Browse Items (25 total)

  • Tags: Computer architecture

The security management of information system refers to the establishment of effective protection mechanism for hardware, software and data in the system to ensure the normal operation of the system, free from accidental or malicious reasons, such…

The security management of information system refers to the establishment of effective protection mechanism for hardware, software and data in the system to ensure the normal operation of the system, free from accidental or malicious reasons, such…

The security management of information system refers to the establishment of effective protection mechanism for hardware, software and data in the system to ensure the normal operation of the system, free from accidental or malicious reasons, such…

Industrial process control systems collect a vast amount of production data, especially time-series data from various sensors in a plant. This data provides a plethora of potential use cases for AI and machine learning that can help plant operators…

Video data contributes to the majority of big data, henceforth, how to efficiently and effectively discovering knowledge from large-scale video data becomes a crucial challenge. In this paper, we propose multiple architectural styles for the domain…

Video data has become the largest source of big data. Owing to video data's complexities, velocity, and volume, public security and other surveillance applications require efficient, intelligent runtime video processing. To address these challenges,…

Demand forecasting in the energy sector is essential for both countries and companies to plan their supply and demand. Agents in the highly volatile oil markets have to act fast and data-driven. In the literature, studies on oil or gasoline demand…

With the development of digitization in the oilfield widely, the petroleum industry has gradually deployed database systems and application software on cloud platform. Microservices, as the key technology of cloud platform, have become the mainstream…

At present, the big data industry is developing rapidly in many fields around the world, and it brings opportunities for the transformation and upgradation of the traditional oil industry. The whole oil business chain is of large scale, and there are…

Cloud deployment architectures have become a preferable computation model of Big Data (BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a such deployment model, the data are no longer physically…

Modern SCADA systems have many sophisticated features, such as distributed architecture, distributed database, GUI interfaces, intelligent RTUs, etc. that are the results of advances in many technologies. Oil pipeline SCADA systems provide operators…

The new developments in mobile edge computing (MEC) and vehicle-to-everything (V2X) communications has positioned 5G and beyond in a strong position to answer the market need towards future emerging intelligent transportation systems and smart city…

An increasing number of large-scale distributed systems are being built by incorporating Cloud, Fog, and Edge computing. There is an important need of understanding how to ensure the resilience of systems built using Cloud, Fog, and Edge computing.…

Summary form only given. Following the Northeast blackout of 2003, the Wide-Area Measurement Systems (WAMS) technology using Phasor Measurement Units (PMUs) has tremendously matured for the North American grid. However, with the rapidly increasing…

The digital transformation brought on by 5G is redefining current models of end-to-end (E2E) connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights…

This paper proposes a novel cache architecture that uses spare cache blocks to work as back up blocks in a set associative cache, which can operate reliably at voltages well below the manufacturing induced operating voltage (Vccmin). We detect errors…

Blockchain-based Internet of Things (BC-IoT) brings the advantages of blockchain into traditional IoT systems. In BC-IoT, the smart contract has been widely used for automatic, trusted and decentralized applications. Smart contracts require…

Future generations of wireless networks are expected to provide new services with an unprecedented level of diverse and stringent requirements. Fog Radio Access Network (FRAN) and Non-Orthogonal Multiple Access (NOMA) have emerged as complimentary…

During the computation stage of parallel seismic applications, it is usually a common need for a large amount of processes to concurrently read a large seismic dataset file from Cluster File Systems (CFS). When there are a great many of processes,…

Content Centric Networks (CCN) has been evolved as a promising internet architecture that focuses on content centric approach for content requests rather than host centric approach. CCN provide in-network caching and content distribution capability…

The development of Intelligent Cyber-Physical Systems (ICPSs) in virtual network environment is facing severe challenges. On the one hand, the Internet of things (IoT) based on ICPSs construction needs a large amount of reasonable network resources…

Space-air-ground integrated network (SAGIN) is a new type of wireless network mode. The effective management of SAGIN resources is a prerequisite for high-reliability communication. However, the storage capacity of space-air network segment is…

With the development of Internet of Vehicles (IoV), the integration of Internet of Things (IoT) and manual vehicles becomes inevitable in Intelligent Transportation Systems (ITS). In ITS, the IoVs communicate wirelessly with other IoVs, Road Side…

In order to quantify the building loss during the subway fire, this paper proposes a loss assessment method. This method uses the disaster temperature and the disaster area as indicators to establish a two-dimensional risk loss matrix, and at the…

Crude oil remains the major source of revenue in Nigeria. However, Petroleum pipeline vandalism is becoming an issue concern to the government with thousands of liters lost to embezzlement. This work proposed a Multi-Agent based Security System that…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2