Resource Type

Journal Article 928

Conference Videos 89

Conference Information 36

Year

2024 3

2023 87

2022 100

2021 133

2020 77

2019 87

2018 73

2017 62

2016 46

2015 39

2014 27

2013 19

2012 18

2011 22

2010 39

2009 18

2008 24

2007 23

2006 19

2005 24

open ︾

Keywords

Machine learning 18

disruptive technology 11

Big data 9

reliability 9

DNA 7

Deep learning 6

Sustainability 6

big data 6

data mining 6

disruptive technologies 6

sustainable development 6

Additive manufacturing 5

Artificial intelligence 5

Blockchain 5

DNA damage 5

DNA methylation 5

Safety 5

robustness 5

strategic emerging industries 5

open ︾

Search scope:

排序: Display mode:

Engineering DNA Materials for Sustainable Data Storage Using a DNA Movable-Type System Article

Zi-Yi Gong, Li-Fu Song, Guang-Sheng Pei, Yu-Fei Dong, Bing-Zhi Li, Ying-Jin Yuan

Engineering 2023, Volume 29, Issue 10,   Pages 130-136 doi: 10.1016/j.eng.2022.05.023

Abstract:

DNA molecules are green materials with great potential for high-density and long-term data storageHowever, the current data-writing process of DNA data storage via DNA synthesis suffers from high costsHere, we developed a DNA movable-type storage system that can utilize DNA fragments pre-produced by cellIn this system, these pre-generated DNA fragments, referred to herein as "DNA movable types,"the costly and environmentally hazardous process of de novo DNA synthesis.

Keywords: 合成生物学     DNA信息存储     DNA活字存储系统     经济性DNA数据存储    

Selectively structural fractionation and economical-functionality conversion of lignocellulosic biomass

Chen Hongzhang,Qiu Weihua and Wang Lan

Strategic Study of CAE 2014, Volume 16, Issue 3,   Pages 27-36

Abstract:

In this paper,an innovative biomass- refining path called“selective- fractionation and economical-functionality”was proposed,based on the recognition of heterogeneity of biomass,which in the purpose to as far as possible retain the original features of macromolecules,activate and improve the biotransformation performance of components suitable for enzymatic hydrolysis,maximize the value of intermediate products. According to the association of raw material features,conversion processes and products requirement,diversified biomass refining paths have been established to prove the feasibility,reasonability and reliability of“selectivefractionation and economical- functionality”. In conclusion,“selective- fractionation and economical-functionality”of lignocellulosic materials would be the novel way to break through the tight economic and technological predicament of biomass economy.

Keywords: biorefining     heterogeneity of raw material     selective-fractionation and economical-functionality     industrialized technologic system    

Big data storage technologies: a survey Review

Aisha SIDDIQA, Ahmad KARIM, Abdullah GANI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 8,   Pages 1040-1070 doi: 10.1631/FITEE.1500441

Abstract: There is a great thrust in industry toward the development of more feasible and viable tools for storing fast-growing volume, velocity, and diversity of data, termed ‘big data’. The structural shift of the storage mechanism from traditional data management systems to NoSQL technology is due to the intention of fulfilling big data storage requirements. However, the available big data storage technologies are inefficient to provide consistent, scalable, and available solutions for continuously growing heterogeneous data. Storage is the preliminary process of big data analytics for real-world applications such as scientific experiments, healthcare, social networks, and e-business. So far, Amazon, Google, and Apache are some of the industry standards in providing big data storage solutions, yet the literature does not report an in-depth survey of storage technologies available for big data, investigating the performance and magnitude gains of these technologies. The primary objective of this paper is to conduct a comprehensive investigation of state-of-the-art storage technologies available for big data. A well-defined taxonomy of big data storage technologies is presented to assist data analysts and researchers in understanding and selecting a storage mechanism that better fits their needs. To evaluate the performance of different storage architectures, we compare and analyze the existing approaches using Brewer’s CAP theorem. The significance and applications of storage technologies and support to other categories are discussed. Several future research challenges are highlighted with the intention to expedite the deployment of a reliable and scalable storage system.

Keywords: Big data     Big data storage     NoSQL databases     Distributed databases     CAP theorem     Scalability     Consistency- partition resilience     Availability-partition resilience    

Energy consumption structure in China and the economic analysis of coupled wind power and coal to substitute natural gas

Yu Bo,Cao Chen and Gu Weidong

Strategic Study of CAE 2015, Volume 17, Issue 3,   Pages 100-106

Abstract:

In this paper,taking an annual output of 1×109 m3 coal to substitute natural gas(SNG) as an example,Shell coal gasification technology was used to produce synthesis gas. The equipment investment of air separation system(ASU),water gas shift system(WGS),wind power plant(WP) and electrolyzed water system(EWS) was compared between traditional coal-to-SNG and wind/coal SNG. The oxygen consumption,water steam consumption,electricity consumption and CO2 emission were also analyzed. Results show that although the investment of WP and EWS replacing the ASU and WGS is huge, its average annual operating cost(equipment investment,raw materials,power consumption) is lower,and CO2 emission is only 1.3 % of the traditional coal-to-SNG technology. This paper provides a reference for the development of coal-to-SNG industry.

Keywords: energy consumption;coal-to-SNG;non-grid wind power;economic analysis;CO2 emission    

Cryptanalysis of an identity-based public auditing protocol for cloud storage Comment

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 1972-1977 doi: 10.1631/FITEE.1601530

Abstract: Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud data to simplify key management and alleviate the burden of check tasks. They claimed that NaEPASC enables a thirdparty auditor (TPA) to verify the integrity of outsourced data with high efficiency and security in a cloud computing environment. However, in this paper, we pinpoint that NaEPASC is vulnerable to the signature forgery attack in the setup phase; i.e., a malicious cloud server can forge a valid signature for an arbitrary data block by using two correct signatures. Moreover, we demonstrate that NaEPASC is subject to data privacy threats in the challenge phase; i.e., an external attacker acting as a TPA can reveal the content of outsourced data. The analysis shows that NaEPASC is not secure in the data verification process. Therefore, our work is helpful for cryptographers and engineers to design and implement more secure and efficient identity-based public auditing schemes for cloud storage.

Keywords: Cloud data     Public auditing     Data integrity     Data privacy    

U.S. green BIM application situation and its influence on Chinese construction field

Yang Yu,Yin Hang

Strategic Study of CAE 2011, Volume 13, Issue 8,   Pages 103-112

Abstract:

In recent years, the green BIM(building information model) has caught the attention of the U.S. and other developed countries in the field of construction, and most of the projects that use Green BIM technology have already achieved good effect which combines sustainability with economy. Although there are still many problems in Green BIM practice, green BIM has become the inevitable trend of construction. Based on the application situation of green BIM in the U.S., this article analyzes its influence on construction field in China. In the author’s opinion, compared with green BIM in America, green BIM in China starts so late that there is a huge gap in technology between the two countries. In the process of development, China should fully absorb the practical experience of green BIM in America and combine the characteristics of construction field in China to form a proper green BIM operation process which accords with the situation of China. It is proposed that more attention should be paid to Green BIM application in different types of project and in the choice of building product material and renewable energy. Meanwhile, technical localization should be strengthened and government should invest more in it to promote the development of green building and achieve the goals of energy saving and emission reduction.

Keywords: BIM     green BIM     green building     sustainability     economy     construction fiel    

SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems Research Articles

Xingjun ZHANG, Ningjing LIANG, Yunfei LIU, Changjiang ZHANG, Yang LI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6,   Pages 858-875 doi: 10.1631/FITEE.2100242

Abstract:

To ensure the reliability and availability of data, redundancy strategies are always required for s. Erasure coding, one of the representative redundancy strategies, has the advantage of low storage overhead, which facilitates its employment in s. Among the various erasure coding schemes, are becoming popular due to their high computing speed. When a occurs in such coding schemes, a process called takes place to retrieve the failed node's lost data from surviving nodes. However, data transmission during the process usually requires a considerable amount of time. Current research has focused mainly on reducing the amount of data needed for to reduce the time required for data transmission, but it has encountered problems such as significant complexity and local optima. In this paper, we propose a random search recovery algorithm, named SA-RSR, to speed up recovery of . SA-RSR uses a simulated annealing technique to search for an optimal recovery solution that reads and transmits a minimum amount of data. In addition, this search process can be done in polynomial time. We evaluate SA-RSR with a variety of in simulations and in a real storage system, Ceph. Experimental results in Ceph show that SA-RSR reduces the amount of data required for recovery by up to 30.0% and improves the performance of by up to 20.36% compared to the conventional recovery method.

Keywords: Distributed storage system     Data reliability and availability     XOR-based erasure codes     Single-node failure     Data recovery    

Automobile fuel saving without delay

Hu Xiaochun,Zhang Baoji,Jiang Fukang,Wang Xieqing

Strategic Study of CAE 2013, Volume 15, Issue 10,   Pages 10-15

Abstract:

Petroleum is an important strategic resource related to national security and China is relatively lack on it. Saving automobile fuel and improving utilization efficiency are particularly important. Problems of utilization of automobile fuel insufficiently in China at present are pointed out. Factors influenced automobile fuel economy, development of vehicle technology trends and policy measures for saving fuel are analyzed. Proposed that policy measures advocated oriented concept of giving priority to conservation, efficiency; focuses on the development and application of a variety of fuel-saving technologies, to improve the quality of fuel, to speed up the elimination of old model vehicles, and actively develop alternative fuels, vigorously develop public transport and modern logistics are the effective way of China's automobile fuel economy and emission reduction.

Keywords: automobile fuel-saving     fuel economy     alternative fuels     new energy     public transport     policy measures    

Using improved particle swarm optimization totune PID controllers in cooperative collision avoidance systems Article

Xing-chen WU, Gui-he QIN, Ming-hui SUN, He YU, Qian-yi XU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 9,   Pages 1385-1395 doi: 10.1631/FITEE.1601427

Abstract: The introduction of proportional-integral-derivative (PID) controllersinto cooperative collision avoidance systems (CCASs) has been hinderedby difficulties in their optimization and by a lack of study of theireffects on vehicle driving stability, comfort, and fuel economy. Inthis paper, we propose a method to optimize PID controllers usingan improved particle swarm optimization (PSO) algorithm, and to bettermanipulate cooperative collision avoidance with other vehicles. First,we use PRESCAN and MATLAB/Simulink to conduct a united simulation,which constructs a CCAS composed of a PID controller, maneuver strategyjudging modules, and a path planning module. Then we apply the improvedPSO algorithm to optimize the PID controller based on the dynamicvehicle data obtained. Finally, we perform a simulation test of performancebefore and after the optimization of the PID controller, in whichvehicles equipped with a CCAS undertake deceleration driving and steeringunder the two states of low speed (≤50 km/h) and high speed (≥100km/h) cruising. The results show that the PID controller optimizedusing the proposed method can achieve not only the basic functionsof a CCAS, but also improvements in vehicle dynamic stability, ridingcomfort, and fuel economy.

Keywords: Cooperative collision avoidance system (CCAS)     Improved particle swarm optimization (PSO)     PID controller     Vehicle comfort     Fuel economy    

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 940-956 doi: 10.1631/FITEE.2000071

Abstract: Healthcare and telemedicine industries are relying on technology that is connected to the Internet. Digital health data are more prone to cyber attacks because of the treasure trove of personal data they possess. This necessitates protection of digital medical images and their secure transmission. In this paper, an encryption technique based on mutated with Lorenz and Lü is employed to generate high pseudo-random key streams. The proposed chaos- cryptic system operates on the integer wavelet transform (IWT) domain and a bio-inspired , unit for enhancing the confusion and diffusion phase in an approximation coefficient. Finally, an XOR operation is performed with a quantised chaotic set from the developed combined attractors. The algorithm attains an average entropy of 7.9973, near-zero correlation with an NPCR of 99.642%, a UACI of 33.438%, and a keyspace of 10. Further, the experimental analyses and NIST statistical test suite have been designed such that the proposed technique has the potency to withstand any statistical, differential, and brute force attacks.

Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗    

Areliable power management scheme for consistent hashing based distributed key value storage systems Article

Nan-nan ZHAO,Ji-guang WAN,Jun WANG,Chang-sheng XIE

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10,   Pages 994-1007 doi: 10.1631/FITEE.1601162

Abstract: Distributed key value storage systems are among the most important types of distributed storage systems currently deployed in data centers. Nowadays, enterprise data centers are facing growing pressure in reducing their power consumption. In this paper, we propose GreenCHT, a reliable power management scheme for consistent hashing based distributed key value storage systems. It consists of a multi-tier replication scheme, a reliable distributed log store, and a predictive power mode scheduler (PMS). Instead of randomly placing replicas of each object on a number of nodes in the consistent hash ring, we arrange the replicas of objects on nonoverlapping tiers of nodes in the ring. This allows the system to fall in various power modes by powering down subsets of servers while not violating data availability. The predictive PMS predicts workloads and adapts to load fluctuation. It cooperates with the multi-tier replication strategy to provide power proportionality for the system. To ensure that the reliability of the system is maintained when replicas are powered down, we distribute the writes to standby replicas to active servers, which ensures failure tolerance of the system. GreenCHT is implemented based on Sheepdog, a distributed key value storage system that uses consistent hashing as an underlying distributed hash table. By replaying 12 typical real workload traces collected from Microsoft, the evaluation results show that GreenCHT can provide significant power savings while maintaining a desired performance. We observe that GreenCHT can reduce power consumption by up to 35%–61%.

Keywords: Consistent hash table (CHT)     Replication     Power management     Key value storage system     Reliability    

Study on Data Locality and Its Optimization Technologies in Multiprocessor Systems

Yang Xuejun,Dai Huadong,Xia Jun

Strategic Study of CAE 2002, Volume 4, Issue 5,   Pages 44-52

Abstract:

As one of the most important issues in multiprocessor systems, data locality is a main direction of studies on such systems. Combining the recent research achievements by the authors with the current state of studies in this field, a systematic discussion on data locality and its optimization technologies in multiprocessor systems was brought forth. Driven by the deficiency of current locality measurement models, an enhanced model suitable for hierarchy parallel computer architectures was proposed. Besides, from the viewpoint of static locality optimization technologies, a data transformation framework based on projection and delaminating policy was designed. While on the side of dynamic locality optimization technologies, a dynamic page migration mechanism based on instantaneous access information was implemented. More discussion about both static and dynamic optimization policies was presented in this paper. In addition, in-depth investigation on memory consistency model ,which raised as a key problem in exploiting locality optimization, was also stressed and a new model centered on operating system——thread consistency model was put forward.

Keywords: computer     multiprocessorsystem     data locality     locality measurement model     data transformation framework     page migration     thread consistency model    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted data with support for data owners to share an aggregate searchable key with a user delegating search rights to a set of data. A user, in turn, is required to submit only one single aggregate trapdoor to the cloud to perform a keyword search across the shared set of data. However, the existing KASE methods do not support searching through data that are shared by multiple owners using a single aggregate trapdoor. Therefore, we propose a MULKASE method that allows a user to search across different data records owned by multiple users using a single trapdoor. In MULKASE, the size of the aggregate key is independent of the number of documents held by a data owner. The size of an aggregate key remains constant even though the number of outsourced ciphertexts goes beyond the predefined limit. Security analysis proves that MULKASE is secure against chosen message attacks and chosen keyword attacks. In addition, the security analysis confirms that MULKASE is secure against cross-pairing attacks and provides query privacy. Theoretical and empirical analyses show that MULKASE performs better than the existing KASE methods. We also illustrate how MULKASE can carry out federated searches.

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

& Research Article

Yaofeng TU, Rong XIAO, Yinjun HAN, Zhenghua CHEN, Hao JIN, Xuecheng QI, Xinyuan SUN,tu.yaofeng@zte.com.cn,xiao.rong1@zte.com.cn,han.yinjun@zte.com.cn,chen.zhenghua@zte.com.cn,jin.hao1@zte.com.cn,qi.xuecheng@zte.com.cn,sun.xinyuan@zte.com.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5,   Pages 716-730 doi: 10.1631/FITEE.2200466

Abstract: In s, replication and (EC) are common methods for data redundancy. Compared with replication, EC has better storage efficiency, but suffers higher overhead in update. Moreover, and reliability problems caused by s bring new challenges to applications of EC. Many works focus on optimizing the EC solution, including algorithm optimization, novel data update method, and so on, but lack the solutions for and reliability problems. In this paper, we introduce a storage system that decouples data updating and EC encoding, namely, decoupled data updating and coding (DDUC), and propose a data placement policy that combines replication and parity blocks. For the () EC system, the data are placed as groups of +1 replicas, and redundant data blocks of the same stripe are placed in the parity nodes, so that the parity nodes can autonomously perform local EC encoding. Based on the above policy, a two-phase data update method is implemented in which data are updated in replica mode in phase 1, and the EC encoding is done independently by parity nodes in phase 2. This solves the problem of data reliability degradation caused by s while ensuring high concurrency performance. It also uses persistent memory (PMem) hardware features of the byte addressing and eight-byte atomic write to implement a lightweight logging mechanism that improves performance while ensuring data . Experimental results show that the concurrent access performance of the proposed storage system is 1.70–3.73 times that of the state-of-the-art storage system Ceph, and the latency is only 3.4%–5.9% that of Ceph.

Keywords: Concurrent update     High reliability     Erasure code     Consistency     Distributed storage system    

2019 IABSE Congress

Conference Date: 4 Sep 2019

Conference Place: 美国/纽约/纽约市

Administered by: 国际桥梁与结构工程协会(IABSE)

Title Author Date Type Operation

Engineering DNA Materials for Sustainable Data Storage Using a DNA Movable-Type System

Zi-Yi Gong, Li-Fu Song, Guang-Sheng Pei, Yu-Fei Dong, Bing-Zhi Li, Ying-Jin Yuan

Journal Article

Selectively structural fractionation and economical-functionality conversion of lignocellulosic biomass

Chen Hongzhang,Qiu Weihua and Wang Lan

Journal Article

Big data storage technologies: a survey

Aisha SIDDIQA, Ahmad KARIM, Abdullah GANI

Journal Article

Energy consumption structure in China and the economic analysis of coupled wind power and coal to substitute natural gas

Yu Bo,Cao Chen and Gu Weidong

Journal Article

Cryptanalysis of an identity-based public auditing protocol for cloud storage

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Journal Article

U.S. green BIM application situation and its influence on Chinese construction field

Yang Yu,Yin Hang

Journal Article

SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems

Xingjun ZHANG, Ningjing LIANG, Yunfei LIU, Changjiang ZHANG, Yang LI

Journal Article

Automobile fuel saving without delay

Hu Xiaochun,Zhang Baoji,Jiang Fukang,Wang Xieqing

Journal Article

Using improved particle swarm optimization totune PID controllers in cooperative collision avoidance systems

Xing-chen WU, Gui-he QIN, Ming-hui SUN, He YU, Qian-yi XU

Journal Article

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Journal Article

Areliable power management scheme for consistent hashing based distributed key value storage systems

Nan-nan ZHAO,Ji-guang WAN,Jun WANG,Chang-sheng XIE

Journal Article

Study on Data Locality and Its Optimization Technologies in Multiprocessor Systems

Yang Xuejun,Dai Huadong,Xia Jun

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

&

Yaofeng TU, Rong XIAO, Yinjun HAN, Zhenghua CHEN, Hao JIN, Xuecheng QI, Xinyuan SUN,tu.yaofeng@zte.com.cn,xiao.rong1@zte.com.cn,han.yinjun@zte.com.cn,chen.zhenghua@zte.com.cn,jin.hao1@zte.com.cn,qi.xuecheng@zte.com.cn,sun.xinyuan@zte.com.cn

Journal Article

2019 IABSE Congress

4 Sep 2019

Conference Information