scholarly journals Cloud-to-end Rendering and Storage Management for Virtual Reality in Experimental Education

2020 ◽  
Vol 2 (4) ◽  
pp. 368-380
Author(s):  
Hongxin Zhang ◽  
Jin Zhang ◽  
Xue Yin ◽  
Kan Zhou ◽  
Zhigeng Pan
2014 ◽  
Vol 687-691 ◽  
pp. 4906-4909
Author(s):  
Yan Li Wang ◽  
Ji Meng Du ◽  
Sai Sai Xu

Because of a vast amount of business process, difficult tracking, low turnover efficiency, processing of logistics management information behind time and with antiquated means, the application of advanced RFID technology in the field of logistics and storage management is proposed to solve the above problems on the basis of analyzing the shortages. In this paper, the logistics warehouse management information system based on RFID is conducted. The working flow and process structure of the logistics and storage arc given on the basis of analysis of the traditional logistics and storage service flow. The integral framework of the logistics and storage service system based on RFID technology is established. This thesis mainly does research about the pattern of RFID application in warehouse, the system framework and the information flow. On the base, it designs the information system and realizes its function module.


2021 ◽  
Vol 98 (06) ◽  
pp. 101-110
Author(s):  
Leif Jay B. De Sagun ◽  
◽  
Joel E. Asuncion ◽  
Hanz Carlo G. Rafols ◽  
◽  
...  

The information of the citizens identity are reposited in the national database system that demands higher degree of security features in order to combat the privacy problems associated with it. The information retained within an identity of a citizen is highly valuable as well as sensitive as it is constructed by integrating various forms of biometric trails e.g. iris, fingerprint etc along with their personal details. Aadhar is one of such initiatives by Government of India by their “Unique Identification Authority of India (UIDAI) project” that generates 12-digit random number as unique identity. The Government of India is in progressive approach to integrate various social and security related applications to Aadhar in order to achieve identification-based service provisioning. In the recent news, Aadhar details have been reported to be encountered a serious security breach that endangered the private details of the Aadhar card holders. Therefore, a robust and efficient secure eco-system is required to keep national ID database secure. This chapter aims to describe novel framework for Aadhar data privacy and storage management by adopting efficient data blockage and transformation over cloud storage using statistical method based on data embedding by blocking and transformation.


Author(s):  
Francky Catthoor ◽  
Koen Danckaert ◽  
Chidamber Kulkarni ◽  
Erik Brockmeyer ◽  
Per Gunnar Kjeldsberg ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document