期刊文献+
共找到2,777篇文章
< 1 2 139 >
每页显示 20 50 100
Automatic Extraction Method of 3D Feature Guidelines for Complex Cultural Relic Surfaces Based on Point Cloud 被引量:1
1
作者 GENG Yuxin ZHONG Ruofei +1 位作者 HUANG Yuqin SUN Haili 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第1期16-41,共26页
Cultural relics line graphic serves as a crucial form of traditional artifact information documentation,which is a simple and intuitive product with low cost of displaying compared with 3D models.Dimensionality reduct... Cultural relics line graphic serves as a crucial form of traditional artifact information documentation,which is a simple and intuitive product with low cost of displaying compared with 3D models.Dimensionality reduction is undoubtedly necessary for line drawings.However,most existing methods for artifact drawing rely on the principles of orthographic projection that always cannot avoid angle occlusion and data overlapping while the surface of cultural relics is complex.Therefore,conformal mapping was introduced as a dimensionality reduction way to compensate for the limitation of orthographic projection.Based on the given criteria for assessing surface complexity,this paper proposed a three-dimensional feature guideline extraction method for complex cultural relic surfaces.A 2D and 3D combined factor that measured the importance of points on describing surface features,vertex weight,was designed.Then the selection threshold for feature guideline extraction was determined based on the differences between vertex weight and shape index distributions.The feasibility and stability were verified through experiments conducted on real cultural relic surface data.Results demonstrated the ability of the method to address the challenges associated with the automatic generation of line drawings for complex surfaces.The extraction method and the obtained results will be useful for line graphic drawing,displaying and propaganda of cultural relics. 展开更多
关键词 point cloud conformal parameterization vertex weight surface mesh cultural relics feature extraction
下载PDF
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
2
作者 Nader Abdel Karim Osama A.Khashan +4 位作者 Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2023-2045,共23页
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads. 展开更多
关键词 cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm
下载PDF
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
3
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 cloud storage data secrecy data integrity smart contracts CRYPtoGRAPHY
下载PDF
Quafu-Qcover:Explore combinatorial optimization problems on cloud-based quantum computers
4
作者 许宏泽 庄伟峰 +29 位作者 王正安 黄凯旋 时运豪 马卫国 李天铭 陈驰通 许凯 冯玉龙 刘培 陈墨 李尚书 杨智鹏 钱辰 靳羽欣 马运恒 肖骁 钱鹏 顾炎武 柴绪丹 普亚南 张翼鹏 魏世杰 增进峰 李行 龙桂鲁 金贻荣 于海峰 范桁 刘东 胡孟军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期104-115,共12页
We introduce Quafu-Qcover,an open-source cloud-based software package developed for solving combinatorial optimization problems using quantum simulators and hardware backends.Quafu-Qcover provides a standardized and c... We introduce Quafu-Qcover,an open-source cloud-based software package developed for solving combinatorial optimization problems using quantum simulators and hardware backends.Quafu-Qcover provides a standardized and comprehensive workflow that utilizes the quantum approximate optimization algorithm(QAOA).It facilitates the automatic conversion of the original problem into a quadratic unconstrained binary optimization(QUBO)model and its corresponding Ising model,which can be subsequently transformed into a weight graph.The core of Qcover relies on a graph decomposition-based classical algorithm,which efficiently derives the optimal parameters for the shallow QAOA circuit.Quafu-Qcover incorporates a dedicated compiler capable of translating QAOA circuits into physical quantum circuits that can be executed on Quafu cloud quantum computers.Compared to a general-purpose compiler,our compiler demonstrates the ability to generate shorter circuit depths,while also exhibiting superior speed performance.Additionally,the Qcover compiler has the capability to dynamically create a library of qubits coupling substructures in real-time,utilizing the most recent calibration data from the superconducting quantum devices.This ensures that computational tasks can be assigned to connected physical qubits with the highest fidelity.The Quafu-Qcover allows us to retrieve quantum computing sampling results using a task ID at any time,enabling asynchronous processing.Moreover,it incorporates modules for results preprocessing and visualization,facilitating an intuitive display of solutions for combinatorial optimization problems.We hope that Quafu-Qcover can serve as an instructive illustration for how to explore application problems on the Quafu cloud quantum computers. 展开更多
关键词 quantum cloud platform combinatorial optimization problems quantum software
下载PDF
A Random Fusion of Mix 3D and Polar Mix to Improve Semantic Segmentation Performance in 3D Lidar Point Cloud
5
作者 Bo Liu Li Feng Yufeng Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期845-862,共18页
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network models.These point clouds,which represent spatial information throu... This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network models.These point clouds,which represent spatial information through a collection of 3D coordinates,have found wide-ranging applications.Data augmentation has emerged as a potent solution to the challenges posed by limited labeled data and the need to enhance model generalization capabilities.Much of the existing research is devoted to crafting novel data augmentation methods specifically for 3D lidar point clouds.However,there has been a lack of focus on making the most of the numerous existing augmentation techniques.Addressing this deficiency,this research investigates the possibility of combining two fundamental data augmentation strategies.The paper introduces PolarMix andMix3D,two commonly employed augmentation techniques,and presents a new approach,named RandomFusion.Instead of using a fixed or predetermined combination of augmentation methods,RandomFusion randomly chooses one method from a pool of options for each instance or sample.This innovative data augmentation technique randomly augments each point in the point cloud with either PolarMix or Mix3D.The crux of this strategy is the random choice between PolarMix and Mix3Dfor the augmentation of each point within the point cloud data set.The results of the experiments conducted validate the efficacy of the RandomFusion strategy in enhancing the performance of neural network models for 3D lidar point cloud semantic segmentation tasks.This is achieved without compromising computational efficiency.By examining the potential of merging different augmentation techniques,the research contributes significantly to a more comprehensive understanding of how to utilize existing augmentation methods for 3D lidar point clouds.RandomFusion data augmentation technique offers a simple yet effective method to leverage the diversity of augmentation techniques and boost the robustness of models.The insights gained from this research can pave the way for future work aimed at developing more advanced and efficient data augmentation strategies for 3D lidar point cloud analysis. 展开更多
关键词 3D lidar point cloud data augmentation RandomFusion semantic segmentation
下载PDF
Cloud Top Pressure Retrieval Using Polarized and Oxygen A-band Measurements from GF5 and PARASOL Satellites
6
作者 Lesi WEI Huazhe SHANG +6 位作者 Jian XU Chong SHI Gegen TANA Kefu CHAO Shanhu BAO Liangfu CHEN Husi LETU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第4期680-700,共21页
Cloud top pressure(CTP)is one of the critical cloud properties that significantly affects the radiative effect of clouds.Multi-angle polarized sensors can employ polarized bands(490 nm)or O_(2)A-bands(763 and 765 nm)t... Cloud top pressure(CTP)is one of the critical cloud properties that significantly affects the radiative effect of clouds.Multi-angle polarized sensors can employ polarized bands(490 nm)or O_(2)A-bands(763 and 765 nm)to retrieve the CTP.However,the CTP retrieved by the two methods shows inconsistent results in certain cases,and large uncertainties in low and thin cloud retrievals,which may lead to challenges in subsequent applications.This study proposes a synergistic algorithm that considers both O_(2)A-bands and polarized bands using a random forest(RF)model.LiDAR CTP data are used as the true values and the polarized and non-polarized measurements are concatenated to train the RF model to determine CTP.Additionally,through analysis,we proposed that the polarized signal becomes saturated as the cloud optical thickness(COT)increases,necessitating a particular treatment for cases where COT<10 to improve the algorithm's stability.The synergistic method was then applied to the directional polarized camera(DPC)and Polarized and Directionality of the Earth’s Reflectance(POLDER)measurements for evaluation,and the resulting retrieval accuracy of the POLDER-based measurements(RMSEPOLDER=205.176 hPa,RMSEDPC=171.141 hPa,R^(2)POLDER=0.636,R^(2)DPC=0.663,respectively)were higher than that of the MODIS and POLDER Rayleigh pressure measurements.The synergistic algorithm also showed good performance with the application of DPC data.This algorithm is expected to provide data support for atmosphere-related fields as an atmospheric remote sensing algorithm within the Cloud Application for Remote Sensing,Atmospheric Radiation,and Updating Energy(CARE)platform. 展开更多
关键词 atmospheric remote sensing cloud top pressure multi-angle polarized O_(2)A-band GF-5/DPC PARASOL/POLDER-3
下载PDF
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
7
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
8
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 cloud DATA Information Model Data Storage cloud Computing Security System Data Encryption
下载PDF
Building Facade Point Clouds Segmentation Based on Optimal Dual-Scale Feature Descriptors
9
作者 Zijian Zhang Jicang Wu 《Journal of Computer and Communications》 2024年第6期226-245,共20页
To address the current issues of inaccurate segmentation and the limited applicability of segmentation methods for building facades in point clouds, we propose a facade segmentation algorithm based on optimal dual-sca... To address the current issues of inaccurate segmentation and the limited applicability of segmentation methods for building facades in point clouds, we propose a facade segmentation algorithm based on optimal dual-scale feature descriptors. First, we select the optimal dual-scale descriptors from a range of feature descriptors. Next, we segment the facade according to the threshold value of the chosen optimal dual-scale descriptors. Finally, we use RANSAC (Random Sample Consensus) to fit the segmented surface and optimize the fitting result. Experimental results show that, compared to commonly used facade segmentation algorithms, the proposed method yields more accurate segmentation results, providing a robust data foundation for subsequent 3D model reconstruction of buildings. 展开更多
关键词 3D Laser Scanning Point clouds Building Facade Segmentation Point cloud Processing Feature Descriptors
下载PDF
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
10
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期1-14,共14页
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi... The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition. 展开更多
关键词 Google cloud Platform (GCP) Identity and Access Management (IAM) Saviynt User Identities Access Privileges Authentication Processes
下载PDF
Grid Side Distributed Energy Storage Cloud Group End Region Hierarchical Time-Sharing Configuration Algorithm Based onMulti-Scale and Multi Feature Convolution Neural Network
11
作者 Wen Long Bin Zhu +3 位作者 Huaizheng Li Yan Zhu Zhiqiang Chen Gang Cheng 《Energy Engineering》 EI 2023年第5期1253-1269,共17页
There is instability in the distributed energy storage cloud group end region on the power grid side.In order to avoid large-scale fluctuating charging and discharging in the power grid environment and make the capaci... There is instability in the distributed energy storage cloud group end region on the power grid side.In order to avoid large-scale fluctuating charging and discharging in the power grid environment and make the capacitor components showa continuous and stable charging and discharging state,a hierarchical time-sharing configuration algorithm of distributed energy storage cloud group end region on the power grid side based on multi-scale and multi feature convolution neural network is proposed.Firstly,a voltage stability analysis model based onmulti-scale and multi feature convolution neural network is constructed,and the multi-scale and multi feature convolution neural network is optimized based on Self-OrganizingMaps(SOM)algorithm to analyze the voltage stability of the cloud group end region of distributed energy storage on the grid side under the framework of credibility.According to the optimal scheduling objectives and network size,the distributed robust optimal configuration control model is solved under the framework of coordinated optimal scheduling at multiple time scales;Finally,the time series characteristics of regional power grid load and distributed generation are analyzed.According to the regional hierarchical time-sharing configuration model of“cloud”,“group”and“end”layer,the grid side distributed energy storage cloud group end regional hierarchical time-sharing configuration algorithm is realized.The experimental results show that after applying this algorithm,the best grid side distributed energy storage configuration scheme can be determined,and the stability of grid side distributed energy storage cloud group end region layered timesharing configuration can be improved. 展开更多
关键词 Multiscale and multi feature convolution neural network distributed energy storage at grid side cloud group end region layered time-sharing configuration algorithm
下载PDF
Evaluation of toppling rock slopes using a composite cloud model with DEMATEL–CRITIC method 被引量:3
12
作者 Huan-ling Wang Xu-fei Zhao +3 位作者 Hong-jie Chen Kui Yi Wei-chau Xie Wei-ya Xu 《Water Science and Engineering》 EI CAS CSCD 2023年第3期280-288,共9页
Safety evaluation of toppling rock slopes developing in reservoir areas is crucial. To reduce the uncertainty of safety evaluation, this study developed a composite cloud model, which improved the combination weights ... Safety evaluation of toppling rock slopes developing in reservoir areas is crucial. To reduce the uncertainty of safety evaluation, this study developed a composite cloud model, which improved the combination weights of the decision-making trial and evaluation laboratory (DEMATEL) and criteria importance through intercriteria correlation (CRITIC) methods. A safety evaluation system was developed according to in situ monitoring data. The backward cloud generator was used to calculate the numerical characteristics of a cloud model of quantitative indices, and different virtual clouds were used to synthesize some clouds into a generalized one. The synthesized numerical characteristics were calculated to comprehensively evaluate the safety of toppling rock slopes. A case study of a toppling rock slope near the Huangdeng Hydropower Station in China was conducted using monitoring data collected since operation of the hydropower project began. The results indicated that the toppling rock slope was moderately safe with a low safety margin. The composite cloud model considers the fuzziness and randomness of safety evaluation and enables interchange between qualitative and quantitative knowledge. This study provides a new theoretical method for evaluating the safety of toppling rock slopes. It can aid in the predication, control, and even prevention of disasters. 展开更多
关键词 toppling rock slope Safety evaluation Composite cloud model DEMATEL CRITIC Huangdeng Hydropower Project
下载PDF
The Probability Density Function Related to Shallow Cumulus Entrainment Rate and Its Influencing Factors in a Large-Eddy Simulation 被引量:3
13
作者 Lei ZHU Chunsong LU +5 位作者 Xiaoqi XU Xin HE Junjun LI Shi LUO Yuan WANG Fan WANG 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第1期173-187,共15页
The process of entrainment-mixing between cumulus clouds and the ambient air is important for the development of cumulus clouds.Accurately obtaining the entrainment rate(λ)is particularly important for its parameteri... The process of entrainment-mixing between cumulus clouds and the ambient air is important for the development of cumulus clouds.Accurately obtaining the entrainment rate(λ)is particularly important for its parameterization within the overall cumulus parameterization scheme.In this study,an improved bulk-plume method is proposed by solving the equations of two conserved variables simultaneously to calculateλof cumulus clouds in a large-eddy simulation.The results demonstrate that the improved bulk-plume method is more reliable than the traditional bulk-plume method,becauseλ,as calculated from the improved method,falls within the range ofλvalues obtained from the traditional method using different conserved variables.The probability density functions ofλfor all data,different times,and different heights can be well-fitted by a log-normal distribution,which supports the assumed stochastic entrainment process in previous studies.Further analysis demonstrate that the relationship betweenλand the vertical velocity is better than other thermodynamic/dynamical properties;thus,the vertical velocity is recommended as the primary influencing factor for the parameterization ofλin the future.The results of this study enhance the theoretical understanding ofλand its influencing factors and shed new light on the development ofλparameterization. 展开更多
关键词 large-eddy simulation cumulus clouds entrainment rate probability density functions spatial and temporal distribution
下载PDF
基于Spring Cloud的分布式医疗数据平台建设
14
作者 汪睿 胡珊珊 +1 位作者 陈敏莲 徐骁 《设备管理与维修》 2024年第4期16-19,共4页
为解决互联网时代医疗大数据的可靠存储问题,探索异构数据的有效处理方案,加强医疗数据检索能力。提出一种基于Spring Cloud的分布式医疗数据平台建设方案,该方案通过Spring Cloud技术构建分布式架构,选取MongoDB非关系型数据库作为分... 为解决互联网时代医疗大数据的可靠存储问题,探索异构数据的有效处理方案,加强医疗数据检索能力。提出一种基于Spring Cloud的分布式医疗数据平台建设方案,该方案通过Spring Cloud技术构建分布式架构,选取MongoDB非关系型数据库作为分布式存储,同时对数据进行标准化、分词等操作,从而实现一个异构数据可存储、系统高可用、规模易扩展、检索高效率的医疗数据平台。 展开更多
关键词 分布式 医疗数据 Spring cloud MONGODB
下载PDF
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT
15
作者 Anichur Rahman Md Jahidul Islam +3 位作者 Shahab S.Band Ghulam Muhammad Kamrul Hasan Prayag Tiwari 《Digital Communications and Networks》 SCIE CSCD 2023年第2期411-421,共11页
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity... Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity,confidentiality,and integrity in their respective use cases(especially in industrial fields).Additionally,cloud computing has been in use for several years now.Confidential information is exchanged with cloud infrastructure to provide clients with access to distant resources,such as computing and storage activities in the IIoT.There are also significant security risks,concerns,and difficulties associated with cloud computing.To address these challenges,we propose merging BC and SDN into a cloud computing platform for the IIoT.This paper introduces“DistB-SDCloud”,an architecture for enhanced cloud security for smart IIoT applications.The proposed architecture uses a distributed BC method to provide security,secrecy,privacy,and integrity while remaining flexible and scalable.Customers in the industrial sector benefit from the dispersed or decentralized,and efficient environment of BC.Additionally,we described an SDN method to improve the durability,stability,and load balancing of cloud infrastructure.The efficacy of our SDN and BC-based implementation was experimentally tested by using various parameters including throughput,packet analysis,response time,bandwidth,and latency analysis,as well as the monitoring of several attacks on the system itself. 展开更多
关键词 Smart IIoT Blockchain SDN IOT Security PRIVACY OpenFlow SDN-Controller Data security cloud computing cloud management
下载PDF
Point Cloud Classification Using Content-Based Transformer via Clustering in Feature Space 被引量:1
16
作者 Yahui Liu Bin Tian +2 位作者 Yisheng Lv Lingxi Li Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期231-239,共9页
Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to est... Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://github.com/yahuiliu99/PointC onT. 展开更多
关键词 Content-based Transformer deep learning feature aggregator local attention point cloud classification
下载PDF
The Importance of the Shape Parameter in a Bulk Parameterization Scheme to the Evolution of the Cloud Droplet Spectrum during Condensation
17
作者 Jun ZHANG Jiming SUN +2 位作者 Wei DENG Wenhao HU Yongqing WANG 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2023年第1期155-167,共13页
The shape parameter of the Gamma size distribution plays a key role in the evolution of the cloud droplet spectrum in the bulk parameterization schemes. However, due to the inaccurate specification of the shape parame... The shape parameter of the Gamma size distribution plays a key role in the evolution of the cloud droplet spectrum in the bulk parameterization schemes. However, due to the inaccurate specification of the shape parameter in the commonly used bulk double-moment schemes, the cloud droplet spectra cannot reasonably be described during the condensation process. Therefore, a newly-developed triple-parameter condensation scheme with the shape parameter diagnosed through the number concentration, cloud water content, and reflectivity factor of cloud droplets can be applied to improve the evolution of the cloud droplet spectrum. The simulation with the new parameterization scheme was compared to those with a high-resolution Lagrangian bin scheme, the double-moment schemes in a parcel model, and the observation in a 1.5D Eulerian model that consists of two cylinders. The new scheme with the shape parameter varying with time and space can accurately simulate the evolution of the cloud droplet spectrum. Furthermore, the volume-mean radius and cloud water content simulated with the new scheme match the Lagrangian analytical solutions well, and the errors are steady, within approximately 0.2%. 展开更多
关键词 cloud microphysics parameterization cloud droplet spectrum double-moment scheme shape parameter
下载PDF
Safety Risk Assessment of Overturning Construction of Towering Structure Based on Cloud Matter–Element Coupled Model
18
作者 Yingxue Sang Fengxia Han +2 位作者 Qing Liu Liang Qiao Shouxi Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1973-1998,共26页
Rapid urbanization has led to a surge in the number of towering structures,and overturning is widely used because it can better accommodate the construction of shaped structures such as variable sections.The complexit... Rapid urbanization has led to a surge in the number of towering structures,and overturning is widely used because it can better accommodate the construction of shaped structures such as variable sections.The complexity of the construction process makes the construction risk have certain randomness,so this paper proposes a cloudbased coupled matter-element model to address the ambiguity and randomness in the safety risk assessment of overturning construction of towering structures.In the pretended model,the digital eigenvalues of the cloud model are used to replace the eigenvalues in the matter–element basic element,and calculate the cloud correlation of the risk assessment metrics through the correlation algorithm of the cloud model to build the computational model.Meanwhile,the improved hierarchical analysis method based on the cloud model is used to determine the weight of the index.The comprehensive evaluation scores of the evaluation event are then obtained through the weighted average method,and the safety risk level is determined accordingly.Through empirical analysis,(1)the improved hierarchical analysis method based on the cloud model can incorporate the data of multiple decisionmakers into the calculation formula to determine theweights,which makes the assessment resultsmore credible;(2)the evaluation results of the cloud-basedmatter-element coupledmodelmethod are basically consistent with those of the other two commonly used methods,and the confidence factor is less than 0.05,indicating that the cloudbased physical element coupled model method is reasonable and practical for towering structure overturning;(3)the cloud-based coupled element model method,which confirms the reliability of risk level by performing Spearman correlation on comprehensive assessment scores,can provide more comprehensive information of instances compared with other methods,and more comprehensively reflects the fuzzy uncertainty relationship between assessment indexes,which makes the assessment results more realistic,scientific and reliable. 展开更多
关键词 cloud matter-element model clouded hierarchical analysis method towering structure overturning formwork construction risk assessment
下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
19
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 Third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
下载PDF
Health Data Availability Protection:Delta-XOR-Relay Data Update in Erasure-Coded Cloud Storage Systems
20
作者 Yifei Xiao Shijie Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期169-185,共17页
To achieve the high availability of health data in erasure-coded cloud storage systems,the data update performance in erasure coding should be continuously optimized.However,the data update performance is often bottle... To achieve the high availability of health data in erasure-coded cloud storage systems,the data update performance in erasure coding should be continuously optimized.However,the data update performance is often bottlenecked by the constrained cross-rack bandwidth.Various techniques have been proposed in the literature to improve network bandwidth efficiency,including delta transmission,relay,and batch update.These techniques were largely proposed individually previously,and in this work,we seek to use them jointly.To mitigate the cross-rack update traffic,we propose DXR-DU which builds on four valuable techniques:(i)delta transmission,(ii)XOR-based data update,(iii)relay,and(iv)batch update.Meanwhile,we offer two selective update approaches:1)data-deltabased update,and 2)parity-delta-based update.The proposed DXR-DU is evaluated via trace-driven local testbed experiments.Comprehensive experiments show that DXR-DU can significantly improve data update throughput while mitigating the cross-rack update traffic. 展开更多
关键词 Data availability health data data update cloud storage IoT
下载PDF
上一页 1 2 139 下一页 到第
使用帮助 返回顶部