Showing 421 - 440 results of 9,723 for search '"Architecture"', query time: 0.07s Refine Results
  1. 421

    Architecture of a new infrastructure for data service in DT era by Gengsheng HUANG, Yuhong HUANG, Manxue GUO, Jianping ZHENG, Xin GE

    Published 2022-07-01
    “…Data technology (DT) era centered on the data technology and data service was coming.To handle the major challenges in the data exchange and transactions, a new infrastructure - data sharing service network (DSSN) was proposed, which provided the data interconnection, exchange, transactions, supervision and other services for regulators, data providers, data applications and technical support providers.The design principles of DSSN system were outlined as compliance, security, fairness, openness and connection service.And the architecture of DSSN system was designed according to the principles.A layered architecture was applied to the data sharing service node with the service control layer and service capability layer.The data node was composed of the data sharing dedicated server and data source, and was connected to DSSN through data gateway.…”
    Get full text
    Article
  2. 422
  3. 423
  4. 424

    Communication and Security Integrated Space-Earth Heterogeneous Network Architecture by Xiaoning ZHANG, Lidong ZHU

    Published 2020-12-01
    “…To achieve the integration of space information networks and high-speed rail, ship and civil aviation private communication networks, this article proposes to leverage the mechanism of identifi er and locator separation to construct the communication and security integrated space-earth heterogeneous network architecture.The proposed network architecture included four network layers (i.e., space-earth heterogeneous network service layer, space-earth heterogeneous network traffi c layer, space-earth heterogeneous network routing layer and space-earth heterogeneous network access layer) and fi ve network identifi ers (i.e., service identifi er, traffi c identifi er, routing identifi er, access identifi er and host identifi er).With the method of effi cient network identifi er mapping, the communication and security integrated requirement for space information networks and ground private communication networks could be guaranteed.…”
    Get full text
    Article
  5. 425

    Internal Extensions: A Case for The Reassessment of the Architectural Phenomenon of Greenhouse by Ognjen Šukalo, Maja Milić Aleksić, Slobodan Peulić

    Published 2024-11-01
    “…Glasshouses, greenhouses, conservatories and orangeries – all types of buildings intended specifically for plant cultivation – represent a relatively recent addition to the histories and repertoires of horticulture, agriculture and architecture. During approximately three centuries of their notable existence, these structures managed to not only enable the growth of exotic plants removed far from their natural range but also to form a particular genre of architecture, which developed through different phases, from feeble experiment through high exclusivity to near irrelevance – and back into new paradigms of vegetation-culture-architecture relationship. …”
    Get full text
    Article
  6. 426
  7. 427
  8. 428

    Future IP network architecture evolution for service and network collaboration by Bing HUANG, Bin TAN, Jian LUO, Yong GUO

    Published 2021-10-01
    “…As the technical foundation of the internet, how IP technology develops in the next 5 to 10 years is the key issue facing the communication industry.The success and weakness of the traditional IP network architecture were analyzed, and the future IP network should not only inherit the design principles of the traditional IP technology was proposed, such as the end-to-end principle and layered decoupling principle, but also solve the problem that the service is too separated from the network.From the perspective of network evolution and future service requirements, the core issue of future IP networks is to strengthen the collaboration of between services and networks , and the improved IP network design principle “horizontal: end-to-end principle empowered by service-oriented network, vertical: layered model supported by intelligent control plane” was proposed, and based on this principle, the reference architecture of the future network was proposed.…”
    Get full text
    Article
  9. 429
  10. 430
  11. 431

    Les SCOP d’architecture : un modèle de coopération ? by Fanny Delaunay, Estelle Gourvennec

    Published 2020-12-01
    “…This article proposes to shed some light on a subdivision of architectural firms that have chosen to operate under the cooperative model. …”
    Get full text
    Article
  12. 432

    Concevoir et apprendre, deux expériences homologues en architecture by Marion Howa, Daniel Estevez

    Published 2023-07-01
    “…From a pragmatic perspective in architecture, experience is a fundamental structural element of any critical design process. …”
    Get full text
    Article
  13. 433

    Flow consistency in an intensive SDN security architecture with multiple controllers by Ying-ying LV, Yun-fei GUO, Chao QI, Qi WU, Ya-wen WANG

    Published 2017-12-01
    “…As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.…”
    Get full text
    Article
  14. 434
  15. 435

    Analysis of Artificial Neural Network: Architecture, Types, and Forecasting Applications by Manogaran Madhiarasan, Mohamed Louzazni

    Published 2022-01-01
    “…This paper illustrates the different artificial neural network architectures, types, merits, demerits, and applications. …”
    Get full text
    Article
  16. 436

    Architecture evolution and bandwidth analysis of 5G bearer networks by Chunhua ZHAO

    Published 2019-02-01
    “…The influence of 5G mobile network architecture evolution on bearer network was demonstrated.A comparison of fiber requirement between 5G front-haul network and fixed broadband access network was proposed.The various bearer schemes in fiber shortage area were introduced.The characteristics of various device networking solution were summarized.The influence on bearer network architecture and bandwidth was analyzed when 5G core network moved down to the metro core DC and metro edge DC.The bandwidth calculation model on mobile metro mid-haul and back-haul network was presented.Bandwidth calculations on each layer of the networks were provided.Calculation results show that compared with 4G network,bandwidth requirements on bearer back-haul network are greatly increased as the bandwidth of the wireless side of the 5G network increases.The growth trend of the metro back-haul and export bandwidth is slowed down with the core network moving down and the deployment of CDN and MEC.…”
    Get full text
    Article
  17. 437

    New Architecture of Foreign Direct Investment Regulation in the European Union by D. E. Moiseeva, A. D. Kulinich

    Published 2024-11-01
    “…This shift directly impacts a wide range of stakeholders.The study aims to explore the institutional architecture established by Regulation 2019/452 and address the research question: Why has the EU transitioned from a neoliberal approach favoring free capital movement (negative integration) to a framework emphasizing common European monitoring rules (positive integration)? …”
    Get full text
    Article
  18. 438
  19. 439
  20. 440

    Timeout threshold estimation algorithm in mimic multiple executors architecture by Delei NIE, Obo ZHA, Chong WANG, Xin WANG, Binghao YAN

    Published 2018-10-01
    “…Aiming at the problem that the current timeout strategy algorithm is difficult to cope with the violent situation of task volume,a timeout threshold prediction algorithm based on equivalent proportional execution time applied to the mimetic defense architecture system is proposed.The algorithm utilizes the principle that the execution time of multiple functional equivalent executable tasks in the mimetic defense architecture is positively related,predicts the task execution time and sets a reasonable timeout threshold.The simulation results show that the proposed algorithm can dynamically predict and set the timeout threshold for different task situations,which effectively improves the timeout judgment efficiency,especially for scenarios with dramatic changes in workload.…”
    Get full text
    Article