Showing 121 - 140 results of 241 for search '"data structure"', query time: 0.09s Refine Results
  1. 121

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. The data structure of encrypted block is generated by using consortium blockchain technology and updating homomorphic encryption technology to realize the updating encryption algorithm of privacy big data. …”
    Get full text
    Article
  2. 122

    Blockchain digital forensics: technology and architecture by FAN Wei, LI Haibo, ZHANG Zhujun

    Published 2024-12-01
    “…This framework integrated evidence information into the on-chain data structure and introduced a complementary graph analysis algorithm to standardize evidence collection across various scenarios. …”
    Get full text
    Article
  3. 123

    A blockchain and internet of things-based information infrastructure for the Chinese automotive sector carbon-credit market by Yanchu Liu, Yu Zhang, Duosi Zheng

    Published 2025-01-01
    “…Specifically, we attached carbon credits to each vehicle with radio frequency identification electronic tags and a chained data structure to ensure the traceability and reliability of information flow. …”
    Get full text
    Article
  4. 124

    Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter by Shyamala Loganathan, Saswati Mukherjee

    Published 2015-01-01
    “…This research reports on an efficient data structure for resource management and resource scheduling technique in a private cloud environment and discusses a cloud model. …”
    Get full text
    Article
  5. 125

    Research on distributed identity authentication mechanism of IoT device based on blockchain by Chen TAN, Meijuan CHEN, Ebenezer ACKAH Amuah

    Published 2020-06-01
    “…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
    Get full text
    Article
  6. 126

    Database energy saving strategy using blockchain and Internet of Things by Dexian Yang, Jiong Yu, Zhenzhen He, Ping Li

    Published 2025-01-01
    “…Additionally, the paper investigates the blockchain data structure and storage path by analyzing the spatial–temporal correlation properties of blockchain data. …”
    Get full text
    Article
  7. 127

    Exploration and practice of AI-empowered smart campus by SU Xiaoming, ZHANG Siyu, JIANG Kaida

    Published 2024-11-01
    “…Key technologies such as data structure transformation, visualization, and intelligent search were applied in scenario-based solutions. …”
    Get full text
    Article
  8. 128

    A Cube Analytical Mining Framework for Stream Data by Canghong Jin, Zemin Liu, Minghui Wu, Jing Ying

    Published 2014-09-01
    “…Sketch cube maps a set of attributes to a unique number and stores it in sub-linear data structure, and then builds an inverted index by tiled time window. …”
    Get full text
    Article
  9. 129

    Research on Text Similarity Measurement Hybrid Algorithm with Term Semantic Information and TF-IDF Method by Fei Lan

    Published 2022-01-01
    “…Based on term similarity weighting tree (TSWT) data structure and the definition of semantic similarity information from the HowNet, the paper firstly discusses text preprocess and filter process and then utilizes the semantic information of those key terms to calculate similarities of text documents according to the weight of the features whose weight is greater than the given threshold. …”
    Get full text
    Article
  10. 130

    Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey by Ripon Patgiri, Sabuzima Nayak, Samir Kumar Borgohain

    Published 2019-01-01
    “…Bloom filter is a probabilistic data structure to filter a membership of a set. Bloom filter returns “true” or “false” with an error tolerance depending on the presence of the element in the set. …”
    Get full text
    Article
  11. 131

    CBFM:cutted Bloom filter matrix for multi-dimensional membership query by Yong WANG, Xiao-chun YUN, ANGShu-peng WANG, Xi WANG

    Published 2016-03-01
    “…In order to improve the flexibility and accuracy of mu i-dimensional membership query,a new indexing structure called CBFM(cutted Bloom filter matrix)was proposed.CBFM built the bit matrix by the Cartesian product of different bloom filters,each representing one attribute of primary data.In this way,the proposed matrix supported by-attribute membership query.Besides,the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate.Theoretical analysis proves that CBFM utilizes memory more effi-ciently than BFM,the current state of art.Experiments also show that,on the scenario of memory size fixed,the false positive rate of CBFM is lower than that of all other indexin ethods.Especially on the scenario of memory constrained,the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing me-thod.CBFM is an accurate data structure for multi-dimensional membership query.…”
    Get full text
    Article
  12. 132

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  13. 133

    An autonomous navigation method for orchard mobile robots based on octree 3D point cloud optimization by Hailong Li, Hailong Li, Hailong Li, Kai Huang, Kai Huang, Yuanhao Sun, Yuanhao Sun, Xiaohui Lei, Xiaohui Lei, Quanchun Yuan, Quanchun Yuan, Jinqi Zhang, Xiaolan Lv, Xiaolan Lv

    Published 2025-01-01
    “…To address these issues, this paper proposes a 3D point cloud optimization method based on the octree data structure for autonomous navigation of orchard mobile robots. …”
    Get full text
    Article
  14. 134

    Isolation of Karanjin from Pongamia Pinnata and Its Identification by Difference Analytical Techniques by Sushil Kumar Dhanmane, Faisal A. Salih

    Published 2018-07-01
    “…From TLC, HPL, IR, 1HNMR, 13CNMR spectra data, structure elucidation was done and the structure was confirmed as karanjin. …”
    Get full text
    Article
  15. 135

    Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology by Ruijin WANG, Yucheng TANG, Weiqi ZHANG, Fengli ZHANG

    Published 2020-02-01
    “…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
    Get full text
    Article
  16. 136

    Construction and Application of Music Audio Database Based on Collaborative Filtering Algorithm by Jianfei Zheng

    Published 2022-01-01
    “…This research uses Big Data and collaborative filtering algorithm technology to establish a new multilevel music audio database with discrete dynamic modeling characteristics of complex systems, which can greatly improve the data structure of each level of the database, so as to improve the efficiency and accuracy of retrieving various types of music and audio files in the database.…”
    Get full text
    Article
  17. 137

    Developing a Method for Building Business Process Models Based on Graph Neural Networks in the Absence of Task Identifier Data by Oleg Kazakov, Natalya Azarenko, Irina Kozlova

    Published 2024-01-01
    “…The study employs a combination of a weighted adjacency matrix and an adjacency matric accounting for the graph data structure. Textual information about the tasks involved in the business process is considered when implementing the feature matrix using embeddings. …”
    Get full text
    Article
  18. 138

    Adaptive Transfer Learning Strategy for Predicting Battery Aging in Electric Vehicles by Daniela Galatro, Manav Shroff, Cristina H. Amon

    Published 2025-01-01
    “…Considerations for data structure and representation learning are presented, as well as a workflow to enhance the application of transfer learning for predicting aging in LiBs.…”
    Get full text
    Article
  19. 139

    A Graph-Based Method for IFC Data Merging by Qin Zhao, Yuchao Li, Xinhong Hei, Mingsong Yang

    Published 2020-01-01
    “…The IFC data are represented as a graphical data structure, which completely preserves the relationship between IFC entities. …”
    Get full text
    Article
  20. 140

    A New Method to Construct the KD Tree Based on Presorted Results by Yu Cao, Huizan Wang, Wenjing Zhao, Boheng Duan, Xiaojiang Zhang

    Published 2020-01-01
    “…K-dimensional (KD) tree, as a classical data structure, has been widely used in high-dimensional vital data search. …”
    Get full text
    Article