Showing 261 - 280 results of 590 for search '"Deployment environment', query time: 0.07s Refine Results
  1. 261

    Artificial intelligence on the agro-industry in the United States of America by Jahanara Akter, Sadia Islam Nilima, Rakibul Hasan, Anamika Tiwari, Md Wali Ullah, Md Kamruzzaman

    Published 2024-10-01
    “…Despite its numerous advantages, the deployment of AI in agriculture does not come without challenges. …”
    Get full text
    Article
  2. 262

    System of systems method and formal function decomposition for software systems by LU Han-hua, ZHANG Shun-yi, WANG Ya-shi, MIN Li-juan

    Published 2010-01-01
    “…Based on the theory and method of system of system(SoS),the research work for the formal functional de-composition and estimation of large scale and open software systems was described,which were often emerged in IOT(internet of things) and cloud computing environments.It was proposed that abstraction description was necessary for the SoS properties of a large scale and open software system.Based on system abstract,formal methods for functional decomposition and estimation were described.The applications of the methods in system development and stable inter-mediate form building were discussed.The methods proposed here are helpful for improving the processes of implemen-tation,deployment and maintenance of large scale and open software systems in IOT and cloud computing environments.…”
    Get full text
    Article
  3. 263

    Time Zero for Net Zero: A Coal Mine Baseline for Decarbonising Heat by Alison A. Monaghan, Luke Bateson, Adrian J. Boyce, Neil M. Burnside, Rebecca Chambers, Julia R. de Rezende, Eilidh Dunnet, Paul A. Everett, Stuart M. V. Gilfillan, Muhammad S. Jibrin, Gareth Johnson, Richard Luckett, Donald John MacAllister, Alan M. MacDonald, John W. Moreau, Laura Newsome, Alessandro Novellino, Barbara Palumbo-Roe, Ryan Pereira, Douglas Smith, Mike J. Spence, Vanessa Starcher, Helen Taylor-Curran, Christopher H. Vane, Thomas Wagner, David B. Walls

    Published 2022-12-01
    “…Mine water geothermal energy could provide sustainable heating, cooling and storage to assist in the decarbonisation of heat and achieving Net Zero carbon emissions. However, mined environments are highly complex and we currently lack the understanding to confidently enable a widespread, cost-effective deployment of the technology. …”
    Get full text
    Article
  4. 264
  5. 265

    AI augmented edge and fog computing for Internet of Health Things (IoHT) by Deepika Rajagopal, Pradeep Kumar Thimma Subramanian

    Published 2025-01-01
    “…Cloud computing delivers resources over the Internet and enables the deployment of an infinite number of applications to provide services to many sectors. …”
    Get full text
    Article
  6. 266

    Single-cell sequencing provides clues about the developmental genetic basis of evolutionary adaptations in syngnathid fishes by Hope M Healey, Hayden B Penn, Clayton M Small, Susan Bassham, Vithika Goyal, Micah A Woods, William A Cresko

    Published 2025-02-01
    “…Finally, we found that epidermal cells expressed nutrient processing and environmental sensing genes, potentially relevant for the brooding environment. …”
    Get full text
    Article
  7. 267

    Development of biodegradable magnesium alloy stents with coating by Lorenza Petrini, Wei Wu, Dario Gastaldi, Lina Altomare, Silvia Farè, Francesco Migliavacca, Ali Gökhan Demir, Barbara Previtali, Maurizio Vedani

    Published 2014-07-01
    “…The coating will dissolve in a longer term, thus delaying the exposition of the magnesium stent to the corrosive environment. We dealt with the problem exploiting the potentialities of a combined approach of experimental and computational methods (both standard and ad-hoc developed) for designing magnesium alloy, coating and scaffold geometry from different points of views. …”
    Get full text
    Article
  8. 268
  9. 269

    Automation of urban technological census. The historical centre of Bethlehem by Elisabetta Doria

    Published 2022-12-01
    “… The research proposal reports the outcomes of a research track concerning the automation of the architectural census of technological elements in urban environments, aiming at the development of a monitoring and management system for the built heritage. …”
    Get full text
    Article
  10. 270

    Evaluation of vegetable pigeonpea [Cajanus cajan (L.) Millsp] genotypes for yield stability by J. D. Ojwang, R. Nyankanga, N. V. P. R. G. Ganga Rao, J. Imungi

    Published 2021-10-01
    “…Kambi ya Mawe, Katumani and Kiboko had higher IPCA1, indicating greatest interactive environments and adapted genotypes. Kambi ya Mawe, was the most ideal location for evaluating pigeonpea genotypes. …”
    Get full text
    Article
  11. 271

    Outdoor Massive MIMO Testbed With Directional Beams: Design, Implementation, and Validation by Spandan Bisoyi, Pasupuleti Muralimohan, Harish Kumar Dureppagari, Pavan Reddy Manne, Kiran Kuchi

    Published 2025-01-01
    “…In this work, we study the achievable multiuser MIMO gains in an outdoor environment by deploying narrow directional beams using a rectangular antenna structure having 48 antenna ports (192 antenna elements), each port with a beamwidth of 30° in azimuth and 90° in elevation. …”
    Get full text
    Article
  12. 272

    Les cartes redistribuées de la gestion locale de l’eau : la mise en œuvre de la réforme « Gemapi » dans l’aire métropolitaine montpelliéraine by Sylvain Barone, Stéphane Ghiotti

    Published 2023-06-01
    “…An important evolution has occurred in local water management since 2014 with the so-called Gemapi reform (management of aquatic environments and flood prevention) and its deployment at the local level. …”
    Get full text
    Article
  13. 273

    Supporting Collaborative Privacy-Observant Information Sharing Using RFID-Tagged Objects by Shin'ichi Konomi, Chang S. Nam

    Published 2009-01-01
    “…Our experiments of RFID-triggered information sharing have identified usability, deployment, and privacy issues of physically based information systems. …”
    Get full text
    Article
  14. 274

    A A Fingerprint-Based Attendance System for Improved Efficiency by Olayiwola Charles Adesoba, Israel Mojolaoluwa Joseph

    Published 2025-01-01
    “…The system's successful deployment demonstrates its potential to improve operational efficiency and educational outcomes in resource-constrained environments. …”
    Get full text
    Article
  15. 275

    The Impact of GPT Models on Education: Enhancing Learning Outcomes and Addressing Challenges by Yang Nuoya

    Published 2025-01-01
    “…Key areas of focus include the deployment of GPT in adaptive learning platforms, its role in automating grading processes, and its capacity to generate interactive and engaging educational content. …”
    Get full text
    Article
  16. 276

    Dual-stack host discovery method based on SSDP and DNS-SD protocol by Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU

    Published 2023-02-01
    “…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
    Get full text
    Article
  17. 277

    The Art and life of Alàgbà Fálétí – A Pic torial, Art and Artifacts Exhibition in Honor of Alàgbà Adébáyọ̀ Fálétí (1921- 2017) curated by Akinsola Adejuwon and Seyi Ogunjobi... by Akinsola Adejuwon

    Published 2021-12-01
    “…It is an assessment of a thematic display of selected pictures and objects which probably placed the observer within the environment and with people Fálétí related with. The images, pictures, artworks and objects in the display were segmented into five major parts. …”
    Get full text
    Article
  18. 278
  19. 279

    Evolution within a given virulence phenotype (pathotype) is driven by changes in aggressiveness: a case study of French wheat leaf rust populations by Fontyn, Cécilia, Meyer, Kevin JG, Boixel, Anne-Lise, Delestre, Ghislain, Piaget, Emma, Picard, Corentin, Suffert, Frédéric, Marcel, Thierry C, Goyeau, Henriette

    Published 2023-04-01
    “…Plant pathogens are constantly evolving and adapting to their environment, including their host. Virulence alleles emerge, and then increase, and sometimes decrease in frequency within pathogen populations in response to the fluctuating selection pressures imposed by the deployment of resistance genes. …”
    Get full text
    Article
  20. 280

    Indoor Massive MIMO Channel Modelling Using Ray-Launching Simulation by Jialai Weng, Xiaoming Tu, Zhihua Lai, Sana Salous, Jie Zhang

    Published 2014-01-01
    “…We simulate the models in indoor wireless network deployment environments and compare the simulation results with measurements. …”
    Get full text
    Article