期刊文献+
共找到12,875篇文章
< 1 2 250 >
每页显示 20 50 100
A Decade Review of Video Compressive Sensing:A Roadmap to Practical Applications
1
作者 Zhihong Zhang Siming Zheng +5 位作者 Min Qiu Guohai Situ David J.Brady Qionghai Dai Jinli Suo Xin Yuan 《Engineering》 2025年第3期172-185,共14页
It has been over a decade since the first coded aperture video compressive sensing(CS)system was reported.The underlying principle of this technology is to employ a high-frequency modulator in the optical path to modu... It has been over a decade since the first coded aperture video compressive sensing(CS)system was reported.The underlying principle of this technology is to employ a high-frequency modulator in the optical path to modulate a recorded high-speed scene within one integration time.The superimposed image captured in this manner is modulated and compressed,since multiple modulation patterns are imposed.Following this,reconstruction algorithms are utilized to recover the desired high-speed scene.One leading advantage of video CS is that a single captured measurement can be used to reconstruct a multi-frame video,thereby enabling a low-speed camera to capture high-speed scenes.Inspired by this,a number of variants of video CS systems have been built,mainly using different modulation devices.Meanwhile,in order to obtain high-quality reconstruction videos,many algorithms have been developed,from optimization-based iterative algorithms to deep-learning-based ones.Recently,emerging deep learning methods have been dominant due to their high-speed inference and high-quality reconstruction,highlighting the possibility of deploying video CS in practical applications.Toward this end,this paper reviews the progress that has been achieved in video CS during the past decade.We further analyze the efforts that need to be made—in terms of both hardware and algorithms—to enable real applications.Research gaps are put forward and future directions are summarized to help researchers and engineers working on this topic. 展开更多
关键词 Video compressive sensing Computational imaging Deep learning Practical applications
在线阅读 下载PDF
Architecture, challenges and applications of dynamic reconfigurable computing 被引量:4
2
作者 Yanan Lu Leibo Liu +2 位作者 Jianfeng Zhu Shouyi Yin Shaojun Wei 《Journal of Semiconductors》 EI CAS CSCD 2020年第2期4-13,共10页
As a computing paradigm that combines temporal and spatial computations,dynamic reconfigurable computing provides superiorities of flexibility,energy efficiency and area efficiency,attracting interest from both academ... As a computing paradigm that combines temporal and spatial computations,dynamic reconfigurable computing provides superiorities of flexibility,energy efficiency and area efficiency,attracting interest from both academia and industry.However,dynamic reconfigurable computing is not yet mature because of several unsolved problems.This work introduces the concept,architecture,and compilation techniques of dynamic reconfigurable computing.It also discusses the existing major challenges and points out its potential applications. 展开更多
关键词 reconfigurable computing ARCHITECTURE CHALLENGE APPLICATION
在线阅读 下载PDF
Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications 被引量:5
3
作者 V.Gopinath R.S.Bhuvaneswaran 《Computers, Materials & Continua》 SCIE EI 2018年第11期341-352,共12页
Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making u... Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making use of it.At the same time,it is vulnerable to hacks and threats.Hence securing this environment is of at most important and many research works are being reported focusing on it.This paper proposes a safe storage mechanism using Elliptic curve cryptography(ECC)for the Transaction Rich Applications(TRA).With ECC based security scheme,the security level of the protected system will be increased and it is more suitable to secure the delivered data in the portable devices.The proposed scheme shields the aligning of different kind of data elements to each provider using an ECC algorithm.Analysis,comparison and simulation prove that the proposed system is more effective and secure for the Transaction rich applications in Cloud. 展开更多
关键词 Ecc SSL VPN cloud computing BANKING security transaction rich applications
在线阅读 下载PDF
Virtualization Technology in Cloud Computing Based Radio Access Networks:A Primer 被引量:2
4
作者 ZHANG Xian PENG Mugen 《ZTE Communications》 2017年第4期47-66,共20页
Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has bee... Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has been widely applied in the core network. With the tremendous growth in mobile traffic and services, it is natural to extend virtualization technology to the cloud computing based radio access networks(CCRANs) for achieving high spectral efficiency with low cost.In this paper, the virtualization technologies in CC-RANs are surveyed, including the system architecture, key enabling techniques, challenges, and open issues. The enabling key technologies for virtualization in CC-RANs mainly including virtual resource allocation, radio access network(RAN) slicing, mobility management, and social-awareness have been comprehensively surveyed to satisfy the isolation, customization and high-efficiency utilization of radio resources. The challenges and open issues mainly focus on virtualization levels for CC-RANs, signaling design for CC-RAN virtualization, performance analysis for CC-RAN virtualization, and network security for virtualized CC-RANs. 展开更多
关键词 network VIRTUALIZATION cc-RAN RAN SLICING FOG computing
在线阅读 下载PDF
Impact of Coronavirus Pandemic Crisis on Technologies and Cloud Computing Applications
5
作者 Ziyad R.Alashhab Mohammed Anbar +3 位作者 Manmeet Mahinderjit Singh Yu-Beng Leau Zaher Ali Al-Sai Sami Abu Alhayja’a 《Journal of Electronic Science and Technology》 CAS CSCD 2021年第1期25-40,共16页
In light of the coronavirus disease 2019(COVID-19)outbreak caused by the novel coronavirus,companies and institutions have instructed their employees to work from home as a precautionary measure to reduce the risk of ... In light of the coronavirus disease 2019(COVID-19)outbreak caused by the novel coronavirus,companies and institutions have instructed their employees to work from home as a precautionary measure to reduce the risk of contagion.Employees,however,have been exposed to different security risks because of working from home.Moreover,the rapid global spread of COVID-19 has increased the volume of data generated from various sources.Working from home depends mainly on cloud computing(CC)applications that help employees to efficiently accomplish their tasks.The cloud computing environment(CCE)is an unsung hero in the COVID-19 pandemic crisis.It consists of the fast-paced practices for services that reflect the trend of rapidly deployable applications for maintaining data.Despite the increase in the use of CC applications,there is an ongoing research challenge in the domains of CCE concerning data,guaranteeing security,and the availability of CC applications.This paper,to the best of our knowledge,is the first paper that thoroughly explains the impact of the COVID-19 pandemic on CCE.Additionally,this paper also highlights the security risks of working from home during the COVID-19 pandemic. 展开更多
关键词 Big data privacy cloud computing(cc)applications COVID-19 digital transformation security challenge work from home
在线阅读 下载PDF
Improving Performance of Cloud Computing and Big Data Technologies and Applications 被引量:1
6
作者 Zhenjiang Dong 《ZTE Communications》 2014年第4期1-2,共2页
Cloud computing technology is changing the development and usage patterns of IT infrastructure and applications. Virtualized and distributed systems as well as unified management and scheduling has greatly im proved c... Cloud computing technology is changing the development and usage patterns of IT infrastructure and applications. Virtualized and distributed systems as well as unified management and scheduling has greatly im proved computing and storage. Management has become easier, andOAM costs have been significantly reduced. Cloud desktop technology is develop ing rapidly. With this technology, users can flexibly and dynamically use virtual ma chine resources, companies' efficiency of using and allocating resources is greatly improved, and information security is ensured. In most existing virtual cloud desk top solutions, computing and storage are bound together, and data is stored as im age files. This limits the flexibility and expandability of systems and is insufficient for meetinz customers' requirements in different scenarios. 展开更多
关键词 Improving Performance of Cloud computing and Big Data Technologies and applications HBASE
在线阅读 下载PDF
Mobile Cloud Computing and Applications
7
作者 Chengzhong Xu 《ZTE Communications》 2011年第1期3-3,共1页
In 2010, cloud computing gained momentum. Cloud computing is a model for real-time, on-demand, pay-for-use network access to a shared pool of configurable computing and storage resources. It has matured from a promisi... In 2010, cloud computing gained momentum. Cloud computing is a model for real-time, on-demand, pay-for-use network access to a shared pool of configurable computing and storage resources. It has matured from a promising business concept to a working reality in both the private and public IT sectors. The U.S. government, for example, has requested all its agencies to evaluate cloud computing alternatives as part of their budget submissions for new IT investment. 展开更多
关键词 Mobile Cloud computing and applications IAAS
在线阅读 下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
8
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial Internet of Things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
在线阅读 下载PDF
Research on the Development Trend and General Applications of the Fuzzy Rough Granularity Computing Theory
9
作者 Xin Li 《International Journal of Technology Management》 2016年第5期22-24,共3页
In this paper, we conduct research on the development trend and general applications of the fuzzy rough granular computing theory. Granular computing is a new concept of general information processing and computing pa... In this paper, we conduct research on the development trend and general applications of the fuzzy rough granular computing theory. Granular computing is a new concept of general information processing and computing paradigm which covers all the granularity the study of the theory, methods, techniques and the tools. In many areas are the basic ideas of granular computing, such as the interval analysis, rough set theory, clustering analysis and information retrieval, machine learning, database, etc. With the theory of domain known division of target concept and rule acquisition, in knowledge discovery, data mining and the pattern recognition is widely used. Under this basis, in this paper, we propose the fuzzy rough theory based computing paradigm that gains ideal performance. 展开更多
关键词 Development TREND applications Fuzzy ROUGH Granular computing THEORY
在线阅读 下载PDF
The Benefits of Using Google Cloud Computing for Developing Distributed Applications
10
作者 Isak Shabani Amir Kovaci Agni Dika 《Journal of Mathematics and System Science》 2015年第4期156-164,共9页
IT as a dynamic filed changes very rapidly; efficient management of such systems for the most of the companies requires handling tremendous complex situations in terms of hardware and software setup. Hardware and soft... IT as a dynamic filed changes very rapidly; efficient management of such systems for the most of the companies requires handling tremendous complex situations in terms of hardware and software setup. Hardware and software itself changes quickly with the time and keeping them updated is a difficult problem for the most of the companies; the problem is more emphasized for the companies having large infrastructure of IT facilities such as data centers which are expensive to be maintained. Many applications run on the company premises which require well prepared staff for successfully maintaining them. With the inception of Cloud Computing many companies have transferred their applications and data into cloud computing based platforms in order to have reduced maintaining cost, easier maintenance in terms of hardware and software, reliable and securely accessible services. The benefits of building distributed applications using Google infrastructure are conferred in this paper. 展开更多
关键词 Datastore BIGTABLE Distributed application Cloud computing
在线阅读 下载PDF
Hybrid Approach for Cost Efficient Application Placement in Fog-Cloud Computing Environments
11
作者 Abdulelah Alwabel Chinmaya Kumar Swain 《Computers, Materials & Continua》 SCIE EI 2024年第6期4127-4148,共22页
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.How... Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data sources.However,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud computing.An approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing costs.This approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of applications.In this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing cost.We consider four cost-types for application deployment:Computation,communication,energy consumption,and violations.The proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the system.An extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art approaches.The results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost. 展开更多
关键词 Placement mechanism application module placement fog computing cloud computing genetic algorithm flamingo search algorithm
在线阅读 下载PDF
Optimizing Healthcare Big Data Processing with Containerized PySpark and Parallel Computing: A Study on ETL Pipeline Efficiency
12
作者 Ehsan Soltanmohammadi Neset Hikmet 《Journal of Data Analysis and Information Processing》 2024年第4期544-565,共22页
In this study, we delve into the realm of efficient Big Data Engineering and Extract, Transform, Load (ETL) processes within the healthcare sector, leveraging the robust foundation provided by the MIMIC-III Clinical D... In this study, we delve into the realm of efficient Big Data Engineering and Extract, Transform, Load (ETL) processes within the healthcare sector, leveraging the robust foundation provided by the MIMIC-III Clinical Database. Our investigation entails a comprehensive exploration of various methodologies aimed at enhancing the efficiency of ETL processes, with a primary emphasis on optimizing time and resource utilization. Through meticulous experimentation utilizing a representative dataset, we shed light on the advantages associated with the incorporation of PySpark and Docker containerized applications. Our research illuminates significant advancements in time efficiency, process streamlining, and resource optimization attained through the utilization of PySpark for distributed computing within Big Data Engineering workflows. Additionally, we underscore the strategic integration of Docker containers, delineating their pivotal role in augmenting scalability and reproducibility within the ETL pipeline. This paper encapsulates the pivotal insights gleaned from our experimental journey, accentuating the practical implications and benefits entailed in the adoption of PySpark and Docker. By streamlining Big Data Engineering and ETL processes in the context of clinical big data, our study contributes to the ongoing discourse on optimizing data processing efficiency in healthcare applications. The source code is available on request. 展开更多
关键词 Big Data Engineering ETL Healthcare Sector Containerized applications Distributed computing Resource Optimization Data Processing Efficiency
在线阅读 下载PDF
Research on the Application of Big Data and Cloud Computing Technology in Smart Campus
13
作者 Shengtao Zhou 《Journal of Electronic Research and Application》 2024年第5期6-11,共6页
The current education field is experiencing an innovation driven by big data and cloud technologies,and these advanced technologies play a central role in the construction of smart campuses.Big data technology has a w... The current education field is experiencing an innovation driven by big data and cloud technologies,and these advanced technologies play a central role in the construction of smart campuses.Big data technology has a wide range of applications in student learning behavior analysis,teaching resource management,campus safety monitoring,and decision support,which improves the quality of education and management efficiency.Cloud computing technology supports the integration,distribution,and optimal use of educational resources through cloud resource sharing,virtual classrooms,intelligent campus management systems,and Infrastructure-as-a-Service(IaaS)models,which reduce costs and increase flexibility.This paper comprehensively discusses the practical application of big data and cloud computing technologies in smart campuses,showing how these technologies can contribute to the development of smart campuses,and laying the foundation for the future innovation of education models. 展开更多
关键词 Big data Cloud computing technology Smart campus APPLICATION
在线阅读 下载PDF
数智化背景下应用型高校“大学计算机基础”课程教学模式的创新与实践研究
14
作者 韦丽红 王继钢 《计算机应用文摘》 2025年第8期17-19,共3页
在数智化时代背景下,应用型高校面临培养新质人才的紧迫任务。呼伦贝尔学院针对“大学计算机基础”课程存在的问题(如内容陈旧、实践课时不足和缺乏个性化设计等)进行了全面改革。通过引入人工智能和大数据技术,构建“1+X”课程体系,并... 在数智化时代背景下,应用型高校面临培养新质人才的紧迫任务。呼伦贝尔学院针对“大学计算机基础”课程存在的问题(如内容陈旧、实践课时不足和缺乏个性化设计等)进行了全面改革。通过引入人工智能和大数据技术,构建“1+X”课程体系,并延续“三阶递进”的教学模式,课程注重多样化的学习资源建设,采用理论和实践相结合的方式引入产教融合,确保教学内容与行业需求保持一致。这些改革强化了跨学科的人工智能技术,培养了学生的创新和实践能力,为其全面发展提供了有力支持。 展开更多
关键词 数智化 应用型高校 计算机基础课程 教学模式
在线阅读 下载PDF
虚拟现实技术在“计算机基础”课程教学中的创新应用研究
15
作者 刘洁 马颖 《计算机应用文摘》 2025年第5期25-27,共3页
目前,“计算机基础”课程教学存在实践环节不足、内容陈旧、缺乏趣味性等问题。虚拟现实技术可以有效突破这些限制,并与课程教学在内容、方法和体验等方面实现深度融合。其中,虚拟现实技术在“计算机基础”课程教学中的创新应用模式包... 目前,“计算机基础”课程教学存在实践环节不足、内容陈旧、缺乏趣味性等问题。虚拟现实技术可以有效突破这些限制,并与课程教学在内容、方法和体验等方面实现深度融合。其中,虚拟现实技术在“计算机基础”课程教学中的创新应用模式包括创建虚拟实验室、设计操作场景、开发游戏、组织协作项目、提供个性化学习路径以及进行实时监测与反馈等,这些方式能够显著提升教学效果。然而,应用过程中也面临设备成本高、稳定性和兼容性差、资源匮乏、教师技术水平不足以及学生自主管理能力较弱等挑战。 展开更多
关键词 虚拟现实技术 “计算机基础”课程 教学创新 应用研究
在线阅读 下载PDF
计算机辅助设计技术在皮革产品设计中的应用
16
作者 杨丽 《中国皮革》 2025年第4期110-113,共4页
计算机辅助设计技术在各种现代产品和实际应用中发挥着重要作用。计算机辅助设计技术的应用不仅节约了人工设计中的损耗,还极大地促进了现代皮革产品的生产和销售效率。本文深入研究了计算机辅助设计的内涵,分析了计算机辅助设计技术在... 计算机辅助设计技术在各种现代产品和实际应用中发挥着重要作用。计算机辅助设计技术的应用不仅节约了人工设计中的损耗,还极大地促进了现代皮革产品的生产和销售效率。本文深入研究了计算机辅助设计的内涵,分析了计算机辅助设计技术在皮革产品设计中的应用优势和趋势,并列举相关皮革产品设计中的应用案例。通过不断的技术创新和研发,可以进一步提升皮革产品的设计质量,以提供更加先进、便捷的设计工具和平台,为皮革产品设计师提供更广阔的创作空间和灵感来源。 展开更多
关键词 计算机辅助设计 皮革产品 应用优势
在线阅读 下载PDF
计算机网络安全防护中数据加密技术的应用
17
作者 田凌燕 《软件》 2025年第2期150-152,共3页
安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、... 安全防护已经成为信息技术应用的重要工作方向。本文从数据加密技术的基本情况入手,阐述了强化计算机网络安全防护的现实意义。综合上述两点,从技术类型分析、网络模型搭建、加密形式采用、数据加密落实、身份验证应用、技术场景拓展、性能评估分析等多个角度探讨了在计算机网络安全防护中使用数据加密技术的关键要点。希望可以为相关人士提供帮助和借鉴,深化数据加密技术的实践应用。 展开更多
关键词 计算机 网络安全 防护 数据加密技术 应用
在线阅读 下载PDF
电信全通道网关在高校短信平台中的应用与实践
18
作者 陈龙龙 冯凯茵 《计算机时代》 2025年第1期85-88,共4页
高校信息化建设高速发展过程中,短信发送和语音通知需求愈加突出,需要建设含有校级通讯录、短信和语音推送、个性化信息发送和标准系统接口的统一短信管理平台。本文利用电信全通道网关设计并实现校内短信平台统一管理和缴费,供福州大... 高校信息化建设高速发展过程中,短信发送和语音通知需求愈加突出,需要建设含有校级通讯录、短信和语音推送、个性化信息发送和标准系统接口的统一短信管理平台。本文利用电信全通道网关设计并实现校内短信平台统一管理和缴费,供福州大学一站式服务大厅31个业务系统对接和50多个部门管理员使用,为全校师生提供便捷、个性化的信息发送服务。 展开更多
关键词 高等院校 短信 电信网关 计算机应用
在线阅读 下载PDF
计算机通信技术在教育领域的创新应用
19
作者 张联 《数字通信世界》 2025年第1期130-132,共3页
在信息化迅猛发展的今天,利用计算机通信技术进行教学,是促进教育现代化的一种重要手段。本文对信息通信技术在教学中的创新应用进行了研究,提出了建设智慧课堂、革新教学模式、促进个性化学习以及提高网络安全性等方面的建议。
关键词 计算机通信技术 教育领域 创新应用
在线阅读 下载PDF
AI+OMO模式下高职院校计算机应用技术专业人才培养探索
20
作者 蒋华 《教育教学论坛》 2025年第5期113-116,共4页
随着人工智能技术的发展及线上线下混合教学模式的日渐成熟,高职院校计算机应用技术专业人才培养面临新的挑战。通过阐述当前高职院校计算机应用技术专业人才培养模式存在的问题,分析了人工智能技术和混合式教学对计算机应用技术专业人... 随着人工智能技术的发展及线上线下混合教学模式的日渐成熟,高职院校计算机应用技术专业人才培养面临新的挑战。通过阐述当前高职院校计算机应用技术专业人才培养模式存在的问题,分析了人工智能技术和混合式教学对计算机应用技术专业人才培养的影响及促进作用,提出了在人工智能和混合教学模式下高职院校计算机应用技术专业人才培养的改革策略,包括加强课程建设、改进教学方法、建立导师小组培养体系、积极访企调研、注重学生的AI素质培养、加强教师队伍建设和完善教学质量评价机制等措施,旨在为高职院校计算机应用技术人才的培养探索思路。 展开更多
关键词 人工智能AI OMO混合式教学 计算机应用技术专业 人才培养
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部