-
121
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
Published 2022-01-01“…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. The data structure of encrypted block is generated by using consortium blockchain technology and updating homomorphic encryption technology to realize the updating encryption algorithm of privacy big data. …”
Get full text
Article -
122
Blockchain digital forensics: technology and architecture
Published 2024-12-01“…This framework integrated evidence information into the on-chain data structure and introduced a complementary graph analysis algorithm to standardize evidence collection across various scenarios. …”
Get full text
Article -
123
A blockchain and internet of things-based information infrastructure for the Chinese automotive sector carbon-credit market
Published 2025-01-01“…Specifically, we attached carbon credits to each vehicle with radio frequency identification electronic tags and a chained data structure to ensure the traceability and reliability of information flow. …”
Get full text
Article -
124
Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter
Published 2015-01-01“…This research reports on an efficient data structure for resource management and resource scheduling technique in a private cloud environment and discusses a cloud model. …”
Get full text
Article -
125
Research on distributed identity authentication mechanism of IoT device based on blockchain
Published 2020-06-01“…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
Get full text
Article -
126
Database energy saving strategy using blockchain and Internet of Things
Published 2025-01-01“…Additionally, the paper investigates the blockchain data structure and storage path by analyzing the spatial–temporal correlation properties of blockchain data. …”
Get full text
Article -
127
Exploration and practice of AI-empowered smart campus
Published 2024-11-01“…Key technologies such as data structure transformation, visualization, and intelligent search were applied in scenario-based solutions. …”
Get full text
Article -
128
A Cube Analytical Mining Framework for Stream Data
Published 2014-09-01“…Sketch cube maps a set of attributes to a unique number and stores it in sub-linear data structure, and then builds an inverted index by tiled time window. …”
Get full text
Article -
129
Research on Text Similarity Measurement Hybrid Algorithm with Term Semantic Information and TF-IDF Method
Published 2022-01-01“…Based on term similarity weighting tree (TSWT) data structure and the definition of semantic similarity information from the HowNet, the paper firstly discusses text preprocess and filter process and then utilizes the semantic information of those key terms to calculate similarities of text documents according to the weight of the features whose weight is greater than the given threshold. …”
Get full text
Article -
130
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Published 2019-01-01“…Bloom filter is a probabilistic data structure to filter a membership of a set. Bloom filter returns “true” or “false” with an error tolerance depending on the presence of the element in the set. …”
Get full text
Article -
131
CBFM:cutted Bloom filter matrix for multi-dimensional membership query
Published 2016-03-01“…In order to improve the flexibility and accuracy of mu i-dimensional membership query,a new indexing structure called CBFM(cutted Bloom filter matrix)was proposed.CBFM built the bit matrix by the Cartesian product of different bloom filters,each representing one attribute of primary data.In this way,the proposed matrix supported by-attribute membership query.Besides,the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate.Theoretical analysis proves that CBFM utilizes memory more effi-ciently than BFM,the current state of art.Experiments also show that,on the scenario of memory size fixed,the false positive rate of CBFM is lower than that of all other indexin ethods.Especially on the scenario of memory constrained,the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing me-thod.CBFM is an accurate data structure for multi-dimensional membership query.…”
Get full text
Article -
132
The Scanian Economic-Demographic Database (SEDD)
Published 2020-11-01“…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
Get full text
Article -
133
An autonomous navigation method for orchard mobile robots based on octree 3D point cloud optimization
Published 2025-01-01“…To address these issues, this paper proposes a 3D point cloud optimization method based on the octree data structure for autonomous navigation of orchard mobile robots. …”
Get full text
Article -
134
Isolation of Karanjin from Pongamia Pinnata and Its Identification by Difference Analytical Techniques
Published 2018-07-01“…From TLC, HPL, IR, 1HNMR, 13CNMR spectra data, structure elucidation was done and the structure was confirmed as karanjin. …”
Get full text
Article -
135
Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology
Published 2020-02-01“…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
Get full text
Article -
136
Construction and Application of Music Audio Database Based on Collaborative Filtering Algorithm
Published 2022-01-01“…This research uses Big Data and collaborative filtering algorithm technology to establish a new multilevel music audio database with discrete dynamic modeling characteristics of complex systems, which can greatly improve the data structure of each level of the database, so as to improve the efficiency and accuracy of retrieving various types of music and audio files in the database.…”
Get full text
Article -
137
Developing a Method for Building Business Process Models Based on Graph Neural Networks in the Absence of Task Identifier Data
Published 2024-01-01“…The study employs a combination of a weighted adjacency matrix and an adjacency matric accounting for the graph data structure. Textual information about the tasks involved in the business process is considered when implementing the feature matrix using embeddings. …”
Get full text
Article -
138
Adaptive Transfer Learning Strategy for Predicting Battery Aging in Electric Vehicles
Published 2025-01-01“…Considerations for data structure and representation learning are presented, as well as a workflow to enhance the application of transfer learning for predicting aging in LiBs.…”
Get full text
Article -
139
A Graph-Based Method for IFC Data Merging
Published 2020-01-01“…The IFC data are represented as a graphical data structure, which completely preserves the relationship between IFC entities. …”
Get full text
Article -
140
A New Method to Construct the KD Tree Based on Presorted Results
Published 2020-01-01“…K-dimensional (KD) tree, as a classical data structure, has been widely used in high-dimensional vital data search. …”
Get full text
Article