Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (426)
  • Open Access

    ARTICLE

    Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information

    Ce Li1,2,*, Xinyu Shang2, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Xianlei Xu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1245-1260, 2019, DOI:10.32604/cmc.2019.06159

    Abstract Pipeline defect detection systems collect the videos from cameras of pipeline robots, however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats. The existing systems tend to reach the limit in terms of data access anywhere, access security and video processing on cloud. There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection. In this paper, we deploy the framework of a cloud based pipeline defect detection system, including the user management module, pipeline robot control module, system service module, and defect detection… More >

  • Open Access

    ARTICLE

    XML-Based Information Fusion Architecture Based on Cloud Computing Ecosystem

    I-Ching Hsu1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 929-950, 2019, DOI:10.32604/cmc.2019.07876

    Abstract Considering cloud computing from an organizational and end user computing point of view, it is a new paradigm for deploying, managing and offering services through a shared infrastructure. Current development of cloud computing applications, however, are the lack of a uniformly approach to cope with the heterogeneous information fusion. This leads cloud computing to inefficient development and a low potential reuse. This study addresses these issues to propose a novel Web 2.0 Mashups as a Service, called WMaaS, which is a fundamental cloud service model. The WMaaS is developed based on a XML-based Mashups Architecture (XMA) that is composed of… More >

  • Open Access

    ARTICLE

    Efficient Computation Offloading in Mobile Cloud Computing for Video Streaming Over 5G

    Bokyun Jo1, Md. Jalil Piran2,*, Daeho Lee3, Doug Young Suh4,*

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 439-463, 2019, DOI:10.32604/cmc.2019.08194

    Abstract In this paper, we investigate video quality enhancement using computation offloading to the mobile cloud computing (MCC) environment. Our objective is to reduce the computational complexity required to covert a low-resolution video to high-resolution video while minimizing computation at the mobile client and additional communication costs. To do so, we propose an energy-efficient computation offloading framework for video streaming services in a MCC over the fifth generation (5G) cellular networks. In the proposed framework, the mobile client offloads the computational burden for the video enhancement to the cloud, which renders the side information needed to enhance video without requiring much… More >

  • Open Access

    ABSTRACT

    High Performance Optimization of Civil Infrastructure Systems on Cloud

    Zheng Yi Wu

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.20, No.2, pp. 60-62, 2011, DOI:10.3970/icces.2011.020.060

    Abstract Infrastructure system analysis is a computation-intensive task. Equipped with the software tools, engineers are able to analyze a handful of alternative solutions, but often end up with a workable alternative far from the optimized solution. Effectively optimizing an infrastructure system is a challenging task. Undertaking such a task requires not only well-developed optimization software tools, but also powerful computing facilities. Therefore, infrastructure system optimization is highly desirable to be conducted on cloud.
    Infrastructure system optimization is usually an implicit and nonlinear programming problem. The problem has to be carefully formulated in the way that classic mathematic programming can be applied… More >

  • Open Access

    ABSTRACT

    Raindrops and Turbulence in a Cloud

    Rama Govindarajan1, S. Ravichandran2, Jason Picardo1, Samriddhi Sankar Ray1, S. Ganga Prasath1, Vishal Vasan1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.22, No.4, pp. 194-194, 2019, DOI:10.32604/icces.2019.05206

    Abstract A cloud is in turbulent motion. It contains water vapour, aerosol particles and liquid water droplets. Depending on local levels of supersaturation, condensation takes place onto the aerosol particles and tiny droplets are formed. Our studies are aimed at understanding how these droplets grow in a short time, thought to be of the order of ten minutes, from about a micron in size into raindrops, which are of the order of millimeters. An important part of the process is collisions between droplets, some of which results in coalescence. Caustics from a single vortex are shown to be important for enhancing… More >

  • Open Access

    ARTICLE

    Code-Based Preservation Mechanism of Electronic Record in Electronic Record Center of Cloud Storage

    Yan Leng1,2, Yongjun Ren1,2,*, Chengshan Qian3, Jinyue Xia4

    Journal on Big Data, Vol.1, No.1, pp. 39-45, 2019, DOI:10.32604/jbd.2019.05870

    Abstract With the rapid development of E-commerce and E-government, there are so many electronic records have been produced. The increasing number of electronic records brings about storage difficulties, the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management. Therefore, it is imperative to use cloud storage technology to build electronic record centers. However, electronic records also have weaknesses in the cloud storage environment, and one of them is that once electronic record owners or managers lose physical control of them, the electronic records are more likely to be tampered with… More >

  • Open Access

    ARTICLE

    Underground Disease Detection Based on Cloud Computing and Attention Region Neural Network

    Pinjie Xu2, Ce Li1,2,*, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Jingwu Feng2

    Journal on Artificial Intelligence, Vol.1, No.1, pp. 9-18, 2019, DOI:10.32604/jai.2019.06157

    Abstract Detecting the underground disease is very crucial for the roadbed health monitoring and maintenance of transport facilities, since it is very closely related to the structural health and reliability with the rapid development of road traffic. Ground penetrating radar (GPR) is widely used to detect road and underground diseases. However, it is still a challenging task due to data access anywhere, transmission security and data processing on cloud. Cloud computing can provide scalable and powerful technologies for large-scale storage, processing and dissemination of GPR data. Combined with cloud computing and radar detection technology, it is possible to locate the underground… More >

  • Open Access

    ARTICLE

    Review of Access Control Model

    Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

    Journal of Cyber Security, Vol.1, No.1, pp. 43-50, 2019, DOI:10.32604/jcs.2019.06070

    Abstract Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed. More >

  • Open Access

    ARTICLE

    A Block Compressed Sensing for Images Selective Encryption in Cloud

    Xingting Liu1, Jianming Zhang2,*, Xudong Li2, Siwang Zhou1, Siyuan Zhou2, Hye-JinKim3

    Journal of Cyber Security, Vol.1, No.1, pp. 29-41, 2019, DOI:10.32604/jcs.2019.06013

    Abstract The theory of compressed sensing (CS) has been proposed to reduce the processing time and accelerate the scanning process. In this paper, the image recovery task is considered to outsource to the cloud server for its abundant computing and storage resources. However, the cloud server is untrusted then may pose a considerable amount of concern for potential privacy leakage. How to protect data privacy and simultaneously maintain management of the image remains challenging. Motivated by the above challenge, we propose an image encryption algorithm based on chaotic system, CS and image saliency. In our scheme, we outsource the image CS… More >

  • Open Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

Displaying 391-400 on page 40 of 426. Per Page