏季,冰粒子数浓度的峰值出现在半湿润和半干旱区的春季。该研究结果有助于深入认识黄土高原云的特征,为区域气候模式对黄土高原地区云特征的模拟提供一定的参考依据。 展开更多
关键词 黄土高原 cloudSat-CALIPSO 云垂直结构 宏微观物理特征
下载PDF
Enhancing Cybersecurity through Cloud Computing Solutions in the United States
14
作者 Omolola F. Hassan Folorunsho O. Fatai +4 位作者 Oluwadare Aderibigbe Abdullah Oladoyin Akinde Tolulope Onasanya Mariam Adetoun Sanusi Oduwunmi Odukoya 《Intelligent Information Management》 2024年第4期176-193,共18页
This study investigates how cybersecurity can be enhanced through cloud computing solutions in the United States. The motive for this study is due to the rampant loss of data, breaches, and unauthorized access of inte... This study investigates how cybersecurity can be enhanced through cloud computing solutions in the United States. The motive for this study is due to the rampant loss of data, breaches, and unauthorized access of internet criminals in the United States. The study adopted a survey research design, collecting data from 890 cloud professionals with relevant knowledge of cybersecurity and cloud computing. A machine learning approach was adopted, specifically a random forest classifier, an ensemble, and a decision tree model. Out of the features in the data, ten important features were selected using random forest feature importance, which helps to achieve the objective of the study. The study’s purpose is to enable organizations to develop suitable techniques to prevent cybercrime using random forest predictions as they relate to cloud services in the United States. The effectiveness of the models used is evaluated by utilizing validation matrices that include recall values, accuracy, and precision, in addition to F1 scores and confusion matrices. Based on evaluation scores (accuracy, precision, recall, and F1 scores) of 81.9%, 82.6%, and 82.1%, the results demonstrated the effectiveness of the random forest model. It showed the importance of machine learning algorithms in preventing cybercrime and boosting security in the cloud environment. It recommends that other machine learning models be adopted to see how to improve cybersecurity through cloud computing. 展开更多
关键词 CYBERSECURITY cloud Computing cloud Solutions Machine Learning Algorithm
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
15
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 cloud DATA Information Model Data Storage cloud Computing Security System Data Encryption
下载PDF
基于Spring Cloud的电商平台系统设计与实现
16
作者 赵春辉 《广西民族大学学报(自然科学版)》 CAS 2024年第3期97-103,共7页
互联网技术发展较快,电商平台已成为现代商业的重要组成部分,Spring Cloud微服务架构为电商平台提供技术支持。文章分析了电商平台业务需求,确定系统的功能模块,基于Spring Cloud构建微服务架构,实现了服务的拆分与独立部署。通过性能... 互联网技术发展较快,电商平台已成为现代商业的重要组成部分,Spring Cloud微服务架构为电商平台提供技术支持。文章分析了电商平台业务需求,确定系统的功能模块,基于Spring Cloud构建微服务架构,实现了服务的拆分与独立部署。通过性能测试发现系统存在的问题,提出相应解决措施,为电商平台的设计提供参考依据。 展开更多
关键词 Spring cloud 电商 平台系统 设计
下载PDF
The Cloud Model for Climate Change
17
作者 Michael Nelson David B. Nelson 《International Journal of Geosciences》 CAS 2024年第5期366-395,共30页
In 1995, the Intergovernmental Panel on Climate Change (IPCC) released a thermodynamic model based on the Greenhouse Effect, aiming to forecast global temperatures. This study delves into the intricacies of that model... In 1995, the Intergovernmental Panel on Climate Change (IPCC) released a thermodynamic model based on the Greenhouse Effect, aiming to forecast global temperatures. This study delves into the intricacies of that model. Some interesting observations are revealed. The IPCC model equated average temperatures with average energy fluxes, which can cause significant errors. The model assumed that all energy fluxes remained constant, and the Earth emitted infrared radiation as if it were a blackbody. Neither of those conditions exists. The IPCC’s definition of Climate Change only includes events caused by human actions, excluding most causes. Satellite data aimed at the tops of clouds may have inferred a high Greenhouse Gas absorption flux. The model showed more energy coming from the atmosphere than absorbed from the sun, which may have caused a violation of the First and Second Laws of Thermodynamics. There were unexpectedly large gaps in the satellite data that aligned with various absorption bands of Greenhouse Gases, possibly caused by photon scattering associated with re-emissions. Based on science, we developed a cloud-based climate model that complied with the Radiation Laws and the First and Second Laws of Thermodynamics. The Cloud Model showed that 81.3% of the outgoing reflected and infrared radiation was applicable to the clouds and water vapor. In comparison, the involvement of CO<sub>2</sub> was only 0.04%, making it too minuscule to measure reliably. 展开更多
关键词 Climate Change Greenhouse Gas CO2 cloudS MODEL THERMODYNAMICS
下载PDF
Cloud SPN算网融合方案研究
18
作者 李勤 韩柳燕 《电信工程技术与标准化》 2024年第8期15-21,共7页
本文提出了Cloud SPN算网融合方案。该方案通过在园区SPN设备中集成算力模块,实现了边缘算力的部署,并运用了SPN切片、内置算力、云边协同、算网协同和机器视觉等关键技术,有效融合了网络能力与算力能力。Cloud SPN算网融合方案不仅提... 本文提出了Cloud SPN算网融合方案。该方案通过在园区SPN设备中集成算力模块,实现了边缘算力的部署,并运用了SPN切片、内置算力、云边协同、算网协同和机器视觉等关键技术,有效融合了网络能力与算力能力。Cloud SPN算网融合方案不仅提升了工业质检等业务的准确率,还推动了企业从依赖人工经验向智能业务的发展,是信息技术与工业生产应用深度融合的典范,为各行业带来了前所未有的机遇。 展开更多
关键词 cloud SPN 算网融合 算力模块 切片 协同 机器视觉
下载PDF
Secure and Efficient Outsourced Computation in Cloud Computing Environments
19
作者 Varun Dixit Davinderjit Kaur 《Journal of Software Engineering and Applications》 2024年第9期750-762,共13页
Secure and efficient outsourced computation in cloud computing environments is crucial for ensuring data confidentiality, integrity, and resource optimization. In this research, we propose novel algorithms and methodo... Secure and efficient outsourced computation in cloud computing environments is crucial for ensuring data confidentiality, integrity, and resource optimization. In this research, we propose novel algorithms and methodologies to address these challenges. Through a series of experiments, we evaluate the performance, security, and efficiency of the proposed algorithms in real-world cloud environments. Our results demonstrate the effectiveness of homomorphic encryption-based secure computation, secure multiparty computation, and trusted execution environment-based approaches in mitigating security threats while ensuring efficient resource utilization. Specifically, our homomorphic encryption-based algorithm exhibits encryption times ranging from 20 to 1000 milliseconds and decryption times ranging from 25 to 1250 milliseconds for payload sizes varying from 100 KB to 5000 KB. Furthermore, our comparative analysis against state-of-the-art solutions reveals the strengths of our proposed algorithms in terms of security guarantees, encryption overhead, and communication latency. 展开更多
关键词 Secure Computation cloud Computing Homomorphic Encryption Secure Multiparty Computation Resource Optimization
下载PDF
A Model of Cloud-Based Enterprise Resource Planning (ERP) for Small and Medium Enterprise
20
作者 Mohammad Jahangir Alam Shoman Das Sharma Tanjia Chowdhury 《Journal of Computer and Communications》 2024年第10期37-50,共14页
Cloud Computing is an uprising technology in the rapid growing IT world. The adaptation of cloud computing is increasing in very large scale business organizations to small institutions rapidly due to many advanced fe... Cloud Computing is an uprising technology in the rapid growing IT world. The adaptation of cloud computing is increasing in very large scale business organizations to small institutions rapidly due to many advanced features of cloud computing, such as SaaS, PaaS and IaaS service models. So, nowadays, many organizations are trying to implement Cloud Computing based ERP system to enjoy the benefits of cloud computing. To implement any ERP system, an organization usually faces many challenges. As a result, this research has introduced how easily this cloud system can be implemented in an organization. By using this ERP system, an organization can be benefited in many ways;especially Small and Medium Enterprises (SMEs) can enjoy the highest possible benefits from this system. 展开更多
关键词 cloud Computing cloud Comparison cloud Models Enterprise Resource planning (ERP) Small and Medium Enterprise (SME)
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部