期刊文献+
共找到5,356篇文章
< 1 2 250 >
每页显示 20 50 100
LCD面板C/FOG工艺制造虚拟计量方法研究
1
作者 刘暾东 黄智斌 +2 位作者 高凤强 郑鹏 谢玉练 《仪器仪表学报》 EI CAS CSCD 北大核心 2024年第1期16-25,共10页
针对液晶显示器(LCD)面板的“Chip/FPC on Glass”(C/FOG)工艺生产制造过程中存在的计量延迟大、生产异常无法提前预测的问题,本文提出一种基于神经网络的C/FOG工艺生产制造虚拟计量方法。该方法利用生产机台上的传感器采集生产过程中... 针对液晶显示器(LCD)面板的“Chip/FPC on Glass”(C/FOG)工艺生产制造过程中存在的计量延迟大、生产异常无法提前预测的问题,本文提出一种基于神经网络的C/FOG工艺生产制造虚拟计量方法。该方法利用生产机台上的传感器采集生产过程中的过程状态数据,构建基于多尺度一维卷积及通道注意力模型(MS1DC-CA)的虚拟计量模型。通过多个尺度的卷积核提取不同尺度范围内的状态数据特征。在对含有缺失值的原始数据预处理中,提出了基于粒子群算法改进的K近邻填补方法(PSO-KNN Imputation)进行缺失值填充,保留特征的同时,减少因填充值引入的干扰。最后在实际生产采集的数据上进行实验对比分析,实际不良率主要集中在0.1%~0.5%,该虚拟计量模型的拟合均方误差为0.397 7‱,低于其他现有拟合模型,在平均绝对误差、对称平均绝对百分比误差和拟合优度3种评价指标下也均优于其他现有的拟合模型,具有良好的预测性能。 展开更多
关键词 C/fog工艺 虚拟计量 缺失值填充 多尺度一维卷积 通道注意力
下载PDF
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT:A federated learning approach
2
作者 Mohamed Abdel-Basset Hossam Hawash +2 位作者 Nour Moustafa Imran Razzak Mohamed Abd Elfattah 《Digital Communications and Networks》 SCIE CSCD 2024年第2期404-415,共12页
With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber services.The complexity and heterogeneity of smart cities have become v... With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber services.The complexity and heterogeneity of smart cities have become vulnerable to sophisticated cyber-attacks,especially privacy-related attacks such as inference and data poisoning ones.Federated Learning(FL)has been regarded as a hopeful method to enable distributed learning with privacypreserved intelligence in IoT applications.Even though the significance of developing privacy-preserving FL has drawn as a great research interest,the current research only concentrates on FL with independent identically distributed(i.i.d)data and few studies have addressed the non-i.i.d setting.FL is known to be vulnerable to Generative Adversarial Network(GAN)attacks,where an adversary can presume to act as a contributor participating in the training process to acquire the private data of other contributors.This paper proposes an innovative Privacy Protection-based Federated Deep Learning(PP-FDL)framework,which accomplishes data protection against privacy-related GAN attacks,along with high classification rates from non-i.i.d data.PP-FDL is designed to enable fog nodes to cooperate to train the FDL model in a way that ensures contributors have no access to the data of each other,where class probabilities are protected utilizing a private identifier generated for each class.The PP-FDL framework is evaluated for image classification using simple convolutional networks which are trained using MNIST and CIFAR-10 datasets.The empirical results have revealed that PF-DFL can achieve data protection and the framework outperforms the other three state-of-the-art models with 3%–8%as accuracy improvements. 展开更多
关键词 Privacy preservation Federated learning Deep learning fog computing Smart cities
下载PDF
Joint Optimization of Energy Consumption and Network Latency in Blockchain-Enabled Fog Computing Networks
3
作者 Huang Xiaoge Yin Hongbo +3 位作者 Cao Bin Wang Yongsheng Chen Qianbin Zhang Jie 《China Communications》 SCIE CSCD 2024年第4期104-119,共16页
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap... Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature. 展开更多
关键词 blockchain energy consumption fog computing network Internet of Things LATENCY
下载PDF
A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing
4
作者 Hawazen Alzahrani Tarek Sheltami +2 位作者 Abdulaziz Barnawi Muhammad Imam Ansar Yaser 《Computers, Materials & Continua》 SCIE EI 2024年第9期4703-4728,共26页
The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and th... The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and threats.Many interesting Intrusion Detection Systems(IDSs)are presented based on machine learning(ML)techniques to overcome this problem.Given the resource limitations of fog computing environments,a lightweight IDS is essential.This paper introduces a hybrid deep learning(DL)method that combines convolutional neural networks(CNN)and long short-term memory(LSTM)to build an energy-aware,anomaly-based IDS.We test this system on a recent dataset,focusing on reducing overhead while maintaining high accuracy and a low false alarm rate.We compare CICIoT2023,KDD-99 and NSL-KDD datasets to evaluate the performance of the proposed IDS model based on key metrics,including latency,energy consumption,false alarm rate and detection rate metrics.Our findings show an accuracy rate over 92%and a false alarm rate below 0.38%.These results demonstrate that our system provides strong security without excessive resource use.The practicality of deploying IDS with limited resources is demonstrated by the successful implementation of IDS functionality on a Raspberry Pi acting as a Fog node.The proposed lightweight model,with a maximum power consumption of 6.12 W,demonstrates its potential to operate effectively on energy-limited devices such as low-power fog nodes or edge devices.We prioritize energy efficiency whilemaintaining high accuracy,distinguishing our scheme fromexisting approaches.Extensive experiments demonstrate a significant reduction in false positives,ensuring accurate identification of genuine security threats while minimizing unnecessary alerts. 展开更多
关键词 Intrusion detection fog computing CNN LSTM energy consumption
下载PDF
Target Detection Algorithm in Foggy Scenes Based on Dual Subnets
5
作者 Yuecheng Yu Liming Cai +3 位作者 Anqi Ning Jinlong Shi Xudong Chen Shixin Huang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1915-1931,共17页
Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the ima... Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the image by the universal detection network.Thus,a dual subnet based on multi-task collaborative training(DSMCT)is proposed in this paper.Firstly,in the training phase,the Gated Context Aggregation Network(GCANet)is used as the supervisory network of YOLOX to promote the extraction of clean information in foggy scenes.In the test phase,only the YOLOX branch needs to be activated to ensure the detection speed of the model.Secondly,the deformable convolution module is used to improve GCANet to enhance the model’s ability to capture details of non-homogeneous fog.Finally,the Coordinate Attention mechanism is introduced into the Vision Transformer and the backbone network of YOLOX is redesigned.In this way,the feature extraction ability of the network for deep-level information can be enhanced.The experimental results on artificial fog data set FOG_VOC and real fog data set RTTS show that the map value of DSMCT reached 86.56%and 62.39%,respectively,which was 2.27%and 4.41%higher than the current most advanced detection model.The DSMCT network has high practicality and effectiveness for target detection in real foggy scenes. 展开更多
关键词 Target detection fog target detection YOLOX twin network multi-task learning
下载PDF
Enhanced Hybrid Equilibrium Strategy in Fog-Cloud Computing Networks with Optimal Task Scheduling
6
作者 Muchang Rao Hang Qin 《Computers, Materials & Continua》 SCIE EI 2024年第5期2647-2672,共26页
More devices in the Intelligent Internet of Things(AIoT)result in an increased number of tasks that require low latency and real-time responsiveness,leading to an increased demand for computational resources.Cloud com... More devices in the Intelligent Internet of Things(AIoT)result in an increased number of tasks that require low latency and real-time responsiveness,leading to an increased demand for computational resources.Cloud computing’s low-latency performance issues in AIoT scenarios have led researchers to explore fog computing as a complementary extension.However,the effective allocation of resources for task execution within fog environments,characterized by limitations and heterogeneity in computational resources,remains a formidable challenge.To tackle this challenge,in this study,we integrate fog computing and cloud computing.We begin by establishing a fog-cloud environment framework,followed by the formulation of a mathematical model for task scheduling.Lastly,we introduce an enhanced hybrid Equilibrium Optimizer(EHEO)tailored for AIoT task scheduling.The overarching objective is to decrease both the makespan and energy consumption of the fog-cloud system while accounting for task deadlines.The proposed EHEO method undergoes a thorough evaluation against multiple benchmark algorithms,encompassing metrics likemakespan,total energy consumption,success rate,and average waiting time.Comprehensive experimental results unequivocally demonstrate the superior performance of EHEO across all assessed metrics.Notably,in the most favorable conditions,EHEO significantly diminishes both the makespan and energy consumption by approximately 50%and 35.5%,respectively,compared to the secondbest performing approach,which affirms its efficacy in advancing the efficiency of AIoT task scheduling within fog-cloud networks. 展开更多
关键词 Artificial intelligence of things fog computing task scheduling equilibrium optimizer differential evaluation algorithm local search
下载PDF
Hybrid Approach for Cost Efficient Application Placement in Fog-Cloud Computing Environments
7
作者 Abdulelah Alwabel Chinmaya Kumar Swain 《Computers, Materials & Continua》 SCIE EI 2024年第6期4127-4148,共22页
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.How... Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.However,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud computing.An approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing costs.This approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of applications.In this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing cost.We consider four cost-types for application deployment:Computation,communication,energy consumption,and violations.The proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the system.An extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art approaches.The results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost. 展开更多
关键词 Placement mechanism application module placement fog computing cloud computing genetic algorithm flamingo search algorithm
下载PDF
Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance
8
作者 Linghong Kuang Wenlong Shi Jing Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第8期3193-3219,共27页
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers.Howe... The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers.However,with the advancement of information and communication technology,new security and privacy challenges have emerged for AMI.To address these challenges and enhance the security and privacy of user data in the smart grid,a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance(HPPM-AMICFA)is proposed in this paper.The proposed model integrates cloud and fog computing with hierarchical threshold encryption,offering a flexible and efficient privacy protection solution that significantly enhances data security in the smart grid.The methodology involves setting user protection levels by processing missing data and utilizing fuzzy comprehensive analysis to evaluate user importance,thereby assigning appropriate protection levels.Furthermore,a hierarchical threshold encryption algorithm is developed to provide differentiated protection strategies for fog nodes based on user IDs,ensuring secure aggregation and encryption of user data.Experimental results demonstrate that HPPM-AMICFA effectively resists various attack strategies while minimizing time costs,thereby safeguarding user data in the smart grid. 展开更多
关键词 AMI cloud and fog assistance fuzzy comprehensive analysis hierarchical threshold encryption
下载PDF
Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture
9
作者 Prasanna Kumar Kannughatta Ranganna Siddesh Gaddadevara Matt +2 位作者 Chin-Ling Chen Ananda Babu Jayachandra Yong-Yuan Deng 《Computers, Materials & Continua》 SCIE EI 2024年第8期2557-2578,共22页
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications... In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications.Therefore,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing environments.Effective task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog nodes.This process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource bottlenecks.In this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local exploitation.This balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization algorithms.The FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response time.In relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks. 展开更多
关键词 fog computing fractional selectivity approach particle swarm optimization algorithm task scheduling virtual machine allocation
下载PDF
FOG Bonding 电阻降低方案及机理探究
10
作者 韩鑫 王晓杰 +3 位作者 唐乌力吉白尔 谢建云 薛海林 闫亮 《中国科技纵横》 2024年第5期113-115,共3页
近年来,中小尺寸产品客户端上线TP问题频发,其中有一类TP不良由FOG Bonding电阻异常偏大导致,但二次因未知。FOG堆叠结构为PNL+ACF(异方性导电胶)+FPC,但PNL、FPC为走线电阻,本身电阻较小(<1Ω),故不考虑此影响。基于此,重点研究FOG ... 近年来,中小尺寸产品客户端上线TP问题频发,其中有一类TP不良由FOG Bonding电阻异常偏大导致,但二次因未知。FOG堆叠结构为PNL+ACF(异方性导电胶)+FPC,但PNL、FPC为走线电阻,本身电阻较小(<1Ω),故不考虑此影响。基于此,重点研究FOG Bonding接触电阻。首先建立机理模型并进行探究,然后通过调整FOG Bonding参数,使ACF导电粒子的爆破状态和胶体的固化状态达到最优,最终降低电阻。 展开更多
关键词 fog Bonding 接触电阻 ACF爆破 ACF固化
下载PDF
Production of Artificial Fog in the PAVIN Fog and Rain Platform: In Search of Big Droplets Fog
11
作者 Pierre Duthon Mickaël Ferreira Fernandes Sébastien Liandrat 《Atmospheric and Climate Sciences》 2024年第1期42-61,共20页
In fog, visibility is reduced. This reduction in visibility is measured by the meteorological optical range (MOR), which is important for studying human perception and various sensors in foggy conditions. The Cerema P... In fog, visibility is reduced. This reduction in visibility is measured by the meteorological optical range (MOR), which is important for studying human perception and various sensors in foggy conditions. The Cerema PAVIN Fog & Rain platform is capable of producing calibrated fog in order to better analyses it and understand its consequences. The problem is that the droplets produced by the platform are not large enough to resemble real fog. This can have a major impact on measurements since the interaction between electromagnetic waves and fog depends on the wavelength and diameter of the droplets. To remedy this, Cerema is building a new platform with new equipment capable of generating fog. This study analyses different nozzles and associated usage parameters such as the type of water used and the pressure used. The aim is to select the best nozzle with the associated parameters for producing large-diameter droplets and therefore more realistic fog. 展开更多
关键词 fog Physical Simulation Droplets Size Distribution Meteorological Optical Range
下载PDF
Examining the Experiences and Challenges of Haze-Fog Governance in China
12
作者 Renrui Wang 《Journal of Geoscience and Environment Protection》 2024年第4期45-58,共14页
With the rapid development of industrialisation and urbanisation, China is facing the challenge of severe HF (Haze-Fog) pollution. This essay compares the advantages and disadvantages of China’s HF management and sum... With the rapid development of industrialisation and urbanisation, China is facing the challenge of severe HF (Haze-Fog) pollution. This essay compares the advantages and disadvantages of China’s HF management and summarizes the important lessons China can teach the rest of the world about applying this tactic. China’s capabilities in the digital economy, National Innovation Demonstration Zones, and urban innovation systems are examined in this article, along with its shortcomings in information mechanisms and pollution sources. This essay also summarizes China’s achievements, particularly regarding local autonomy. The essay goes on to say, however, that China is probably going to be under more pressure to manage HF in the future, both in terms of long-term solutions and the economy. 展开更多
关键词 Haze-fog Control Digital Economy National Innovation Demonstration Zones Local Autonomy
下载PDF
YOLO-FOG雾天目标检测算法
13
作者 谷芳 朱凯 《装备机械》 2024年第2期1-4,30,共5页
雾天条件下,图像质量较低,导致目标检测存在难度。传统的YOLOv5s算法可以在雾天环境中进行检测,但是检测速度慢。对此,提出一种名为YOLO-FOG的雾天目标检测算法,可以提高雾天环境中的检测速度。这一算法在主干网络部分使用RepVGG结构,... 雾天条件下,图像质量较低,导致目标检测存在难度。传统的YOLOv5s算法可以在雾天环境中进行检测,但是检测速度慢。对此,提出一种名为YOLO-FOG的雾天目标检测算法,可以提高雾天环境中的检测速度。这一算法在主干网络部分使用RepVGG结构,减小计算量,提高特征表示能力,加快推理速度,以提高检测的实时性。试验结果表明,针对RTTS数据集,自行车、公共汽车、汽车、摩托车、行人五类目标的平均精度依次可以达到81.72%、79.99%、89.24%、73.46%、83.34%,并且识别时间仅为每张0.065 s。YOLO-FOG雾天目标检测算法兼顾准确性和实时性,具有良好的应用前景。 展开更多
关键词 目标 检测 算法
下载PDF
Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map 被引量:1
14
作者 K.Priyadarsini Arun Kumar Sivaraman +1 位作者 Abdul Quadir Md Areej Malibari 《Computers, Materials & Continua》 SCIE EI 2023年第3期6703-6717,共15页
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of data.The major concerns in this domain are security and privacy.Therefore,attaining a reliable level of... With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of data.The major concerns in this domain are security and privacy.Therefore,attaining a reliable level of confidentiality in the fog computing environment is a pivotal task.Among different types of data stored in the fog,the 3D point and mesh fog data are increasingly popular in recent days,due to the growth of 3D modelling and 3D printing technologies.Hence,in this research,we propose a novel scheme for preserving the privacy of 3D point and mesh fog data.Chaotic Cat mapbased data encryption is a recently trending research area due to its unique properties like pseudo-randomness,deterministic nature,sensitivity to initial conditions,ergodicity,etc.To boost encryption efficiency significantly,in this work,we propose a novel Chaotic Cat map.The sequence generated by this map is used to transform the coordinates of the fog data.The improved range of the proposed map is depicted using bifurcation analysis.The quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate entropy.We also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical attack.The experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature. 展开更多
关键词 Chaotic cat map fog computing ENCRYPTION 3D point fog 3D mesh
下载PDF
Summer Arctic sea fog 被引量:1
15
作者 Xie Simei, Xue Zhenhe, Jiang Dezhong, Zou Bin, Qu Shaohou (1. National Research Center for Marine Environment Forecasts, Beijing 100081, China 2. Institute of Atmospheric Physics, Chinese Academy of Sciences, Beijing 100029, China) 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2001年第2期183-196,共14页
Synchronous or quasi-synchronous sea-land-air observations were conducted using advanced sea ice, atmospheric and marine instruments during China's First Arctic Expedition. Expedition.Based on the Precious data f... Synchronous or quasi-synchronous sea-land-air observations were conducted using advanced sea ice, atmospheric and marine instruments during China's First Arctic Expedition. Expedition.Based on the Precious data from the expedition, it was found that in the Arctic Ocean, most part of which is covered with ice or is mixed with ice, various kinds of sea fog formed such as advection fog, radiation fog and vapor fog. Each kind he its own characteristic and mechanics of creation. In the southern part of the Arctic Ocean, due to the sufficient warm and wet flow there, it is favorable for advection fog to form, which is dense and lasts a long time. On ice cap or vast floating ice, due to the strong radiation cooling effect, stable radiating fog is likely to form. In floating ice area there forms vapor fog with the appearance of masses of vapor from a boiling pot, which is different from short-lasting land fog. The study indicates that the reason why there are many kinds of sea fog form in the Arctic Ocean is because of the complicated cushion and the consequent sea-air interaction caused by the sea ice distribution and its unique physical characteristics. Sea fog is the atmospheric phenomenon of sea-air heat exchange. Especially, due to the high albedo of ice and snow surface, it is diffcult to absorb great amount of solar radiation during the polar days. Besides, ice is a poor conductor of heat; it blocks the sea-air heat exchange. The sea-air exchange is active in floating ice area where the ice is broken. The sea sends heat to the atmosphere in form of latent heat; vapor fog is a way of sea-air heat exchange influencing the climate and an indicator of the extent of the exchange. The study also indicates that the sea also transports heat to the atmosophere in form of sensible heat when vapor fog occurs. 展开更多
关键词 Arctic sea fog vapor fog radiation fog advection fog mechanism of the creation of sea fog
下载PDF
Fog Research in China:An Overview 被引量:33
16
作者 牛生杰 陆春松 +2 位作者 于华英 赵丽娟 吕晶晶 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2010年第3期639-662,共24页
Fog can adversely affect human activity directly and indirectly, resulting in large losses both in terms of the local economy and lives. Much effort has been devoted to studies of fog across many areas of China, and i... Fog can adversely affect human activity directly and indirectly, resulting in large losses both in terms of the local economy and lives. Much effort has been devoted to studies of fog across many areas of China, and in that context this paper aims to summarize climatic characteristics and review fog field experiments and their major results relating to fog mechanisms, physical properties and chemical characteristics. Progress in the application of remote sensing techniques and numerical simulation in fog research are also discussed. In particular, the effects of urbanization and industrialization on fog are highlighted. To end, perspectives on future fog research are outlined. The goal of this review paper is to introduce fog research in China to the global academic community and thus promote international collaboration on fog research. This is important because most papers on fog in China are published in Chinese, which are unreadable for the vast majority of non-Chinese researchers. 展开更多
关键词 fog climatic characteristics fog observations fog mechanisms physicochemical characteristics remote sensing fog modeling
下载PDF
Blockchain-Enabled Secure and Privacy-Preserving Data Aggregation for Fog-Based ITS 被引量:1
17
作者 Siguang Chen Li Yang +1 位作者 Yanhang Shi Qian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第5期3781-3796,共16页
As an essential component of intelligent transportation systems(ITS),electric vehicles(EVs)can store massive amounts of electric power in their batteries and send power back to a charging station(CS)at peak hours to b... As an essential component of intelligent transportation systems(ITS),electric vehicles(EVs)can store massive amounts of electric power in their batteries and send power back to a charging station(CS)at peak hours to balance the power supply and generate profits.However,when the system collects the corresponding power data,several severe security and privacy issues are encountered.The identity and private injection data may be maliciously intercepted by network attackers and be tampered with to damage the services of ITS and smart grids.Existing approaches requiring high computational overhead render them unsuitable for the resource-constrained Internet of Things(IoT)environment.To address above problems,this paper proposes a blockchain-enabled secure and privacy-preserving data aggregation scheme for fog-based ITS.First,a fog computing and blockchain co-aware aggregation framework of power injection data is designed,which provides strong support for ITS to achieve secure and efficient power injection.Second,Paillier homomorphic encryption,the batch aggregation signature mechanism and a Bloom filter are effectively integrated with efficient aggregation of power injection data with security and privacy guarantees.In addition,the fine-grained homomorphic aggregation is designed for power injection data generated by all EVs,which provides solid data support for accurate power dispatching and supply management in ITS.Experiments show that the total computational cost is significantly reduced in the proposed scheme while providing security and privacy guarantees.The proposed scheme is more suitable for ITS with latency-sensitive applications and is also adapted to deploying devices with limited resources. 展开更多
关键词 Blockchain fog computing security PRIVACY-PRESERVING ITS
下载PDF
Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT 被引量:1
18
作者 G.Ravikumar K.Venkatachalam +2 位作者 Mohammed A.AlZain Mehedi Masud Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期945-959,共15页
Sleep apnea syndrome(SAS)is a breathing disorder while a person is asleep.The traditional method for examining SAS is Polysomnography(PSG).The standard procedure of PSG requires complete overnight observation in a lab... Sleep apnea syndrome(SAS)is a breathing disorder while a person is asleep.The traditional method for examining SAS is Polysomnography(PSG).The standard procedure of PSG requires complete overnight observation in a laboratory.PSG typically provides accurate results,but it is expensive and time consuming.However,for people with Sleep apnea(SA),available beds and laboratories are limited.Resultantly,it may produce inaccurate diagnosis.Thus,this paper proposes the Internet of Medical Things(IoMT)framework with a machine learning concept of fully connected neural network(FCNN)with k-near-est neighbor(k-NN)classifier.This paper describes smart monitoring of a patient’s sleeping habit and diagnosis of SA using FCNN-KNN+average square error(ASE).For diagnosing SA,the Oxygen saturation(SpO2)sensor device is popularly used for monitoring the heart rate and blood oxygen level.This diagnosis information is securely stored in the IoMT fog computing network.Doctors can care-fully monitor the SA patient remotely on the basis of sensor values,which are efficiently stored in the fog computing network.The proposed technique takes less than 0.2 s with an accuracy of 95%,which is higher than existing models. 展开更多
关键词 Sleep apnea POLYSOMNOGRAPHY IOMT fog node security neural network KNN signature encryption sensor
下载PDF
Recent Observations and Modeling Study About Sea Fog over the Yellow Sea and East China Sea 被引量:1
19
作者 ZHANG Suping 《Journal of Ocean University of China》 SCIE CAS 2012年第4期465-472,共8页
This review presents some of the latest achievements in sea fog research,including fog climatology,fog structure in the marine atmospheric boundary layer,and numerical simulations and forecasting of fog.With the devel... This review presents some of the latest achievements in sea fog research,including fog climatology,fog structure in the marine atmospheric boundary layer,and numerical simulations and forecasting of fog.With the development of atmospheric observational techniques and equipments,new facts about sea fog are revealed.The mechanisms involved in the formation,development and dissipation of sea fog are further explored with the help of advanced atmospheric models. 展开更多
关键词 sea fog climatology sea fog structure atmospheric boundary layer sea fog observation sea fog simulation
下载PDF
Cache in fog computing design,concepts,contributions,and security issues in machine learning prospective
20
作者 Muhammad Ali Naeem Yousaf Bin Zikria +3 位作者 Rashid Ali Usman Tariq Yahui Meng Ali Kashif Bashir 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1033-1052,共20页
The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promisi... The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promising technologies that can improve overall communication performance.It brings on-demand services proximate to the end devices and delivers the requested data in a short time.Fog computing faces several issues such as latency,bandwidth,and link utilization due to limited resources and the high processing demands of end devices.To this end,fog caching plays an imperative role in addressing data dissemination issues.This study provides a comprehensive discussion of fog computing,Internet of Things(IoTs)and the critical issues related to data security and dissemination in fog computing.Moreover,we determine the fog-based caching schemes and contribute to deal with the existing issues of fog computing.Besides,this paper presents a number of caching schemes with their contributions,benefits,and challenges to overcome the problems and limitations of fog computing.We also identify machine learning-based approaches for cache security and management in fog computing,as well as several prospective future research directions in caching,fog computing,and machine learning. 展开更多
关键词 Internet of things Cloud computing fog computing CACHING LATENCY
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部