Withthe rapid development of social economy and science and technology, data sharing and analysis technology is one of the contents widely used in the internet field. Collecting and distributing terminal data and min...
详细信息
the technology of the cloud is rapidly developing, and it is unquestionably the next big thing that people will use wherever, at any time. the use of clouds is becoming more and more popular in today's internet-dr...
详细信息
distributed databases are often used when scalability, fault tolerance, and high availability are crucial. they excel in scenarios where traditional, centralized databases may struggle to handle the increasing volume ...
详细信息
Withthe development of the new generation of information network technology and the massive data integration generated by the internet of Everything, the management planning of data is becoming more and more reasonab...
详细信息
Withthe development of intelligent transportation systems (ITS), powerful vehicular applications are gaining popularity, which brings significant challenges to resource-constrained vehicles. the emergence of edge com...
详细信息
ISBN:
(纸本)9798350377859;9798350377842
Withthe development of intelligent transportation systems (ITS), powerful vehicular applications are gaining popularity, which brings significant challenges to resource-constrained vehicles. the emergence of edge computing empowers vehicles to offload computation tasks to edge devices in the internet of vehicles (IoV), thereby alleviating the problem of constrained computing resources in vehicles. In this paper, we investigate the task offloading and resource allocation in heterogeneous edge networks (HENets). the problem of the task offloading and resource allocation is formulated to minimize the system total cost composed of the service delay and energy consumption. To address this problem, we propose a particle swarm optimization (PSO) based task offloading and resource allocation (PTORA) algorithm. Simulation results demonstrate that our proposed algorithm has better performance.
this demonstration illustrates our vision of open, collaborative fog computing environments where owners are ready to provide their information and communications technology resources to opportunistic service requeste...
详细信息
ISBN:
(纸本)9798350398045
this demonstration illustrates our vision of open, collaborative fog computing environments where owners are ready to provide their information and communications technology resources to opportunistic service requesters. the proof-of-concept implementation of our architecture for supporting such "distributed Personal OS Environments" is demonstrated through a shared factory floor use case, illustrating DisPOSE's three-tier orchestration approach.
withthe development of science and technology, new application scenarios have new demands for power distribution management system. the purpose of the research is to use the internet of'Ihings technology and clou...
详细信息
ISBN:
(纸本)9798400709630
withthe development of science and technology, new application scenarios have new demands for power distribution management system. the purpose of the research is to use the internet of'Ihings technology and cloud computingtechnology to achieve distribution information collection and remote distribution management, real-time monitoring of the power system, and reasonable distribution of power resources. through the analysis and research of the overall system design, key technology realization, practical testing and other aspects, the power distribution management service is provided in the technology-driven mode, which solves the security problems in the data transmission process and realizes the "matter cloud" power distribution management system based on security transmission. the actual test results of the power distribution management system show that each component can run normally, complete the core functions of the power distribution management system, and remotely view and manage the power distribution device information. the distribution management system is feasible and practical, effectively reduces the labor cost, and has certain extensibility.
this paper presents a machine learning-based approach to detect two major forms of misinformation on social media platforms: deepfake images and social bots. For deepfake image detection, we propose a novel hybrid mod...
详细信息
the integration of the internet of Vehicles (IoV) into urban environments introduces significant data security and network efficiency challenges. As vehicular networks expand, their susceptibility to cyber-attacks inc...
详细信息
Web bots are becoming increasingly sophisticated, posing a serious threat to internet security and integrity. In response to this growing issue, this study proposes a novel bot detection method based on browser finger...
详细信息
暂无评论