期刊文献+
共找到15,501篇文章
< 1 2 250 >
每页显示 20 50 100
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
1
作者 Ke Zhijie Xie Yong +1 位作者 Syed Hamad Shirazi Li Haifeng 《China Communications》 2025年第4期202-222,共21页
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machin... Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machine learning applications in the Internet of Things(IoT).However,implementing FL across large-scale distributed fog networks presents significant challenges in maintaining privacy,preventing collusion attacks,and ensuring robust data aggregation.To address these challenges,we propose an Efficient Privacy-preserving and Robust Federated Learning(EPRFL)scheme for fog computing scenarios.Specifically,we first propose an efficient secure aggregation strategy based on the improved threshold homomorphic encryption algorithm,which is not only resistant to model inference and collusion attacks,but also robust to fog node dropping.Then,we design a dynamic gradient filtering method based on cosine similarity to further reduce the communication overhead.To minimize training delays,we develop a dynamic task scheduling strategy based on comprehensive score.Theoretical analysis demonstrates that EPRFL offers robust security and low latency.Extensive experimental results indicate that EPRFL outperforms similar strategies in terms of privacy preserving,model performance,and resource efficiency. 展开更多
关键词 federated learning fog computing internet of things privacy-preserving ROBUSTNESS
在线阅读 下载PDF
A Study on Technology Application and Performance of Small and Medium-sized Enterprises in the Context of Cloud Computing Application-A Case Study of Hotel Industry in Henan,China
2
作者 Zhang Hui Alireza Mohammadi 《Journal of Sustainable Business and Economics》 2024年第2期69-75,共7页
This paper examines how the adoption of cloud computing affects the relationship between the technical and environmental capabilities of small and medium-sized enterprises(SMEs)in the tourism industry in Henan Provinc... This paper examines how the adoption of cloud computing affects the relationship between the technical and environmental capabilities of small and medium-sized enterprises(SMEs)in the tourism industry in Henan Province,China,thereby promoting the stable and sustainable development of the tourism industry,combining the laws of tourism market development,vigorously constructing a smart tourism project,guiding tourism cloud service providers to strengthen the cooperation and contact with the market’s tourism enterprises,introducing and utilizing cloud computing technology,optimizing and improving the functions of various tourism services of the enterprises,and enhancing the processing and analysis of enterprise-related data to provide tourism information.Strengthen the processing and analysis of enterprise-related data to provide tourism information,and further study the adoption of cloud computing and its impact on small and medium-sized enterprises(SMEs)in terms of technology and business environment knowledge,so as to make the best enterprise management decisions and realize the overall enhancement of the enterprise’s tourism brand value. 展开更多
关键词 SMES Cloud computing technology Adoption Performance Henan Hotels
在线阅读 下载PDF
Research on the Application of Big Data and Cloud Computing Technology in Smart Campus
3
作者 Shengtao Zhou 《Journal of Electronic Research and Application》 2024年第5期6-11,共6页
The current education field is experiencing an innovation driven by big data and cloud technologies,and these advanced technologies play a central role in the construction of smart campuses.Big data technology has a w... The current education field is experiencing an innovation driven by big data and cloud technologies,and these advanced technologies play a central role in the construction of smart campuses.Big data technology has a wide range of applications in student learning behavior analysis,teaching resource management,campus safety monitoring,and decision support,which improves the quality of education and management efficiency.Cloud computing technology supports the integration,distribution,and optimal use of educational resources through cloud resource sharing,virtual classrooms,intelligent campus management systems,and Infrastructure-as-a-Service(IaaS)models,which reduce costs and increase flexibility.This paper comprehensively discusses the practical application of big data and cloud computing technologies in smart campuses,showing how these technologies can contribute to the development of smart campuses,and laying the foundation for the future innovation of education models. 展开更多
关键词 Big data Cloud computing technology Smart campus APPLICATION
在线阅读 下载PDF
Merging computational intelligence and wearable technologies for adolescent idiopathic scoliosis: a quest for multiscale modelling, long-term monitoring and personalized treatment
4
作者 Chun-Zhi Yi Xiao-Lei Sun 《Medical Data Mining》 2025年第2期21-30,共10页
Adolescent idiopathic scoliosis(AIS)is a dynamic progression during growth,which requires long-term collaborations and efforts from clinicians,patients and their families.It would be beneficial to have a precise inter... Adolescent idiopathic scoliosis(AIS)is a dynamic progression during growth,which requires long-term collaborations and efforts from clinicians,patients and their families.It would be beneficial to have a precise intervention based on cross-scale understandings of the etiology,real-time sensing and actuating to enable early detection,screening and personalized treatment.We argue that merging computational intelligence and wearable technologies can bridge the gap between the current trajectory of the techniques applied to AIS and this vision.Wearable technologies such as inertial measurement units(IMUs)and surface electromyography(sEMG)have shown great potential in monitoring spinal curvature and muscle activity in real-time.For instance,IMUs can track the kinematics of the spine during daily activities,while sEMG can detect asymmetric muscle activation patterns that may contribute to scoliosis progression.Computational intelligence,particularly deep learning algorithms,can process these multi-modal data streams to identify early signs of scoliosis and adapt treatment strategies dynamically.By using their combination,we can find potential solutions for a better understanding of the disease,a more effective and intelligent way for treatment and rehabilitation. 展开更多
关键词 adolescent idiopathic scoliosis computational intelligence wearable technologies
暂未订购
Hydrodynamic performance of bionic streamlined remotely operated vehicle based on CFD and overlapping mesh technology
5
作者 Bin Guan Junjie Li 《Theoretical & Applied Mechanics Letters》 2025年第3期246-256,共11页
To meet the intelligent detection needs of underwater defects in large hydropower stations,the hydrodynamic performance of a bionic streamlined remotely operated vehicle containing a thruster protective net structure ... To meet the intelligent detection needs of underwater defects in large hydropower stations,the hydrodynamic performance of a bionic streamlined remotely operated vehicle containing a thruster protective net structure is numerically simulated via computational fluid dynamics and overlapping mesh technology.The results show that the entity model generates greater hydrodynamic force during steady motion,whereas the square net model experiences greater force and moment during unsteady motion.The lateral and vertical force coefficients of the entity model are 4.32 and 3.13 times greater than those of the square net model in the oblique towing test simulation.The square net model also offers better static and dynamic stability,with a 24.5%increase in dynamic stability,achieving the highest lift-to-drag ratio at attack angles of 6°∼8°.This research provides valuable insights for designing and controlling underwater defect detection vehicles for large hydropower stations. 展开更多
关键词 Underwater defect detection Remotely operated vehicle Hydrodynamic performance computational fluid dynamics Overlapping mesh technology
在线阅读 下载PDF
Research on the Practical Strategy of 5G Mobile Communication Technology in Power Communication
6
作者 Wanshen Peng 《Journal of Electronic Research and Application》 2025年第3期119-124,共6页
With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communic... With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communication is analyzed.In this study,5G technology features,application principles,and practical strategies are discussed,and methods such as network slicing,customized deployment,edge computing collaborative application,communication equipment integration and upgrading,and multi-technology collaboration and complementation are proposed.It aims to effectively improve the efficiency,reliability,and security of power communication,solve the problem that traditional communication technology is difficult to meet the diversified needs of power business,and achieve the effect of optimizing the power communication network and supporting the intelligent development of the power system. 展开更多
关键词 5G mobile communication technology Electric power communication Network slicing Edge computing Multi-technology collaboration
在线阅读 下载PDF
An ab initio dataset of size-dependent effective thermal conductivity for advanced technology transistors
7
作者 Han Xie Ru Jia +6 位作者 Yonglin Xia Lei Li Yue Hu Jiaxuan Xu Yufei Sheng Yuanyuan Wang Hua Bao 《Chinese Physics B》 2025年第4期125-130,共6页
As the size of transistors shrinks and power density increases,thermal simulation has become an indispensable part of the device design procedure.However,existing works for advanced technology transistors use simplifi... As the size of transistors shrinks and power density increases,thermal simulation has become an indispensable part of the device design procedure.However,existing works for advanced technology transistors use simplified empirical models to calculate effective thermal conductivity in the simulations.In this work,we present a dataset of size-dependent effective thermal conductivity with electron and phonon properties extracted from ab initio computations.Absolute in-plane and cross-plane thermal conductivity data of eight semiconducting materials(Si,Ge,GaN,AlN,4H-SiC,GaAs,InAs,BAs)and four metallic materials(Al,W,TiN,Ti)with the characteristic length ranging from 5 nm to 50 nm have been provided.Besides the absolute value,normalized effective thermal conductivity is also given,in case it needs to be used with updated bulk thermal conductivity in the future. 展开更多
关键词 size-dependent effective thermal conductivity advanced technology transistors ab initio computations micro/nano-scale heat transfer
原文传递
A Privacy-Preserving Mechanism Based on Local Differential Privacy in Edge Computing 被引量:11
8
作者 Mengnan Bi Yingjie Wang +1 位作者 Zhipeng Cai Xiangrong Tong 《China Communications》 SCIE CSCD 2020年第9期50-65,共16页
With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT t... With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT terminal devices are also the important bottlenecks that would restrict the application of blockchain,but edge computing could solve this problem.The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity.However,user data in edge computing is usually stored and processed in some honest-but-curious authorized entities,which leads to the leakage of users’privacy information.In order to solve these problems,this paper proposes a location data collection method that satisfies the local differential privacy to protect users’privacy.In this paper,a Voronoi diagram constructed by the Delaunay method is used to divide the road network space and determine the Voronoi grid region where the edge nodes are located.A random disturbance mechanism that satisfies the local differential privacy is utilized to disturb the original location data in each Voronoi grid.In addition,the effectiveness of the proposed privacy-preserving mechanism is verified through comparison experiments.Compared with the existing privacy-preserving methods,the proposed privacy-preserving mechanism can not only better meet users’privacy needs,but also have higher data availability. 展开更多
关键词 Io T edge computing local differential privacy Voronoi diagram privacy-preserving
在线阅读 下载PDF
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
9
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 Cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
在线阅读 下载PDF
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems 被引量:6
10
作者 Jiale Zhang Yue Liu +3 位作者 Di Wu Shuai Lou Bing Chen Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期981-989,共9页
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra... Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy. 展开更多
关键词 Federated learning Edge computing privacy-preserving Verifiable aggregation Homomorphic cryptosystem
在线阅读 下载PDF
Research on the big data feature mining technology based on the cloud computing
11
作者 WANG Yun 《International English Education Research》 2019年第3期52-54,共3页
The cloud computing platform has the functions of efficiently allocating the dynamic resources, generating the dynamic computing and storage according to the user requests, and providing the good platform for the big ... The cloud computing platform has the functions of efficiently allocating the dynamic resources, generating the dynamic computing and storage according to the user requests, and providing the good platform for the big data feature analysis and mining. The big data feature mining in the cloud computing environment is an effective method for the elficient application of the massive data in the information age. In the process of the big data mining, the method o f the big data feature mining based on the gradient sampling has the poor logicality. It only mines the big data features from a single-level perspective, which reduces the precision of the big data feature mining. 展开更多
关键词 CLOUD computing BIG data features MINING technology model method
在线阅读 下载PDF
Analysis on Key Technology of "Cloud Computing"
12
作者 Wang Bei 《International Journal of Technology Management》 2014年第6期88-90,共3页
This paper introduces the background of cloud computing, takes analysis of key technology, analysis of cloud computing and traditional competitive intelligence information model for comparative study, for the security... This paper introduces the background of cloud computing, takes analysis of key technology, analysis of cloud computing and traditional competitive intelligence information model for comparative study, for the security of cloud computing, function and service of the following aspects to elaborate, to explore the influence of cloud computing on the information. 展开更多
关键词 cloud computing cloud security cloud services information technology
在线阅读 下载PDF
基于Computer Simulation Technology的磁共振射频线圈模拟与设计 被引量:2
13
作者 何汶静 许玉霞 黄正宽 《中国医学物理学杂志》 CSCD 2017年第1期44-47,共4页
目的:基于CST(Computer Simulation Technology)软件设计磁共振射频线圈,利用软件功能计算S参数、驻波比,求解每个网格的电场和磁场的方向、大小等,辅助完成实际线圈设计。方法:以单圈线圈为例,设计3层仿真模型:铜箔线圈层、环氧玻璃布... 目的:基于CST(Computer Simulation Technology)软件设计磁共振射频线圈,利用软件功能计算S参数、驻波比,求解每个网格的电场和磁场的方向、大小等,辅助完成实际线圈设计。方法:以单圈线圈为例,设计3层仿真模型:铜箔线圈层、环氧玻璃布层压板层、水模层。正确输入每一层的材料参数,并加入电容、端口等集总参数元件。设计合适的网格划分要求,插入场监视器。结果:数据结果包括一维结果和二、三维结果,其中一维结果包括S参数,驻波比,不连续端口的电流、电压、阻抗,集总参数元件的电流、电压、阻抗等,二、三维结果包括电场分布、磁场分布、表面电流等。从S11参数看出此线圈模型可在21.86 MHz处实现调谐和匹配,实际中可用作0.5 T磁共振成像设备的线圈。电磁场分布结果可以看出电容附近电场强度较高,磁场强度在线圈附近z方向强度较高。结论:磁共振射频线圈的设计可以利用CST软件辅助完成,通过调整线圈的形状、铜箔宽度等建立模型,根据S参数查看调谐匹配、耦合结果,通过场监视器的设置,查看二、三维电磁场分布。由结果再修改模型,最终完成设计。 展开更多
关键词 CST软件 磁共振 射频线圈
在线阅读 下载PDF
Influence of Quantum Information Technology on International Security
14
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
在线阅读 下载PDF
Developments of Computing in Papua New Guinea in the Post-Independence Era
15
作者 Zhaohao Sun Xuehui Wei Francisca Pambel 《Journal of Computer and Communications》 2024年第8期141-160,共20页
This article looks at the developments of computing in Papua New Guinea (PNG) in the post-independence era. More specifically, this article examines the development of national policies on Information and Communicatio... This article looks at the developments of computing in Papua New Guinea (PNG) in the post-independence era. More specifically, this article examines the development of national policies on Information and Communications Technology (ICT), digital technologies in PNG, and the development of computing education in PNG since 1975. The research findings reveal that PNG has made solid progress in computing, ICT, national ICT policies, digital technologies, and computing education at universities in the post-independence era. The proposed approach in this article might facilitate the research and development of computing, ICT, digital technologies, and big data analytics in PNG, and beyond. 展开更多
关键词 computing Digital technologies ICT computing Education Papua New Guinea
在线阅读 下载PDF
Improving Performance of Cloud Computing and Big Data Technologies and Applications 被引量:1
16
作者 Zhenjiang Dong 《ZTE Communications》 2014年第4期1-2,共2页
Cloud computing technology is changing the development and usage patterns of IT infrastructure and applications. Virtualized and distributed systems as well as unified management and scheduling has greatly im proved c... Cloud computing technology is changing the development and usage patterns of IT infrastructure and applications. Virtualized and distributed systems as well as unified management and scheduling has greatly im proved computing and storage. Management has become easier, andOAM costs have been significantly reduced. Cloud desktop technology is develop ing rapidly. With this technology, users can flexibly and dynamically use virtual ma chine resources, companies' efficiency of using and allocating resources is greatly improved, and information security is ensured. In most existing virtual cloud desk top solutions, computing and storage are bound together, and data is stored as im age files. This limits the flexibility and expandability of systems and is insufficient for meetinz customers' requirements in different scenarios. 展开更多
关键词 Improving Performance of Cloud computing and Big Data technologies and Applications HBASE
在线阅读 下载PDF
Data-Driven Healthcare:The Role of Computational Methods in Medical Innovation
17
作者 Hariharasakthisudhan Ponnarengan Sivakumar Rajendran +2 位作者 Vikas Khalkar Gunapriya Devarajan Logesh Kamaraj 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期1-48,共48页
The purpose of this review is to explore the intersection of computational engineering and biomedical science,highlighting the transformative potential this convergence holds for innovation in healthcare and medical r... The purpose of this review is to explore the intersection of computational engineering and biomedical science,highlighting the transformative potential this convergence holds for innovation in healthcare and medical research.The review covers key topics such as computational modelling,bioinformatics,machine learning in medical diagnostics,and the integration of wearable technology for real-time health monitoring.Major findings indicate that computational models have significantly enhanced the understanding of complex biological systems,while machine learning algorithms have improved the accuracy of disease prediction and diagnosis.The synergy between bioinformatics and computational techniques has led to breakthroughs in personalized medicine,enabling more precise treatment strategies.Additionally,the integration of wearable devices with advanced computational methods has opened new avenues for continuous health monitoring and early disease detection.The review emphasizes the need for interdisciplinary collaboration to further advance this field.Future research should focus on developing more robust and scalable computational models,enhancing data integration techniques,and addressing ethical considerations related to data privacy and security.By fostering innovation at the intersection of these disciplines,the potential to revolutionize healthcare delivery and outcomes becomes increasingly attainable. 展开更多
关键词 computational models biomedical engineering BIOINFORMATICS machine learning wearable technology
在线阅读 下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
18
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 Third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security privacy-preserving cloud computing cloud security
在线阅读 下载PDF
Ubiquitous Computing: Technological Autonomy or Human Autonomy?
19
作者 Zhu Wenxi Wang Guoyu 《Journal of Philosophy Study》 2018年第5期217-223,共7页
With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For ins... With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind. 展开更多
关键词 ubiquitous computing technological autonomy human autonomy FREEDOM
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部