Skip to main content

previous disabled Page of 2
and
Your search also matched 210 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

An improved indicator-based two-archive algorithm for many-objective optimization problems

Include preview-only content
  1. Article

    Open Access

    Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...

    Liang Yan, Lina Ge, Zhe Wang, Guifen Zhang, **gya Xu in Journal of Cloud Computing (2023)

  2. Article

    Open Access

    FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings

    With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...

    Min Yang, Chengmin Ge, **aoran Zhao, Huaizhen Kou in Journal of Cloud Computing (2023)

  3. Article

    Open Access

    Memory sharing for handling memory overload on physical machines in cloud data centers

    Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...

    Yaozhong Ge, Yu-Chu Tian, Zu-Guo Yu, Weizhe Zhang in Journal of Cloud Computing (2023)

  4. Article

    Open Access

    Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds

    Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...

    Yu Zhou, Hui Ge, Bowen Ma, Shuhang Zhang, Jiwei Huang in Journal of Cloud Computing (2022)

  5. Chapter and Conference Paper

    Design and Application of a Visual System for the Supply Chain of Thermal Coal Based on Big Data

    Big data is now applied to many different fields. The paper will introduce the application of big data in the coal supply chain of the power industry. We designed and implemented a visual system for the Supply...

    **nyue Zhang, Yanmin Han, Wei Ge, Daqiang Yan, Yiming Chen in Big Data – BigData 2018 (2018)

  6. Chapter and Conference Paper

    K-mer Counting for Genomic Big Data

    Counting the abundance of all the k-mers (substrings of length k) in sequencing reads is an important step of many bioinformatics applications, including de novo assembly, error correction and multiple sequen...

    Jianqiu Ge, Ning Guo, **tao Meng, Bingqiang Wang, Pavan Balaji in Big Data – BigData 2018 (2018)

  7. Chapter and Conference Paper

    A Multi-parameter Integrated Water Quality Sensors System

    Because of the rapid development of aquaculture in China at present, it is more and more urgent to apply hi-tech devices in aquaculture field to guarantee its efficiency. There are already many devices used fo...

    Mingli Li, Daoliang Li, Qisheng Ding in Computer and Computing Technologies in Agr… (2013)

  8. Chapter and Conference Paper

    Intellectualized Identifying and Precision Control System for Horticultural Crop Diseases Based on Small Unmanned Aerial Vehicle

    To explore small unmanned aerial vehicle (UAV) remote sensing identifying technology for horticultural crop diseases, and to combine it with small UAV spraying, the peach leaf blade was taken as material, the ...

    Hongxin Cao, Yuwang Yang, Zhiyuan Pei in Computer and Computing Technologies in Agr… (2013)

  9. Chapter and Conference Paper

    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

    Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...

    Theodoros Spyridopoulos, George Oikonomou in Security and Privacy Protection in Informa… (2013)

  10. Chapter and Conference Paper

    Simulated Analysis of a Wheeled Tractor on Soft Soil Based on RecurDyn

    A simulation model of a wheeled tractor was built using the multi-body dynamics software RecurDyn. The model consisted of four wheels, front and rear axles, and a body frame. An interaction model between tires...

    Wenqian Huang, Feijun Xu, Jishuai Ge in Computer and Computing Technologies in Agr… (2012)

  11. Chapter and Conference Paper

    Rice Kernel Shape Description Using an Improved Fourier Descriptor

    A Fourier descriptor is one of the best methods for describing object boundaries, but there are limitations in describing the boundary of rice kernels using traditional Fourier descriptors. An innovative appro...

    Hua Gao, Yaqin Wang, Guangmei Zhang in Computer and Computing Technologies in Agr… (2012)

  12. Chapter and Conference Paper

    Image Segmentation of Pseudo-foreign Fibers in Cotton on the Basis of Improved Genetic Algorithm

    In the foreign fibers cleaning process, pseudo-foreign fibers are often mistaken for foreign fibers, this result not only seriously affects the detecting precision of foreign fibers cleaning machine, but also ...

    Lulu Ge, Daoliang Li, Liu Yang, Wenzhu Yang in Computer and Computing Technologies in Agr… (2012)

  13. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  14. Chapter and Conference Paper

    Development of the Information Management System for Monitoring Alien Invasive Species

    One of the effective methods to prevent the excessive extending of alien invasive species is to really master their epidemic trends and to take appropriate measures to control them. So, the information managem...

    Hui Li, Ningning Ge, Lingwang Gao in Computer and Computing Technologies in Agr… (2011)

  15. Chapter and Conference Paper

    Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies

    According to the outbreak of H1N1 influenza on campus in Langfang city, Hebei province, at north of China in 2009, this paper constructed an artificial society model of the school, and simulated the spread of ...

    Wei Duan, Zhidong Cao, Yuanzheng Ge, **aogang Qiu in Intelligence and Security Informatics (2011)

  16. Chapter and Conference Paper

    The User’s Emotional Elements Research of Mobile Network Products Development Guided by User Experience

    In the whole products process of enterprise-class, the product definition decides the product’s “gene”. By way of in-depth research on user experience and behavior, our brand strategy, product planning and pro...

    Yin Wang, Qing Ge in Internationalization, Design and Global Development (2011)

  17. Chapter and Conference Paper

    Research and Application of Cultivation-Simulation-Optimization Decision Making System for Rapeseed (Brassica Napus L.)

    The objectives of this study were to develop Rapeseed Cultivation Simulation-Optimization-Decision Making System (Rape-CSODS), and validate it in order to design rapeseed planting, regulate and control its gro...

    Hongxin Cao, Chunlei Zhang, Baojun Zhang in Computer and Computing Technologies in Agr… (2011)

  18. Chapter and Conference Paper

    Object Link Structure in the Semantic Web

    Lots of RDF data have been published in the Semantic Web. The RDF data model, together with the decentralized linkage nature of the Semantic Web, brings object link structure to the worldwide scope. Object lin...

    Weiyi Ge, Jianfeng Chen, Wei Hu, Yuzhong Qu in The Semantic Web: Research and Applications (2010)

  19. Chapter and Conference Paper

    An Analysis for Anonymity and Unlinkability for a VoIP Conversation

    With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...

    Ge Zhang in Privacy and Identity Management for Life (2010)

  20. Chapter and Conference Paper

    Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites

    Web services selection aims to choose an appropriate web service among a number of service candidates. The trustworthiness of web services is an important metric for web services selection. Many trustworthines...

    Lijie Wang, Fei Liu, Ge Li, Liang Gu, Liangjie Zhang in Service-Oriented Computing (2009)

previous disabled Page of 2