Browse Items (21 total)

  • Tags: Servers

Due to the rapid data growth of video monitoring, how to efficiently storing and querying massive surveillance videos is challenging, such as performance of querying, and fault tolerance for storage. The emerging cloud computing and big data…

Smart devices in an Internet of Things (IoT) generate a massive amount of big data through sensors. The data is used to build intelligent applications through machine learning (ML). To build these applications, the data is collected from devices into…

Reciprocating compressors are widely used in the petroleum industry, and a small fault in reciprocating compressors may cause serious issues in operation. Monitoring and detecting potential faults help compressors to continue normal operation. This…

The security management of information system refers to the establishment of effective protection mechanism for hardware, software and data in the system to ensure the normal operation of the system, free from accidental or malicious reasons, such…

Within any country, the safety of the citizens is a major concern. Since LPG is highly flammable and can create dangerous situations in life. To avoid such situations, this system modifies the existing safety system of LPG leakage detection. The…

Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of…

An intelligent micro-grid management and application architecture are proposed with a mobile energy storage system. The main objective is to use the mobile energy storage system as flexible backup power for the power outage. With GPS positioning and…

In this paper, I propose a new method about the remote monitor and control for Massive Hydraulic Fracturing (MHF). It includes data acquisition by serial port communication even if the fracturing measuring truck has not outside serial port, 3G…

There would be a sealed space, called culvert box, between the nature gas pipeline and the concrete pipe when the nature gas pipeline crossing highways, railways and rivers using the trenchless pipe pushing technology. To deal with the problem of…

Uncontrolled storage of problematic and toxic waste, respectively, has led in many places to the emergence of areas that pose a danger to the environment and natural resources, as well as to human health. Basically, all over the world countries are…

As the rapid proliferation of Internet of Things (IoT) and edge computing, large amounts of data are needed to be stored and transmitted in the online storage system. Data deduplication can be adopted to improve communication efficiency and minimize…

Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical…

Fog computing, which works complementary to cloud computing, is being developed to overcome the issue of cloud computing such as latency in the cases where the data is to be retrieved immediately. But, along with solving the problem of latency, fog…

Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide massive data storage services. To ensure the confidentiality, sensitive industrial data need to be encrypted before being outsourced to cloud storage server.…

Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. With the increasing amount of the surveillance videos, high computation and storage costs…

Content Centric Networks (CCN) has been evolved as a promising internet architecture that focuses on content centric approach for content requests rather than host centric approach. CCN provide in-network caching and content distribution capability…

Wireless body area networks (WBANs) rely on powerful cloud storage services to manage massive medical data. As precise medical diagnosis analysis is heavily based on these medical data, any altered medical data may cause severe consequences, the…

Space-air-ground integrated network (SAGIN) is a new type of wireless network mode. The effective management of SAGIN resources is a prerequisite for high-reliability communication. However, the storage capacity of space-air network segment is…

Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of…

An intelligent micro-grid management and application architecture are proposed with a mobile energy storage system. The main objective is to use the mobile energy storage system as flexible backup power for the power outage. With GPS positioning and…

Cooperative Intelligent Transport System (C-ITS) is a promising technology that aims to improve the traditional transport management systems. In C-ITS infrastructure Autonomous Vehicles (AVs) communicate wirelessly with other AVs, Road Side Units…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2