Showing 781 - 800 results of 1,254 for search '"Cloud"', query time: 0.05s Refine Results
  1. 781

    Research on the Construction of Intelligent Media Ideological and Political Learning Platform Based on Artificial Intelligence Technology by Jingsheng Wang, Siyuan Hu

    Published 2022-01-01
    “…We build an artificial intelligence open source development platform framework based on the cloud platform and use the Ceph method to optimize the storage of artificial intelligence training platform data. …”
    Get full text
    Article
  2. 782

    A fluid flow model for the software defined wide area networks analysis by Karol Marszałek, Adam Domański

    Published 2025-01-01
    “…Abstract The advancement of IT systems necessitates efficient communication methods essential across various sectors, from streaming platforms to cloud-based solutions and Industry 4.0 applications. …”
    Get full text
    Article
  3. 783

    Every Second Counts: Integrating Edge Computing and Service Oriented Architecture for Automatic Emergency Management by Lei Chen, Cristofer Englund

    Published 2018-01-01
    “…The choreography can be synthesized to generate detailed specification on peer-to-peer interaction logic, and then the specification can be enacted and deployed on cloud infrastructures.…”
    Get full text
    Article
  4. 784

    Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks by Kang Xie, Yixian Yang, Ling Zhang, Maohua Jing, Yang Xin, Zhongxian Li

    Published 2014-01-01
    “…In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM) migration detection algorithm based on the cellular neural networks (CNNs), is presented. …”
    Get full text
    Article
  5. 785

    This is Not a Nest by Jean-Pierre Chupin

    Published 2020-07-01
    “…We first dig into a sample of competition projects nicknames (Crystal, Birds’Nest, DNA, Cloud, Lace, Stealth, etc.) to confirm that these tropes have a paradoxical status at the intersection of architects’ intents and the public expectations. …”
    Get full text
    Article
  6. 786

    Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study by Riccardo Mennilli, Luigi Mazza, Andrea Mura

    Published 2025-01-01
    “…In the context of Industry 4.0, edge computing aims to process data directly on local devices rather than relying on a cloud infrastructure. This approach minimizes latency, enhances data security, and reduces the bandwidth required for data transmission, making it ideal for industrial applications that demand immediate response times. …”
    Get full text
    Article
  7. 787

    The use of an automatic remote weight management system to track treatment response, identified drugs supply shortage and its consequences: A pilot study by Idan Roth, Ohad Cohen

    Published 2025-01-01
    “…Methods The pilot study involved 11 participants using Semaglutide for weight management, monitored over a 12-month period. A cloud-based, Wi-Fi-enabled remote weight management system collected and analyzed daily weight data from smart scales. …”
    Get full text
    Article
  8. 788

    A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls by Jun-Hyung Park, Sung-Chae Park, Heung-Youl Youm

    Published 2025-01-01
    “…However, the constraints of isolated network environments and the limitations of existing security frameworks hinder the adoption of cutting-edge technologies such as AI and cloud computing, as well as the safe utilisation of data. …”
    Get full text
    Article
  9. 789

    Sustainable Development in the Digital Age: Harnessing Emerging Digital Technologies to Catalyze Global SDG Achievement by Claudiu George Bocean

    Published 2025-01-01
    “…This research explores the transformative potential of cutting-edge digital technologies—including artificial intelligence, big data analytics, cloud computing, and the Internet of Things—in fostering sustainable development across economic, social, and environmental dimensions. …”
    Get full text
    Article
  10. 790

    Climate change and the single cell by Derek T. A. Lamport

    Published 2024-12-01
    “…Stomata act as crucial regulatory components of a water hypercycle that contributes to the homeostasis of a warming planet by regulating evaporative cooling and reflective cloud cover generated by vast tropical rainforests of the South and the equally vast arboreal forests of the North. …”
    Get full text
    Article
  11. 791

    Simulation of IoT Smart Home Network with Decision Making Based on MajorDoMo Platform by U. A. Vishniakou, ChuYue Yu

    Published 2023-03-01
    “…The purpose of the article is to model a smart home with decision-making and the use of the MajorDoMo IoT platform instead of a cloud platform. The main features of the article are: modeling of the IoT network for controlling the control unit on the MajorDoMo platform, the use of the MajorDoMo IoT platform in the Windows system for making decisions when controlling household appliances (fan or air conditioner) based on the temperature and humidity values received from a smartphone modeling sensors, transmitting the results of controlled data to the user's home page. …”
    Get full text
    Article
  12. 792

    Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing by Jie Liu, Li Zhu

    Published 2021-01-01
    “…Edge computing changes the traditional centralized cloud computing processing method into a method that reduces computing storage capacity to the edge of the network and faces users and terminals. …”
    Get full text
    Article
  13. 793

    Modeling and Research on Human Capital Accumulation Complex System of High-Tech Enterprises Based on Big Data by Yanan Shen

    Published 2021-01-01
    “…In addition, complex systems were modeled based on big data, and a cloud computing-based human capital big data analysis platform was established. …”
    Get full text
    Article
  14. 794

    Cable Force Measurement of Cable-Stayed Bridge Based on Microwave Radar Test Technology by Gongjian Che, Ruixin Jia, Kaiquan Liu, Shangqing Zhu, Jianxin Hu

    Published 2024-01-01
    “…In this regard, this paper introduces the principle of microwave radar measurement technology and uses the microwave cable force measuring instrument to perform noncontact microwave radar cable force measurement on a total of 72 stay cables in Shifeng Bridge and San-Jiadian Bridge compared with the measurement results of the cloud smart collector. The results show that the fundamental frequency deviation rate of 71 cables is within 3%, and the cable force deviation rate of 67 cables is within 5%. …”
    Get full text
    Article
  15. 795

    Spinning Process Test and Optical Topography Measurement Technology for the Shell with Longitudinal and Latitudinal Inner Ribs by Wei Liang, Qiongying Lv, Lin Guan, Zhigang Xing

    Published 2019-01-01
    “…The measurement problem of inner ribs is solved by building of the robot shape measurement system which helps detect the three-dimensional shape of the inner ribs, and the precision of the spun sample was detected by the point cloud deviation comparison.…”
    Get full text
    Article
  16. 796

    Promotion of freelance services in the digital environment by L. G. Akhmaeva

    Published 2024-04-01
    “…The main methods of promoting freelance services in the digital environment are identified: a portfolio site, active maintenance of a professional profile in social networks and its advertising, registration on aggregator sites, freelance and human-cloud platforms. The main element of the portfolio site is highlighted – the works performed by a freelancer (texts, photographs, graphics and similar materials) – along with the key factors that a freelancer needs to consider when creating and maintaining a portfolio site and the most common mistakes…”
    Get full text
    Article
  17. 797

    Dynamical Model about Rumor Spreading with Medium by Xiaxia Zhao, Jianzhong Wang

    Published 2013-01-01
    “…Usually, it can induce a cloud of pressure, anxiety, and panic. Traditionally, it is propagated by word of mouth. …”
    Get full text
    Article
  18. 798

    A Survey on Energy Harvesting and Integrated Data Sharing in Wireless Body Area Networks by Xiaoling Xu, Lei Shu, Mohsen Guizani, Mei Liu, Junye Lu

    Published 2015-10-01
    “…In this attempt, we focus mostly on energy acquisition, data integration and data sharing, and collaboration of WBANs, from the viewpoint of energy harvesting development, the social network and smartphone application in WBANs, and the integration of WBANs and cloud system networks computing to analyze related issues of WBANs. …”
    Get full text
    Article
  19. 799

    Mechanical Damage Test and Model Study of Layered Composite Rock Based on Acoustic Emission and DIC Characteristics by Xianyin Qi, Zhen Yang, Shengwei Wang, Peng Fu

    Published 2022-01-01
    “…The corresponding law of AE ringing count and rock damage evolution was studied and the damage process of layered composite rock under uniaxial loading was divided into three stages: initial damage, stable damage development, and damage acceleration. Analysis of strain cloud diagrams of the DIC system revealed that the deformation characteristics of the layered composite rock under uniaxial were mainly tensile-shear-slip damage. …”
    Get full text
    Article
  20. 800

    Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles by Qiyi He, Xiaolin Meng, Rong Qu

    Published 2020-01-01
    “…It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.…”
    Get full text
    Article