期刊文献+
共找到9,732篇文章
< 1 2 250 >
每页显示 20 50 100
Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning
1
作者 Fang Hu Siyi Qiu +3 位作者 Xiaolian Yang ChaoleiWu Miguel Baptista Nunes Hui Chen 《Computers, Materials & Continua》 SCIE EI 2024年第8期2897-2915,共19页
As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in dat... As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in data fusion,low reliability of data storage,low effectiveness of data sharing,etc.To guarantee the service quality of data collaboration,this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning,termed FL-HMChain.This system is composed of three layers:Data extraction and storage,data management,and data application.Focusing on healthcare and medical data,a healthcare and medical blockchain is constructed to realize data storage,transfer,processing,and access with security,real-time,reliability,and integrity.An improved master node selection consensus mechanism is presented to detect and prevent dishonest behavior,ensuring the overall reliability and trustworthiness of the collaborative model training process.Furthermore,healthcare and medical data collaboration services in real-world scenarios have been discussed and developed.To further validate the performance of FL-HMChain,a Convolutional Neural Network-based Federated Learning(FL-CNN-HMChain)model is investigated for medical image identification.This model achieves better performance compared to the baseline Convolutional Neural Network(CNN),having an average improvement of 4.7%on Area Under Curve(AUC)and 7%on Accuracy(ACC),respectively.Furthermore,the probability of privacy leakage can be effectively reduced by the blockchain-based parameter transfer mechanism in federated learning between local and global models. 展开更多
关键词 Blockchain technique federated learning healthcare and medical data collaboration service privacy preservation
下载PDF
Assessment of International GNSS Service Global Ionosphere Map products over China region based on measurements from the Crustal Movement Observation Network of China 被引量:1
2
作者 Jin Hu HaiBing Ruan +2 位作者 FuQing Huang ShengYang Gu XianKang Dou 《Earth and Planetary Physics》 EI CAS CSCD 2024年第2期400-407,共8页
The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of G... The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of GIM products in data-sparse regions is of paramount importance.In this study,measurements from the Crustal Movement Observation Network of China(CMONOC)are leveraged to evaluate the suitability of IGS-GIM products over China region in 2013-2014.The indices of mean error(ME),root mean square error(RMSE),and normalized RMSE(NRMSE)are then utilized to quantify the accuracy of IGS-GIM products.Results revealed distinct local time and latitudinal dependencies in IGS-GIM errors,with substantially high errors at nighttime(NRMSE:39%)and above 40°latitude(NRMSE:49%).Seasonal differences also emerged,with larger equinoctial deviations(NRMSE:33.5%)compared with summer(20%).A preliminary analysis implied that the irregular assimilation of sparse IGS observations,compounded by China’s distinct geomagnetic topology,may manifest as error variations.These results suggest that modeling based solely on IGS-GIM observations engenders inadequate representations across China and that a thorough examination would proffer the necessary foundation for advancing regional total electron content(TEC)constructions. 展开更多
关键词 International GNSS service(IGS)Global Ionosphere Maps(GIM) Crustal Movement Observation Network of China(CMONOC) total electron content(TEC) data assessment
下载PDF
YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System
3
作者 Seolhee Kim Sang-Duck Lee 《Computers, Materials & Continua》 SCIE EI 2024年第7期195-215,共21页
Damage to parcels reduces customer satisfactionwith delivery services and increases return-logistics costs.This can be prevented by detecting and addressing the damage before the parcels reach the customer.Consequentl... Damage to parcels reduces customer satisfactionwith delivery services and increases return-logistics costs.This can be prevented by detecting and addressing the damage before the parcels reach the customer.Consequently,various studies have been conducted on deep learning techniques related to the detection of parcel damage.This study proposes a deep learning-based damage detectionmethod for various types of parcels.Themethod is intended to be part of a parcel information-recognition systemthat identifies the volume and shipping information of parcels,and determines whether they are damaged;this method is intended for use in the actual parcel-transportation process.For this purpose,1)the study acquired image data in an environment simulating the actual parcel-transportation process,and 2)the training dataset was expanded based on StyleGAN3 with adaptive discriminator augmentation.Additionally,3)a preliminary distinction was made between the appearance of parcels and their damage status to enhance the performance of the parcel damage detection model and analyze the causes of parcel damage.Finally,using the dataset constructed based on the proposed method,a damage type detection model was trained,and its mean average precision was confirmed.This model can improve customer satisfaction and reduce return costs for parcel delivery companies. 展开更多
关键词 Parcel delivery service damage detection damage classification data augmentation generative adversarial network
下载PDF
Research and application of key technologies for data delivery in railway engineering design based on metadata
4
作者 Xiangru Lyu Xunxiao Yin +1 位作者 Kun Wang Yongwen Wei 《High-Speed Railway》 2024年第1期51-56,共6页
In view of the problems of inconsistent data semantics,inconsistent data formats,and difficult data quality assurance between the railway engineering design phase and the construction and operation phase,as well as th... In view of the problems of inconsistent data semantics,inconsistent data formats,and difficult data quality assurance between the railway engineering design phase and the construction and operation phase,as well as the difficulty in fully realizing the value of design results,this paper proposes a design and implementation scheme for a railway engineering collaborative design platform.The railway engineering collaborative design platform mainly includes functional modules such as metadata management,design collaboration,design delivery management,model component library,model rendering services,and Building Information Modeling(BIM)application services.Based on this,research is conducted on multi-disciplinary parameterized collaborative design technology for railway engineering,infrastructure data management and delivery technology,and design multi-source data fusion and application technology.The railway engineering collaborative design platform is compared with other railway design software to further validate its advantages and advanced features.The platform has been widely applied in multiple railway construction projects,greatly improving the design and project management efficiency. 展开更多
关键词 Railway engineering METadata data delivery Collaborative designplatform Design results BIM services
下载PDF
Research on Track Fastener Service Status Detection Based on Improved Yolov4 Model
5
作者 Jing He Weiqi Wang Nengpu Yang 《Journal of Transportation Technologies》 2024年第2期212-223,共12页
As an important part of railway lines, the healthy service status of track fasteners was very important to ensure the safety of trains. The application of deep learning algorithms was becoming an important method to r... As an important part of railway lines, the healthy service status of track fasteners was very important to ensure the safety of trains. The application of deep learning algorithms was becoming an important method to realize its state detection. However, there was often a deficiency that the detection accuracy and calculation speed of model were difficult to balance, when the traditional deep learning model is used to detect the service state of track fasteners. Targeting this issue, an improved Yolov4 model for detecting the service status of track fasteners was proposed. Firstly, the Mixup data augmentation technology was introduced into Yolov4 model to enhance the generalization ability of model. Secondly, the MobileNet-V2 lightweight network was employed in lieu of the CSPDarknet53 network as the backbone, thereby reducing the number of algorithm parameters and improving the model’s computational efficiency. Finally, the SE attention mechanism was incorporated to boost the importance of rail fastener identification by emphasizing relevant image features, ensuring that the network’s focus was primarily on the fasteners being inspected. The algorithm achieved both high precision and high speed operation of the rail fastener service state detection, while realizing the lightweight of model. The experimental results revealed that, the MAP value of the rail fastener service state detection algorithm based on the improved Yolov4 model reaches 83.2%, which is 2.83% higher than that of the traditional Yolov4 model, and the calculation speed was improved by 67.39%. Compared with the traditional Yolov4 model, the proposed method achieved the collaborative optimization of detection accuracy and calculation speed. 展开更多
关键词 Yolov4 Model service Status of Track Fasteners Detection and Recognition data augmentation Lightweight Network attention Mechanism
下载PDF
RTAs框架下跨境数据流动规则对数字服务贸易的影响研究 被引量:1
6
作者 代丽华 周灵灵 陆静雯 《国际贸易》 CSSCI 北大核心 2024年第3期72-85,共14页
文章基于2010—2021年全球50个代表性经济体的双边数字服务出口数据,采用引力模型实证检验了跨境数据流动规则的贸易创造效应。结果表明:缔约国之间签订的RTAs中,跨境数据流动规则的承诺水平越高,双边数字服务贸易规模越大,贸易创造效... 文章基于2010—2021年全球50个代表性经济体的双边数字服务出口数据,采用引力模型实证检验了跨境数据流动规则的贸易创造效应。结果表明:缔约国之间签订的RTAs中,跨境数据流动规则的承诺水平越高,双边数字服务贸易规模越大,贸易创造效应越显著;将跨境数据流动规则细分为数据流动规则、数据本地化规则和数据保护规则后发现,数据本地化条款对数字服务贸易的促进作用更强;相较于其他部门,跨境数据流动规则对金融服务的贸易促进作用更强;缔约国整体的经济自由度水平越高,跨境数据流动规则对数字服务贸易的促进效应越小;缔约国之间的数据监管环境差距越大,跨境数据流动规则越能促进双边数字服务贸易发展。机制检验结果表明:跨境数据流动规则能够通过降低贸易成本、缩短制度距离和扩大出口国的双向FDI规模促进数字服务贸易发展。研究结论证实了跨境数据流动规则产生的贸易创造效应,为我国有效制定数字服务贸易开放政策、积极参与全球数字治理提供了经验证据。 展开更多
关键词 跨境数据流动规则 数字服务贸易 区域贸易协定 贸易创造效应
下载PDF
虚拟农业供应链模式的Repast仿真分析
7
作者 宾厚 徐子澄 《洛阳师范学院学报》 2024年第8期18-21,共4页
通过Repast仿真技术,对比分析了传统农业供应链与大数据云服务平台支持下的农业供应链运营表现,并深入探讨了供应链中的竞争合作关系及其对决策过程和效率的影响.研究结果显示:大数据云服务平台显著提高了农业供应链的信息流通速度和协... 通过Repast仿真技术,对比分析了传统农业供应链与大数据云服务平台支持下的农业供应链运营表现,并深入探讨了供应链中的竞争合作关系及其对决策过程和效率的影响.研究结果显示:大数据云服务平台显著提高了农业供应链的信息流通速度和协作效率,进而增强了协同效应和整体绩效.这为农业供应链的现代化转型提供了坚实的实证基础,并为供应链各参与主体提供了宝贵的参考依据. 展开更多
关键词 虚拟农业供应链 大数据云服务平台 Repast仿真
下载PDF
To establish CMOC China as an important component of marine data and service international cooperation in China 被引量:2
8
作者 杜琼玮 林绍花 王丰 《Marine Science Bulletin》 CAS 2013年第1期91-96,共6页
JCOMM has strategy to establish the network of WMO-IOC Centres for Marine-meteorological and Oceanographic Climate Data (CMOCs) under the new Marine Climate Data System (MCDS) in 2012 for improving the quality and... JCOMM has strategy to establish the network of WMO-IOC Centres for Marine-meteorological and Oceanographic Climate Data (CMOCs) under the new Marine Climate Data System (MCDS) in 2012 for improving the quality and timeliness of the marine-meteorological and oceanographic data, metadata and products available to end users. China as a candidate of CMOC China has been approved to run on a trial basis after the 4th Meeting of the Joint IOC/WMO Technical Commission for Oceanography and Marine Meteorology (JCOMM). This article states the developing intention of CMOC China in the next few years through the brief introduction to critical marine data, products and service system and cooperation projects in the world. 展开更多
关键词 MaRINE data and service international cooperation future development
下载PDF
A hierarchical blockchain-enabled security-threat assessment architecture for IoV
9
作者 Yuanni Liu Ling Pan Shanzhi Chen 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1035-1047,共13页
In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish ... In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish security-threat assessment architectures to evaluate risks of traffic elements by managing and sharing securitythreat information.Unfortunately,most assessment architectures process data in a centralized manner,causing delays in query services.To address this issue,in this paper,a Hierarchical Blockchain-enabled Security threat Assessment Architecture(HBSAA)is proposed,utilizing edge chains and global chains to share data.In addition,data virtualization technology is introduced to manage multi-source heterogeneous data,and a metadata association model based on attribute graph is designed to deal with complex data relationships.In order to provide high-speed query service,the ant colony optimization of key nodes is designed,and the HBSAA prototype is also developed and the performance is tested.Experimental results on the large-scale vulnerabilities data gathered from NVD demonstrate that the HBSAA not only shields data heterogeneity,but also reduces service response time. 展开更多
关键词 Internet of vehicles Blockchain Edge computing data virtualization data service composition
下载PDF
Performance Prediction Based Workload Scheduling in Co-Located Cluster
10
作者 Dongyang Ou Yongjian Ren Congfeng Jiang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2043-2067,共25页
Cloud service providers generally co-locate online services and batch jobs onto the same computer cluster,where the resources can be pooled in order to maximize data center resource utilization.Due to resource competi... Cloud service providers generally co-locate online services and batch jobs onto the same computer cluster,where the resources can be pooled in order to maximize data center resource utilization.Due to resource competition between batch jobs and online services,co-location frequently impairs the performance of online services.This study presents a quality of service(QoS)prediction-based schedulingmodel(QPSM)for co-locatedworkloads.The performance prediction of QPSM consists of two parts:the prediction of an online service’s QoS anomaly based on XGBoost and the prediction of the completion time of an offline batch job based on randomforest.On-line service QoS anomaly prediction is used to evaluate the influence of batch jobmix on on-line service performance,and batch job completion time prediction is utilized to reduce the total waiting time of batch jobs.When the same number of batch jobs are scheduled in experiments using typical test sets such as CloudSuite,the scheduling time required by QPSM is reduced by about 6 h on average compared with the first-come,first-served strategy and by about 11 h compared with the random scheduling strategy.Compared with the non-co-located situation,QPSM can improve CPU resource utilization by 12.15% and memory resource utilization by 5.7% on average.Experiments show that the QPSM scheduling strategy proposed in this study can effectively guarantee the quality of online services and further improve cluster resource utilization. 展开更多
关键词 Co-located cluster workload scheduling online service batch jobs data center
下载PDF
Healthcare Services Interoperability in Kenya: Challenges and Opportunities
11
作者 Antony G. Musabi Andrew Kiprop Kipkebut 《E-Health Telecommunication Systems and Networks》 2024年第1期1-11,共11页
In an attempt to assess the Kenyan healthcare system, this study looks at the current efforts that are already in place, what challenges they face, and what strategies can be put into practice to foster interoperabili... In an attempt to assess the Kenyan healthcare system, this study looks at the current efforts that are already in place, what challenges they face, and what strategies can be put into practice to foster interoperability. By reviewing a variety of literature and using statistics, the paper ascertains notable impediments such as the absence of standard protocols, lack of adequate technological infrastructure, and weak regulatory frameworks. Resultant effects from these challenges regarding health provision target enhanced data sharing and merging for better patient outcomes and allocation of resources. It also highlights several opportunities that include the adoption of emerging technologies, and the establishment of public-private partnerships to strengthen the healthcare framework among others. In this regard, the article provides recommendations based on stakeholder views and global best practices addressed to policymakers, medical practitioners, and IT specialists concerned with achieving effective interoperability within Kenya’s health system. This research is relevant because it adds knowledge to the existing literature on how healthcare quality can be improved to make it more patient-centered especially in Kenya. 展开更多
关键词 Healthcare services INTEROPERaBILITY data Exchange
下载PDF
Using Python to Analyze Financial Big Data
12
作者 Xuanrui Zhu 《Journal of Electronic Research and Application》 2024年第5期12-20,共9页
As technology and the internet develop,more data are generated every day.These data are in large sizes,high dimensions,and complex structures.The combination of these three features is the“Big Data”[1].Big data is r... As technology and the internet develop,more data are generated every day.These data are in large sizes,high dimensions,and complex structures.The combination of these three features is the“Big Data”[1].Big data is revolutionizing all industries,bringing colossal impacts to them[2].Many researchers have pointed out the huge impact that big data can have on our daily lives[3].We can utilize the information we obtain and help us make decisions.Also,the conclusions we drew from the big data we analyzed can be used as a prediction for the future,helping us to make more accurate and benign decisions earlier than others.If we apply these technics in finance,for example,in stock,we can get detailed information for stocks.Moreover,we can use the analyzed data to predict certain stocks.This can help people decide whether to buy a stock or not by providing predicted data for people at a certain convincing level,helping to protect them from potential losses. 展开更多
关键词 Big data finance Big data in financial services Big data in risk management aI Machine learning
下载PDF
Bolzano Traffic: An Example of Open ITS Deployment for Advanced Traveller Information Services
13
作者 Roberto Cavaliere 《Journal of Traffic and Transportation Engineering》 2024年第1期23-29,共7页
This paper aims to present the experience gathered in the Italian alpine city of Bolzano within the project“Bolzano Traffic”whose goal is the introduction of an experimental open ITS platform for local service provi... This paper aims to present the experience gathered in the Italian alpine city of Bolzano within the project“Bolzano Traffic”whose goal is the introduction of an experimental open ITS platform for local service providers,fostering the diffusion of advanced traveller information services and the future deployment of cooperative mobility systems in the region.Several end-users applications targeted to the needs of different user groups have been developed in collaboration with local companies and research centers;a partnership with the EU Co-Cities project has been activated as well.The implemented services rely on real-time travel and traffic information collected by urban traffic monitoring systems or published by local stakeholders(e.g.public transportation operators).An active involvement of end-users,who have recently started testing these demo applications for free,is actually on-going. 展开更多
关键词 Real-time advanced travel information services cooperative mobility services open data.
下载PDF
Application and Research of Big Data Technology in Intelligent Ward
14
作者 Yuhan Li Tongxing Li Shenglei Dongye 《Journal of Clinical and Nursing Research》 2024年第10期30-35,共6页
With the rapid development of information science and technology and the progress of the health service industry,the integration of medical services and new technologies such as big data technology has become more in-... With the rapid development of information science and technology and the progress of the health service industry,the integration of medical services and new technologies such as big data technology has become more in-depth,and the construction of smart hospitals and smart wards has received more and more attention and application.This article conducts in-depth research and analysis on the application and exploration of big data technology in smart wards and explores the role of big data technology in improving the quality,efficiency,and cost of medical services in smart wards,as well as the application prospects and challenges of big data technology in patient monitoring,disease prevention,and diagnosis and treatment processes in smart wards.The focus is on analyzing and studying the use of big data technology to assist in the construction of smart neonatal surgery wards.This article aims to provide useful references and lessons for the construction and development of smart wards. 展开更多
关键词 Smart ward Neonatal surgery Big data technology Medical service quality
下载PDF
Mapping cultural ecosystem services in mountain forests using mobile phone data
15
作者 CIESIELSKI Mariusz KAMINSKA Agnieszka 《Journal of Mountain Science》 SCIE CSCD 2023年第12期3437-3449,共13页
The aim of the work was to determine the spatial distribution of activity in the forest on the area of the Forest Promotional Complex“Sudety Zachodnie”using mobile phone data.The study identified the sites with the ... The aim of the work was to determine the spatial distribution of activity in the forest on the area of the Forest Promotional Complex“Sudety Zachodnie”using mobile phone data.The study identified the sites with the highest(hot spot)and lowest(cold spot)use.Habitat,stand,demographic,topographic and spatial factors affecting the distribution of activity were also analyzed.Two approaches were applied in our research:global and local Moran’s coefficients,and a machine learning technique,Boosted Regression Trees.The results show that 11,503,320 visits to forest areas were recorded in the“Sudety Zachodnie”in 2019.The most popular season for activities was winter,and the least popular was spring.Using global and local Moran’s I coefficients,three small hot clusters of activity and one large cold cluster were identified.Locations with high values with similar neighbours(hot-spots)were most often visited forest areas,averaging almost 200,000 visits over 2019.Significantly fewer visits were recorded in cold-spots,the average number of visits to these areas was about 4,500.The value of global Moran’s I was equal to 0.54 and proved significant positive spatial autocorrelation.Results of Boosted Regression Trees modeling of visits in forest,using tree stand habitat and spatial factors accurately explained 76%of randomly selected input data.The variables that had the greatest effect on the distribution of activities were the density of hiking and biking trails and diversity of topography.The methodology presented in this article allows delineation of Cultural Ecosystem Services hot spots in forest areas based on mobile phone data.It also allows the identification of factors that may influence the distribution of visits in forests.Such data are important for managing forest areas and adapting forest management to the needs of society while maintaining ecosystem stability. 展开更多
关键词 Ecosystem services Big data Traffic research MONITORING FORESTS
下载PDF
Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics
16
作者 Manar Mohamed Hafez Essam Eldin F.Elfakharany +1 位作者 Amr A.Abohany Mostafa Thabet 《Computers, Materials & Continua》 SCIE EI 2023年第4期943-958,共16页
Big data is usually unstructured, and many applications require theanalysis in real-time. Decision tree (DT) algorithm is widely used to analyzebig data. Selecting the optimal depth of DT is time-consuming process as ... Big data is usually unstructured, and many applications require theanalysis in real-time. Decision tree (DT) algorithm is widely used to analyzebig data. Selecting the optimal depth of DT is time-consuming process as itrequires many iterations. In this paper, we have designed a modified versionof a (DT). The tree aims to achieve optimal depth by self-tuning runningparameters and improving the accuracy. The efficiency of the modified (DT)was verified using two datasets (airport and fire datasets). The airport datasethas 500000 instances and the fire dataset has 600000 instances. A comparisonhas been made between the modified (DT) and standard (DT) with resultsshowing that the modified performs better. This comparison was conductedon multi-node on Apache Spark tool using Amazon web services. Resultingin accuracy with an increase of 6.85% for the first dataset and 8.85% for theairport dataset. In conclusion, the modified DT showed better accuracy inhandling different-sized datasets compared to standard DT algorithm. 展开更多
关键词 Big data classification decision tree amazon web services
下载PDF
Data Center Traffic Scheduling Strategy for Minimization Congestion and Quality of Service Guaranteeing
17
作者 Chunzhi Wang Weidong Cao +1 位作者 Yalin Hu Jinhang Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期4377-4393,共17页
According to Cisco’s Internet Report 2020 white paper,there will be 29.3 billion connected devices worldwide by 2023,up from 18.4 billion in 2018.5G connections will generate nearly three times more traffic than 4G c... According to Cisco’s Internet Report 2020 white paper,there will be 29.3 billion connected devices worldwide by 2023,up from 18.4 billion in 2018.5G connections will generate nearly three times more traffic than 4G connections.While bringing a boom to the network,it also presents unprecedented challenges in terms of flow forwarding decisions.The path assignment mechanism used in traditional traffic schedulingmethods tends to cause local network congestion caused by the concentration of elephant flows,resulting in unbalanced network load and degraded quality of service.Using the centralized control of software-defined networks,this study proposes a data center traffic scheduling strategy for minimization congestion and quality of service guaranteeing(MCQG).The ideal transmission path is selected for data flows while considering the network congestion rate and quality of service.Different traffic scheduling strategies are used according to the characteristics of different service types in data centers.Reroute scheduling for elephant flows that tend to cause local congestion.The path evaluation function is formed by the maximum link utilization on the path,the number of elephant flows and the time delay,and the fast merit-seeking capability of the sparrow search algorithm is used to find the path with the lowest actual link overhead as the rerouting path for the elephant flows.It is used to reduce the possibility of local network congestion occurrence.Equal cost multi-path(ECMP)protocols with faster response time are used to schedulemouse flows with shorter duration.Used to guarantee the quality of service of the network.To achieve isolated transmission of various types of data streams.The experimental results show that the proposed strategy has higher throughput,better network load balancing,and better robustness compared to ECMP under different traffic models.In addition,because it can fully utilize the resources in the network,MCQG also outperforms another traffic scheduling strategy that does rerouting for elephant flows(namely Hedera).Compared withECMPandHedera,MCQGimproves average throughput by 11.73%and 4.29%,and normalized total throughput by 6.74%and 2.64%,respectively;MCQG improves link utilization by 23.25%and 15.07%;in addition,the average round-trip delay and packet loss rate fluctuate significantly less than the two compared strategies. 展开更多
关键词 Software-defined network data center network OpenFlow network congestion quality of service
下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
18
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
下载PDF
A Testing Method for Web Services Composition Based on Data-Flow 被引量:2
19
作者 HOU Jun XU Baowen +2 位作者 XU Lei WANG Di XU Junling 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期455-460,共6页
This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution lan... This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution language (BPEL) is modified in company with the analysis of data dependency and an exact representation of dead path elimination (DPE) is proposed, which over-comes the difficulties brought to dataflow analysis. Then defining and using information based on data flow rules is collected by parsing BPEL and Web services description language (WSDL) documents and the def-use annotated control flow graph is created. Based on this model, data-flow anomalies which indicate potential errors can be discovered by traversing the paths of graph, and all-du-paths used in dynamic data flow testing for Web services composition are automatically generated, then testers can design the test cases according to the collected constraints for each path selected. 展开更多
关键词 Web services composition business process execution language (BPEL) Web services description language (WSDL) data flow all-du-path
下载PDF
An operational radar current observing and data service platform in the East China Sea 被引量:1
20
作者 DENG Zeng'an ZHANG Anmin +5 位作者 ZHAI Jingsheng YU Ting WU Shuangquan ZHANG Xuefeng KANG Linchong ZHANG Yuming 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2016年第11期9-15,共7页
An ocean state monitor and analysis radar(OSMAR), developed by Wuhan University in China, have been mounted at six stations along the coasts of East China Sea(ECS) to measure velocities(currents, waves and winds... An ocean state monitor and analysis radar(OSMAR), developed by Wuhan University in China, have been mounted at six stations along the coasts of East China Sea(ECS) to measure velocities(currents, waves and winds) at the sea surface. Radar-observed surface current is taken as an example to illustrate the operational high-frequency(HF) radar observing and data service platform(OP), presenting an operational flow from data observing, transmitting, processing, visualizing, to end-user service. Three layers(systems): radar observing system(ROS), data service system(DSS) and visualization service system(VSS), as well as the data flow within the platform are introduced. Surface velocities observed at stations are synthesized at the radar data receiving and preprocessing center of the ROS, and transmitted to the DSS, in which the data processing and quality control(QC) are conducted. Users are allowed to browse the processed data on the portal of the DSS, and access to those data files. The VSS aims to better show the data products by displaying the information on a visual globe. By utilizing the OP, the surface currents in East China Sea are monitored, and hourly and seasonal variabilities of them are investigated. 展开更多
关键词 RaDaR operational system CURRENTS data service VISUaLIZaTION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部