Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (403)
  • Open Access

    ARTICLE

    Digital Continuity Guarantee Method of Urban Construction Archives Based on Risk Management

    Ran Ou1,2, Fei Chen1,2, Yongjun Ren1,2,*, Yepeng Liu1,2, Qirun Wang3

    Journal on Big Data, Vol.1, No.2, pp. 71-77, 2019, DOI:10.32604/jbd.2019.06057

    Abstract With the broad application of information technology in urban infrastructure, urban construction has entered the stage of a smart city, forming many electronic records in urban construction. These electronic records play a vital role in the maintenance of urban infrastructure. However, electronic records often change in the process of urban construction. How to preserve the electronic records of urban construction became a significant challenge. In response to this problem, this paper proposes the use of risk-based management techniques to ensure the digital continuity, authenticity, integrity, and availability of electronic records More >

  • Open Access

    ARTICLE

    Network Electronic Record Management Based on Linked Data

    Jian Qi1, Yongjun Ren1,2,*, Qirun Wang3

    Journal on Big Data, Vol.1, No.1, pp. 9-15, 2019, DOI:10.32604/jbd.2019.06290

    Abstract With the rapid development of e-government, e-commerce and self-media, a large number of electronic network records have been generated on the Internet. How to archive these resources has become a focus of attention in academic circles. Based on the theory of linked data, this paper analyzes the archiving of electronic records, and proposes that the corresponding network electronic records should be collected using the theory of linked data. After the resource description framework and corresponding international standards are utilized to convert the network resources, the electronic network records are stored in common databases to solve More >

  • Open Access

    ARTICLE

    Analysis of the Efficiency-Energy with Regression and Classification in Household Using K-NN

    Qi Liu1,2, Zhiyun Yang1, Xiaodong Liu3, Scholas Mbonihankuye4,*

    Journal of New Media, Vol.1, No.2, pp. 101-113, 2019, DOI:10.32604/jnm.2019.06958

    Abstract This paper aims to study energy consumption in a house. Home energy man-agement system (HEMS) has become very important, because energy consumption of a residential sector accounts for a significant amount of total energy consumption. However, a conventional HEMS has some architectural limitations among dimensional variables reusability and interoperability. Furthermore, the cost of implementation in HEMS is very expensive, which leads to the disturbance of the spread of a HEMS. Therefore, this study proposes an Internet of Things (IoT) based HEMS with lightweight photovoltaic (PV) system over dynamic home area networks (DHANs), which enables the More >

  • Open Access

    ARTICLE

    T Application of MES System in the Safety Management of Offshore Oil and Gas Fields

    Yong Chen1,*, Lei Cui1, Chong Wang2

    Journal of Quantum Computing, Vol.1, No.1, pp. 41-48, 2019, DOI:10.32604/jqc.2019.06283

    Abstract In order to solve the problem of data island in the safety management of offshore oil and gas fields, take full advantage of data for subsequent analysis and development, and support production safety management of oil and gas fields, the MES, which is maturely applied in manufacturing and downstream production of CNOOC (China National Offshore Oil Corporation), is introduced by the petroleum administration at the eastern South China sea. The system adopts the real-time database and relational database to collect the scattered structured data, such as evidence information of offshore oil and gas production facilities… More >

  • Open Access

    REVIEW

    Contribution of Biomechanics to Management of Ligament and Tendon Injuries

    Savio L-Y. Woo∗,†, Matthew B. Fisher, Andrew J. Feola

    Molecular & Cellular Biomechanics, Vol.5, No.1, pp. 49-68, 2008, DOI:10.3970/mcb.2008.005.049

    Abstract The contribution of biomechanics to the advancement of management of ligament and tendon injuries has been significant. Thanks to Professor Y.C. Fung's writing and guidance, our field of research has done fundamental work on anatomy and biology of ligaments and tendons, developed methods to accurately determine mechanical properties, identified various experimental factors which could change the outcome measurements as well as examined biological factors that change tissue properties in-vivo. Professor Fung also gave us his quasi-linear viscoelastic theory for soft tissues so that the time and history dependent properties of ligaments and tendons could be More >

  • Open Access

    ARTICLE

    An Application-Oriented Buffer Management Strategy in Opportunistic Networks

    Meihua Liu1, Xinchen Zhang2,*, Shuangkui Ge3, Xiaoli Chen1, Jianbin Wu2, Mao Tian1

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 559-574, 2019, DOI:10.32604/cmc.2019.04843

    Abstract In Opportunistic networks (ONs), buffer management is critical to improve the message exchanging efficiency due to the limited storage space and transmission bandwidth at the wireless edge. Current solutions make message scheduling and drop policy based on assumptions that messages can always been forwarded in a single contact, and all node pairs have the same contact rates. However, such ideal assumptions are invalid for realistic mobility traces of hand-held. Recent studies show that the single contact duration is limited and the mobility of nodes is heterogeneous in reality. In this paper, a buffer management strategy… More >

  • Open Access

    ARTICLE

    A Quantum Authorization Management Protocol Based on EPR-Pairs

    Yan Chang1,*, Shibin Zhang1, Lili Yan1, Guihua Han1, Haiquan Song1, Yan Zhang1, Xueyang Li1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1005-1014, 2019, DOI:10.32604/cmc.2019.06297

    Abstract Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed More >

  • Open Access

    ARTICLE

    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848

    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of More >

  • Open Access

    ARTICLE

    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and More >

  • Open Access

    ARTICLE

    An Improved Memory Cache Management Study Based on Spark

    Suzhen Wang1, Yanpiao Zhang1, Lu Zhang1, Ning Cao2, *, Chaoyi Pang3

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 415-431, 2018, DOI:10.3970/cmc.2018.03716

    Abstract Spark is a fast unified analysis engine for big data and machine learning, in which the memory is a crucial resource. Resilient Distribution Datasets (RDDs) are parallel data structures that allow users explicitly persist intermediate results in memory or on disk, and each one can be divided into several partitions. During task execution, Spark automatically monitors cache usage on each node. And when there is a RDD that needs to be stored in the cache where the space is insufficient, the system would drop out old data partitions in a least recently used (LRU) fashion… More >

Displaying 391-400 on page 40 of 403. Per Page