-
141
Research on 2.4 GHz Wireless Channel Propagation Characteristics in a Steel Ship Cabin
Published 2021-01-01“…Analysis of transmission ability of wireless signal in steel ship environment is important for network deployment including base station and node installation, which would directly impact network performance and has become a hot research field. …”
Get full text
Article -
142
Cloud computing forensic model
Published 2017-09-01“…Aiming at the main challenges facing cloud forensics,cloud characteristics were analyzed and a cloud forensic model was proposed.In the model,the deployment of persistent forensic readiness service,multi-round identification strategy based on “iteration” and multi-level evidence location method for distributed file system,“data isolation” and “on-demand collection” strategies,and the establishment of comprehensive evidence analysis platform based on cloud resources were presented.Finally,the validity of the model was analyzed combining the forensic scene in the cloud environment.…”
Get full text
Article -
143
Prediction of the RFID Identification Rate Based on the Neighborhood Rough Set and Random Forest for Robot Application Scenarios
Published 2020-01-01“…In order to optimize the RFID system hardware deployment strategy and improve the deployment efficiency, the prediction of the RFID system identification rate has become a new challenge. …”
Get full text
Article -
144
Maximizing the lifetime of wireless sensor networks in trains for monitoring long-distance goods transportation
Published 2017-05-01“…Then, a two-step efficient deployment heuristic is proposed to satisfy these constraints step by step. …”
Get full text
Article -
145
LTE Network Planning in Current Co-Existing GSM/TD-SCDMA/WLAN Systems
Published 2014-09-01“…The integrated modeling based on different wireless environment and scenarios were analyzed, and the mentality, method and techniques for LTE network planning in current co-existing GSM/TD-SCDMA/WLAN mobile systems were provided.…”
Get full text
Article -
146
Vers une modernisation énergétique : territorialisation conflictuelle et gouvernement de la critique des nouvelles infrastructures énergétiques en moyenne montagne
Published 2022-01-01“…This paper sets out to study the changes underway, dubbed “ecological transition”, through the prism of “ecological modernisation”, which involves fitting the environment into the capitalist mindset without making any fundamental changes in this regard. …”
Get full text
Article -
147
Towards Energy Modernisation: Conflictual Territorialisation and Government of Criticism of New Energy Infrastructure in Mid-Mountain Regions
Published 2021-12-01“…This paper sets out to study the changes underway, dubbed “ecological transition”, through the prism of “ecological modernisation”, which involves fitting the environment into the capitalist mindset without making any fundamental changes in this regard. …”
Get full text
Article -
148
Security of Cloud Computing
Published 2013-04-01“…Cloud security has been widely considered as the key factor restricting its development since the cloud computing technology emerged.The insecure factors of cloud computing system and the secure factors which cloud computing brings were presented and discussed.It was pointed out that cloud security depended on the validate deployment of the security policy.Cloud computing system is not less secure than native environment,as long as the right agreement is signed with cloud provider.Finally,the proposal of security policy was provided from both the cloud provider domain and the cloud user domain to ensure the security of cloud computing system.…”
Get full text
Article -
149
Systematic construction of operator’s intelligent customer service
Published 2020-07-01“…Starting from the intelligent development of operators’ important voice customer service and WeChat customer service,the problems and challenges in traditional operator customer service were analyzed firstly.The key technologies in the intelligent customer service objectively were evaluated,and how to combine artificial intelligence with operator customer service was systematically put forward.According to the actual situation of an operator's existing network,the key technology solutions of intelligent voice customer service and WeChat robot were proposed,and then how to promote practice in operators’ actual environment was introduced,including programs and effects about network reconstruction,AI capabilities open and intelligent application deployment.Finally,the application future prospects of intelligent customer service were outlooked.…”
Get full text
Article -
150
Cloud Backup Solution
Published 2015-07-01“…As a new data backup form,cloud backup service provides users with putting the local data backup to the remote cloud.The cloud backup is being more and more focused by the industry.Combined with the demand of data backup under cloud computing environment,three aspects of“end-pipe-cloud”cloud backup solution were comprehensively analyzed,including cloud backup client,cloud backup network channel and cloud backup resource pool.In addition,according to the different business scenarios and user demand,feasible public cloud and hybrid cloud backup solutions were proposed,which could provide an important reference for the research and deployment of related field.…”
Get full text
Article -
151
Global disparity in synergy of solar power and vegetation growth
Published 2025-01-01Get full text
Article -
152
EXPERIENCES OF CONDUCTING ONLINE EXAM PROCTORING IN LOW-RESOURCE SETTINGS: A SRI LANKAN CASE STUDY
Published 2023-02-01“…The data obtained from both the assignment and the survey was analyzed in order to make well-informed decisions about the future deployment of online proctoring technologies. This paper presents evidence of the experiment that strongly recommends that online exam proctoring solutions be developed after a careful examination of the constraints such as internet connection speed, stability, and affordability, as well as sudden power outages of the environment in which they will be utilised, in order to unlock the true potential of e-learning technologies. …”
Get full text
Article -
153
Supporting Preemptive Multitasking in Wireless Sensor Networks
Published 2014-02-01“…Supporting the concurrent execution of multiple tasks on lightweight sensor nodes could enable the deployment of independent applications on a shared wireless sensor network, thus saving cost and time by exploiting infrastructures which are typically underutilized if dedicated to a single task. …”
Get full text
Article -
154
Research on trust sensing based secure routing mechanism for wireless sensor network
Published 2017-10-01“…Aiming at the serious impact of the typical network attacks caused by the limited energy and the poor deployment environment of wireless sensor network (WSN) on data transmission,a trust sensing based secure routing mechanism (TSSRM) with the lightweight characteristics and the ability to resist many common attacks simultaneously was proposed.Based on the analysis of the characteristics of network attack,the trust degree calculation model was constructed by combining node’s behavior with energy,at the same time the security route selection algorithm was also optimized by taking trust degree and QoS metrics into account.Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.…”
Get full text
Article -
155
Green energy management in internet of things based on quality of service composition
Published 2017-10-01“…With the rapid development of internet of things technology,the energy consumption of service composition in the internet of things is a key issue to be studied.The service composition problem in the internet of things mostly focuses on the evaluation based on quality of service(QoS) at present and ignores the overall enerqy cornsumption during the dynamic deployment of service qrnposition.Therefore,a QoS evaluation model and an energy evaluation model was proposed for service composition in the internet of things.Finally,considering the service composition in the internet of things is NP hard,the moth-flame optimization (MFO) was successfully applied to the QoS evaluation model and the energy evaluation model.The experimental results show that MFO has a better optimization effect in the above model,so as to realize the green energy management of the quality of service composition in the environment of the internet of things.…”
Get full text
Article -
156
Design and construction of hierarchical and cross-regional SDN verification and demonstration system
Published 2018-11-01“…SDN architecture could bring excellent flexibility and manageability to the network.In order to provide a large-scale verification testbed and a pilot deployment environment for SDN-based new technologies and applications,a hierarchical and cross-regional SDN verification and demonstration system over CERNET was proposed,and a SDN verification and demonstration core network consisted of nine cities and thirteen nodes and an access network containing three data centers was built.Based on this system,several SDN-based technologies and applications such as CPE virtualization line service,IPv4/IPv6 transition technology,traffic monitoring and scheduling application and data center applications were deployed,verified and demonstrated.…”
Get full text
Article -
157
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
158
Construction of Private Cloud Computing Platform Based on Open Source Software
Published 2013-01-01“…Based on this, this paper presented the construction example of private cloud computing platform based on OpenStack, which major processes included configuration of base environment, components installation of Nova, Glance, Swift, Keystone and Horizon, deployment of virtual machines, and finally discussed the platform application examples in the cloud computing software testing.…”
Get full text
Article -
159
Design of Intelligent Community System Based on Passive Optical Network and Middleware Technology
Published 2015-05-01“…According to the actual needs of smart city and community life,the intelligent community system architecture,the smart services platform,the smart services middleware suite,the PON networking scheme for community,and the intelligent community integrated services applications were proposed,which provided a fast and convenient method of application access and deployment for a variety of intelligent community service. …”
Get full text
Article -
160
Functional requirements and design of simulation cloud platform for data center
Published 2017-05-01“…Electric power information system is related with the safe operation of grid.To ensure the running stability of information system,comprehensive test was needed to conduct before the system is running.Considering actual needs of the power industry at present,it's necessary to establish independent environment to conduct function of in-formation system and non-functional test so as to achieve effective operation and maintenance of information system,finding loopholes and improving robustness of the system.Based on the analysis of development of cloud data center simulation platform,the research studies construction technology,which applies to the data center cloud platform and puts forward deployment implementation plan targeted to functional requirements of platform.In this way,the guid-ance role of construction was achieved on the later cloud platform.…”
Get full text
Article