Resource Type

Journal Article 12

Year

2022 4

2021 1

2020 1

2019 1

2018 3

2007 1

2000 1

open ︾

Keywords

Fog computing 4

Resource allocation 3

fog computing 2

Anonymity 1

Bacterial community 1

Blockchain 1

Byzantine fault tolerance 1

Cache placement 1

Certificateless aggregate signcryption 1

Cloud-fog cooperation 1

Data privacy 1

Elliptic curve 1

Fog radio access network 1

Fog radio access network (F-RAN) 1

Game theory 1

Homomorphic encryption 1

Industrial big data 1

Integration 1

Internet of Things (IoT) 1

Manufacturing system 1

open ︾

Search scope:

排序: Display mode:

Engineering System of Weather Modification in China

He Zhijin,Wang Guanghe,Wang Yuzeng

Strategic Study of CAE 2000, Volume 2, Issue 7,   Pages 87-91

Abstract:

Weather modification (rain enhancement, hail suppression, fog clearing, etc.) is introduced in this

Keywords: weather modification     precipitation enhancement     hail suppression     fog clearing     engineering system    

Characterization of bacterial communities during persistent fog and haze events in the Qingdao coastal

Frontiers of Environmental Science & Engineering 2021, Volume 15, Issue 3, doi: 10.1007/s11783-020-1334-x

Abstract:

• Light haze had little effect on bacterial communities.

Keywords: Bacterial community     Persistent fog and haze     Particle size    

Fog-IBDIS: Industrial Big Data Integration and Sharing with Fog Computing for Manufacturing Systems Article

Junliang Wang, Peng Zheng, Youlong Lv, Jingsong Bao, Jie Zhang

Engineering 2019, Volume 5, Issue 4,   Pages 662-670 doi: 10.1016/j.eng.2018.12.013

Abstract: A novel fog-computing-based IBDIS approach called Fog-IBDIS is proposed in order to integrate and shareThe TFG is composed of several tasks, which are executed by the data owners through the Fog-IBDIS platformSecond, the function of Fog-IBDIS to enable data integration and sharing is presented in five modulesFinally, a case study is presented to illustrate the implementation of Fog-IBDIS, which ensures raw data

Keywords: Fog computing     Industrial big data     Integration     Manufacturing system    

Fog Computing-Based Firewall in Information-Centric Networking

Liu Yi, Li Jianhua

Strategic Study of CAE 2020, Volume 22, Issue 6,   Pages 128-135 doi: 10.15302/J-SSCAE-2020.06.017

Abstract: The ICN firewall module uses the fog computing paradigm to sense content threats from ICN, and generatesOn the basis of analyzing the types of ICN attacks and the development of the fog computing architecturein ICN, this article introduces the fog-based ICN firewall model from three aspects: the overall structureof content defense, the host-oriented defense fog model, and the network-oriented defense fog model.hit rate and network communication delay, and verifies the feasibility and efficiency of the proposed fog

Keywords: information-centric networking     fog computing     interest flooding attack     firewall    

Faster fog-aided private set intersectionwith integrity preserving None

Qiang WANG, Fu-cai ZHOU, Tie-min MA, Zi-feng XU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1558-1568 doi: 10.1631/FITEE.1800518

Abstract: With the development of fog computing, the need has arisen to delegate PSI on outsourced datasets tothe fog.Furthermore, these PSI schemes cannot be applied to fog computing due to some inherent problems suchTo resolve this problem, we first propose a novel primitive called “faster fog-aided private set intersectionwith integrity preserving”, where the fog conducts delegated intersection operations over encrypted

Keywords: Private set intersection     Fog computing     Verifiable     Data privacy    

Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid Article

Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang

Engineering 2022, Volume 8, Issue 1,   Pages 159-169 doi: 10.1016/j.eng.2020.06.018

Abstract: challenges, we propose a double-blockchain assisted secure and anonymous data aggregation scheme for fog-enabledSpecifically, we design a three-tier architecture-based data aggregation framework by integrating fog

Keywords: Blockchain     Fog computing     Homomorphic encryption     Smart grid     Anonymity    

SIoTFog: Byzantine-resilient IoT fog networking None

Jian-wen XU, Kaoru OTA, Mian-xiong DONG, An-feng LIU, Qiang LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1546-1557 doi: 10.1631/FITEE.1800519

Abstract: We used to regard fog computing as an extension of cloud computing, but it is now becoming an ideal solutionpropose a Byzantine fault-tolerant networking method and two resource allocation strategies for IoT fogWe aim to build a secure fog network, called “SIoTFog,” to tolerate the Byzantine faults and improveThe simulation results show that our methods help achieve an efficient and reliable fog network.

Keywords: Byzantine fault tolerance     Fog computing     Resource allocation     Internet of Things (IoT)    

Joint uplink and downlink resource allocation for low-latency mobile virtual reality delivery in fog Research Article

Tian DANG, Chenxi LIU, Xiqing LIU, Shi YAN,tiandang@bupt.edu.cn,chenxi.liu@bupt.edu.cn,liuxiqing@bupt.edu.cn,yanshi01@bupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1,   Pages 73-85 doi: 10.1631/FITEE.2100308

Abstract: Fog radio access networks (F-RANs), in which the fog access points are equipped with communication, caching

Keywords: Virtual reality delivery     Fog radio access network (F-RAN)     Round-trip latency     Resource allocation    

Study on the Removal Technology of the Respirable Dust inthe Metallurgy Industry

Zou Shenghua,Li Gang, Li Kongqing

Strategic Study of CAE 2007, Volume 9, Issue 11,   Pages 196-199

Abstract: analyzing and comparing with different technologies of reducing dust, the results show that charged fog

Keywords: srespirable dust     wetting agent     ultrasonic atomization     magnetic water     charged fog     dust cleaningeffect    

Edge Computing Technology: Development and Countermeasures

Hong Xuehai and Wang Yang

Strategic Study of CAE 2018, Volume 20, Issue 2,   Pages 20-26 doi: 10.15302/J-SSCAE-2018.02.004

Abstract:

Edge computing is an emerging technology that reduces transmission delays and bandwidth consumption by placing computing, storage, bandwidth, applications, and other resources on the edge of the network. Moreover, application developers and content providers can provide perceptible services based on real-time network information. Mobile terminals, Internet of things, and other devices provide the necessary front-end support for computing sensitive applications, such as image recognition and network games, to share the cloud work load with the processing capability of edge computing. This paper discusses the concept of edge computing, key problems that require solutions, main advances in edge computing, influence of edge computing developments, and opportunities and development countermeasures of edge calculation.

Keywords: cloud computing     edge computing     fog computing     mobile edge computing     internet of things     front-end    

A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1354-1368 doi: 10.1631/FITEE.2100518

Abstract: Smart meters in the generate a large amount of power data. However, data privacy in the process of calculation, storage, and transmission is an urgent problem to be solved. Therefore, in this paper we propose a power resource dispatching framework (PRDF) with a privacy protection function, which uses a scheme based on . Using pseudonyms and aggregating users’ power data, PRDF not only protects users’ privacy, but also reduces the computing cost and communication overhead under traditional cloud computing. In addition, if the control center finds that a user has submitted abnormal data, it can send a request to the user management center to track the real identity of the user. Our scheme satisfies security requirements based on the , including confidentiality and unforgeability. Furthermore, we compare our scheme with other schemes by simulations. Simulation results show that compared with traditional methods, our method performs better in terms of the computation cost.

Keywords: Power Internet of Things     Cloud-fog cooperation     Elliptic curve     Random oracle model     Certificateless    

Resource allocation for network profit maximization in NOMA-based F-RANs: a game-theoretic approach Research Article

Xueyan CAO, Shi YAN, Hongming ZHANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10,   Pages 1546-1561 doi: 10.1631/FITEE.2100341

Abstract: network throughput, and this is made possible by edge computing and communication functions of the fog

Keywords: Fog radio access network     Non-orthogonal multiple access     Game theory     Cache placement     Resource allocation    

Title Author Date Type Operation

Engineering System of Weather Modification in China

He Zhijin,Wang Guanghe,Wang Yuzeng

Journal Article

Characterization of bacterial communities during persistent fog and haze events in the Qingdao coastal

Journal Article

Fog-IBDIS: Industrial Big Data Integration and Sharing with Fog Computing for Manufacturing Systems

Junliang Wang, Peng Zheng, Youlong Lv, Jingsong Bao, Jie Zhang

Journal Article

Fog Computing-Based Firewall in Information-Centric Networking

Liu Yi, Li Jianhua

Journal Article

Faster fog-aided private set intersectionwith integrity preserving

Qiang WANG, Fu-cai ZHOU, Tie-min MA, Zi-feng XU

Journal Article

Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid

Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang

Journal Article

SIoTFog: Byzantine-resilient IoT fog networking

Jian-wen XU, Kaoru OTA, Mian-xiong DONG, An-feng LIU, Qiang LI

Journal Article

Joint uplink and downlink resource allocation for low-latency mobile virtual reality delivery in fog

Tian DANG, Chenxi LIU, Xiqing LIU, Shi YAN,tiandang@bupt.edu.cn,chenxi.liu@bupt.edu.cn,liuxiqing@bupt.edu.cn,yanshi01@bupt.edu.cn

Journal Article

Study on the Removal Technology of the Respirable Dust inthe Metallurgy Industry

Zou Shenghua,Li Gang, Li Kongqing

Journal Article

Edge Computing Technology: Development and Countermeasures

Hong Xuehai and Wang Yang

Journal Article

A power resource dispatching framework with a privacy protection function in the Power Internet of Things

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Journal Article

Resource allocation for network profit maximization in NOMA-based F-RANs: a game-theoretic approach

Xueyan CAO, Shi YAN, Hongming ZHANG

Journal Article