- Distributed and Parallel Computing Systems
- Advanced Data Storage Technologies
- Cloud Computing and Resource Management
- Cryptography and Data Security
- Caching and Content Delivery
- Privacy-Preserving Technologies in Data
- Service-Oriented Architecture and Web Services
- Energy Efficient Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Data Mining Algorithms and Applications
- Indoor and Outdoor Localization Technologies
- Advanced Computational Techniques and Applications
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Context-Aware Activity Recognition Systems
- Mobile Agent-Based Network Management
- Cloud Computing and Remote Desktop Technologies
- User Authentication and Security Systems
- Food Supply Chain Traceability
- Digital Rights Management and Security
- Innovative Energy Harvesting Technologies
- Advanced Authentication Protocols Security
- Brake Systems and Friction Analysis
Chongqing University of Posts and Telecommunications
2012-2024
China Telecom
2024
Jilin Business and Technology College
2024
China Telecom (China)
2024
Jiangxi Agricultural University
2020
National Animal Husbandry Service
2020
Heilongjiang Bayi Agricultural University
2019
Education Department of Heilongjiang Province
2019
University of Electronic Science and Technology of China
2012-2014
The Zoned Namespace (ZNS) SSD is a newly introduced storage device and provides several new ZNS commands to upper-level applications. Zone-reset command one of the erase all flash blocks within zone. Since data grouped erased in zone units, SSDs are widely used LSM-tree-based stores. However, basic invalidated unit LSM-tree an SST/WAL file, which mismatches erasing SSD. Placing different files same zone, on faces dramatic space amplification extensive migration problems.
Cloud storage is an important service of cloud computing, which offers services for data owners to host their in the cloud. But computing also brings new and challenging security threats outsourced data. In order regain assurances access control storage, we analyzes algorithm Ciphertext-policy attribute-based encryption. this paper, combining a homomorphic encryption with traditional CP-ABE algorithm, constructed Searchable Encryption (SE-CP-ABE) scheme, give analysis experimental scheme....
With the integrated development of Internet, wireless sensor technology, cloud computing, and mobile there has been a lot attention given to research about applications Internet Things. A Wireless Sensor Network (WSN) is one important information technologies in Things; it integrates multi-technology detect gather network environment by mutual cooperation, using variety methods process analyze data, implement awareness, perform tests. This paper mainly researches localization algorithm nodes...
As a revolutionary and profound technology, the Internet of Things (IoT) has potential to fundamentally transform our society by simply connecting sensors smart devices Internet. It is no doubt that security communications between an important issue in IoT. In this paper, we deal with scheme for ESP8266 modules, which can provide embedded Wi-Fi capabilities at low cost. Based on existed ESP8266, proposed enhanced mutual authentication mechanism ECDH-key agreement curve25519. Compared...
The establishment of quality safety traceability system for food industry is an important technical means to meet the consumers' right know, choose and realize government supervision. There are following major problems in current whole chain information traceability: general sharing cannot be achieved between different enterprises, which caused formation isolated islands, identifiers among circulation heterogeneous nested. Therefore, it difficult trace back information, this paper proposes a...
Nowadays, big data analytics has been widely applied in addressing the growing cybercrime threats. However, energy consumption is explosive increasing with fast growth of processing anti-cybercrime. In this paper, an energy-efficient framework for applications proposed to reduce while satisfying deadline constrains. First, problem tasks scheduling a single Spark job modeled as integer program. We design algorithm minimize application Spark. To avoid service-level agreement violations...
Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable for mechanism. Due to the problems such that system attribute revocation not flexible, overhead too big and other issues existing CP-ABE under cloud environment, with limited condition of `AND' `OR' an tree, based on AB-ACER schemes, we proposed scheme Cloud storage. This many minimum sets which shared Re-encryption keys, storage service provider re-encrypts...
With the integrated development of Internet, wireless sensor technology, cloud computing, and mobile there has been a lot attention given to research about applications Internet Things. A Wireless Sensor Network (WSN) is one important information technologies in Things; it integrates multi-technology detect gather network environment by mutual cooperation, using variety methods process analyze data, implement awareness, perform tests. This paper mainly researches localization algorithm nodes...
It's necessary to equip WSNs with authentication mechanism accounts for that the nodes of are vulnerable various attacks since they open and resource-limited. However, traditional such as signature cannot be utilized achieve this goal, because its heavy computation. On-line/off-line can considered a practical solution WSNs, only need perform lightweight on-line sign, while computation performed off-sign phase using efficient computational devices, but it is not perfect certain circumstances....
With the development of market economic, customer churn prediction play a critical role in company management. How-ever, information is complex, it contains multi-dimensional features. What's worse, number very small among whole consumers, and features are dynamically changing, which challenging for traditional statistical methods. Fortunately, as rise edge computing, more computing related to data-intensive applications will be de-centralized smart terminals. Moreover, focuses on real-time,...
As it can provide high throughput data access, and easy to deploy on a cheap machine ,Distributed File System HDFS is used widely.All file access requests are required by the metadata server node .so single nodes often become bottleneck of whole system problem, this paper design multi-node distributed management solution in directory Hash-based storage strategy, proposed protocol based two-phase commit ensure consistency.Experimental results show that program improve efficiency.
AbstractCiphertext Policy Attribute-Based Encryption (CP-ABE) has been widely studied in recent years because it is more suitable for access control of shared data under cloud storage environment. In view problems flexibility and efficiency the existing encryption schemes environment, combined with digital envelopes technology, paper puts forward an optimized scheme based on supporting fine-grained control. The following advantages: Adopting reducing computational overhead Data Owner...
Abstract This paper proposes a microservice deployment strategy based on interactive weights to optimize the of microservices in edge environments. In an computing environment, this is particularly important reduce data transmission latency and improve processing efficiency as processed stored closer where generated. The proposed evaluates dependencies between their interaction weights, models computation transport minimize overall applications network. By introducing weight factor...
For disc brakes, the heat dissipation performance of brake during braking process directly affects safety automotive braking. Use COMSOL Multiphysics 5.6 to numerically simulate friction generation and brakes Simulate transient heating convective cooling find minimum interval between a series actions avoid excessive temperature caused by delayed continuous degradation efficiency. Import field solution results into solid mechanics process, finally solve obtain thermal strain brake,...
In MongoDB database, data objects are queried by means of the index. Under pressure mass data, all its index could not be stored in memory, which is bound to affect system query performance. For this issue, paper proposes a layered storage mechanism based on K- center PAM optimization algorithm, clusters hot and cold through objects, uses structure Redis cache reduce times access disk during improve Through experimental comparison with original MongoDB, verifies that Kcenter can enhance