- Advanced Computational Techniques and Applications
- Cloud Computing and Resource Management
- Service-Oriented Architecture and Web Services
- Web Data Mining and Analysis
- Mobile and Web Applications
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Technology Adoption and User Behaviour
- Distributed and Parallel Computing Systems
- Data Quality and Management
- IoT and Edge/Fog Computing
- Advanced Decision-Making Techniques
- Advanced Database Systems and Queries
- Cloud Data Security Solutions
- Advanced Data Storage Technologies
- Web Applications and Data Management
- Web visibility and informetrics
- Educational Technology and Assessment
- Disaster Response and Management
- Digital Rights Management and Security
- Big Data and Digital Economy
- Information Systems Education and Curriculum Development
- Engineering and Test Systems
- Technology and Data Analysis
China Resources (China)
2023
State Grid Corporation of China (China)
2023
State Grid Hebei Electric Power Company
2023
Harbin Electric Corporation (China)
2022
Nanjing University of Information Science and Technology
2018
Beijing University of Technology
2018
Tianjin University of Technology
2018
Shenzhen Polytechnic
2016-2017
Xi'an Jiaotong University
2017
Hebei Agricultural University
2016
With object storage systems being increasingly recognized as a preferred way to expose one's infrastructure the web, past few years have witnessed an explosion in acceptance of these systems. Unfortunately, proliferation available solutions and complexity each individual one, coupled with lack dedicated workload, makes it very challenging for one evaluate tune performance different To help address this problem, we present Cloud Object Storage Benchmark (COSBench). It is benchmark tool that...
Medical data sharing is crucial to enhance diagnostic efficiency and improve the quality of medical analysis. However, related endeavors face obstacles due insufficient collaboration among institutions, traditional cloud-based platforms lead concerns regarding security privacy. To overcome these challenges, paper introduces MSNET, a novel framework that seamlessly combines blockchain edge computing. Data traceability access control are ensured by employing as layer. The stores only summaries...
An electronic dictionary system (EDS) is developed with object-oriented database techniques based on ObjectStore. The EDS composed of two parts: the Database Building Program (DBP), and Querying (DQP). DBP reads in a encoded SGML tags, builds collection trees which holds entries, several lists contain items various lexical categories. With text exchangeability introduced by SGML, able to accommodate dictionaries different languages structures, after easy modification configuration file. tree...
Cloud Computing System (CCS) aims to power the next generation data centers and enables application service providers lease center capabilities for deploying applications depending on user Quality of Service (QoS) requirements. Huge investments complex managements are shifted from users providers. To improve efficiency simplify management, in this paper, intelligent cloud computing system (ICCS) is presented discussed. Data warehouse introduced record inside outside CCS analysis mining, Some...
This paper describes the development of and initial experiences with WebUPMS (a web-based undergraduate Project management system), a thesis project system developed in Department Computer Science (DCS) at Xi'an Institute Post Telecommunications (XIPT). The was to facilitate existing DCS traditional manual administering mode, make all operations, such as projects submitting by staff, assessing assigned assessors choosing students, process controlling, final papers marks submitting, be...
With the extensive application of cloud computing technology developing, security is paramount importance in Cloud Computing. In environment, surveys have been provided on several intrusion detection techniques for detecting intrusions. We will summarize some literature various attack taxonomy, which might cause threats environment. Such as attacks virtual machines, machine monitor, and tenant network. Besides, we review massive existing solutions proposed literature, such misuse techniques,...
For graduate programs, usually, the curricula are developed based on generic learning outcomes of matching undergraduate programs. However, most programs have diversified students from various backgrounds with degrees an assortment majors. Even for coming same majors, they might come different countries differing outcomes. It is even more challenging where there no corresponding The program curriculum should be customized special student groups. This paper will describe redesign our...
This paper proposes an asymmetric key based authentication framework, QRToken, for easy - to use login websites, SSH servers, etc., QRToken client side locally stored RSA private encrypt identification information as well other parameters, and prese nt a QR code in the form of small two dimensional picture that encodes encrypted information. User takes with cell phone camera sends it cryptographic response server complete process. We believe simple act scanning brings ease management...
Cloud computing has become one of the most dominant features in area nowadays. The hardware datacenter can be get virtualized and create multiple Virtual Machine (VM) instances on a single Physical (PM) environment. It is necessary to migrate VMs from over utilized hosts ensure quality service. Meanwhile loading underutilized need integrated into physical machine which usage reasonable range system will deactivate that order saving power consumption. key points VM migration include issues...
This paper provides a Web application design method, page file-oriented with relevant concept and the corresponding definitions for variety of development, technology software engineering. We provide file flow chart which describes relationships parameters passing between every site. It standard technical specification site designing development. also gives mathematical definition that can be further realizing package or plug-in to support visual development testing.
With the fast development of Web 2.0, users can obtain everything that they want from Web. and their access behaviours are recorded by log. Based on mining frequent sequence, we deeply understand interests. In turn, it improve efficiency network management. this paper, firstly present methods for log pre-processing extract features. Secondly, employ PrefixSpan algorithm to achieve goal sequences mining. order process massive data in today, also combined proposed with Spark. Finally,...
The need for workers in the information technology and computing industry is on rise. Code.org estimates that by 2020, there will be more 1 million computer jobs available than science graduates to fill them. Efforts, organizations such as Computer Science Teachers Association (CSTA) code.org, attract students appear working. While it appears teach, qualified teachers teach them? CSTA report "Bugs System: Teacher Certification U.S." asserts "certification/licensure processes U.S. are deeply...
With the explosive growth of web information, acquiring target information quickly, precisely and effectively in a large number network is restricted by many factors.In response to it, this paper analyzed key technician part search engine-web crawler technology proposed model based on vertical system with discussion implementation corresponding strategy.Firstly, it builds structure analyzes different function models.Next, discusses some crucial problems including options deleting duplicated...
With the development of computer technology and increase distributed computing need, cloud gradually becomes research hotspot in IT domain. As an important application technology, desktop has been used many domains due to its unique characteristic, especially dominance security flexibility. Based on analyzing characteristic cloud, makes some confidential information system, describes architecture framework, running mode operation detail.
This paper studies a resource scheduling method and system for cloud edge collaboration, including: determining the location coverage of MEC servers; Real time monitoring customers' access to each within service scope server. When bandwidth customer in region reaches set threshold, we need rent server region, cache resources leased During reservation period renting servers, servers ECS are used together provide access. In process running, this can make decisions real according actual...