Showing 1,221 - 1,240 results of 2,372 for search '"cloud"', query time: 0.05s Refine Results
  1. 1221
  2. 1222

    基于层次分析—模糊评价的云计算安全评估与对策 by Ai-min YANG, Fang GAO, Min-hua BIAN, Shu-lei YANG

    Published 2016-10-01
    “…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
    Get full text
    Article
  3. 1223

    التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة by د. ممدوح علی محمود

    Published 2016-10-01
    “…This study aimed at introducing the concept of cloud storing; its definition,importance, advantages, disadvantages, challenges and ways to overcome thesechallenges as well as aspects of benefit of cloud storing to the field of libraries.The study used the analytical descriptive approach, and reached the followingresults: there is a high possibility of making use of cloud storing in all institutionsincluding libraries. …”
    Get full text
    Article
  4. 1224

    Innovative IaaS Management System for Sensor Devices and IT Resources by Hitomi Takahashi, Takayuki Kushida

    Published 2014-06-01
    “…To solve these problems, we propose the innovative IaaS management system for sensor devices in which the sensor devices are managed as one of the IT resources in the same way as CPUs, storage, and networks in the cloud computing. We call this cloud environment “Sensor Cloud (SC).” …”
    Get full text
    Article
  5. 1225

    Radiative forcing from the 2020 shipping fuel regulation is large but hard to detect by Jianhao Zhang, Yao-Sheng Chen, Edward Gryspeerdt, Takanobu Yamaguchi, Graham Feingold

    Published 2025-01-01
    “…We find low detectability of the cloud radiative effect of this event, attributed to strong natural variability in cloud albedo and cloud cover. …”
    Get full text
    Article
  6. 1226

    An architecture of database-based open resource service networking by Fenlin ZHOU, Xiaocong QIAN, Dongyu YUAN

    Published 2023-08-01
    “…The deep cloud-network integration hopes that the network side can provide fine-grained and on-demand customized services for cloud-side services, which poses a great challenge to existing IP bearer networks.To this end, an architecture of database-based open resource service networking was proposed.By abstracting the atomic service capabilities of the network and publishing services through a strongly consistent distributed key-value database, on-demand use of networking services at the cloud-side, joint cloud-network orchestration, and one point of business access could be achieved, which could flexibly meet the needs of cloud-network integration and achieve efficient carrying and refined services for diversified businesses.…”
    Get full text
    Article
  7. 1227

    Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring by Alde Alanda, H.A Mooduto, Ronal Hadi

    Published 2023-09-01
    “… As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. …”
    Get full text
    Article
  8. 1228

    Research and implementation of intelligent endogenous technology for SDN cooperative controller by Le ZHANG, Yanqin WU, Ke ZHANG, Dongfeng MAO, Song JIANG, Huawei HU

    Published 2021-12-01
    “…In the face of new demands and challenges such as business diversification, data quantification and cloud network integration, the ideas and methods of cloud network operation are changing.As the core capability of the new generation of cloud network operation system, SDN controller was deeply integrated with artificial intelligence technology.The key technologies and application practices of full-process closed-loop autonomy capability including intention analysis, cloud network intelligence perception, guarantee, optimization and automatic execution were studied to form intelligent endogenous capability of SDN controller.Firstly, the SDN controller intelligent endogenous development background and significance were clarified.And then, the ability of intelligent endogenous architecture and distribution of core competence were illustrated, which gradually form the whole process of the closed loop cloud network autonomy.Finally, focusing on 5G slice, SRv6 scene of new technology new business use cases, the intelligent perception, independent guarantee, automatic optimization of the key aspects of technology, and the effect of implementation and application were resolved.Through capability architecture design, key capability research and development, implementation verification and layout in standardization, the internal intelligence of SDN controller would gradually mature and enable smart operation of cloud network.…”
    Get full text
    Article
  9. 1229
  10. 1230

    Development and Application of a New Convective Entrainment Rate Parameterization for Improving Precipitation Simulation Over the Tibetan Plateau and Its Surrounding Areas by Junjun Li, Chunsong Lu, Jinghua Chen, Jian Li, Jing Yang, Xiaoqi Xu, Lei Zhu, Xin He, Shiying Wu

    Published 2025-01-01
    “…Third, in terms of cloud microphysics, the increased entrainment rate reduces the cloud water content and weakens the intensity of convective precipitation. …”
    Get full text
    Article
  11. 1231

    An Autonomous Positioning Method for Drones in GNSS Denial Scenarios Driven by Real-Scene 3D Models by Yongqiang Cui, Xue Gao, Rui Yu, Xi Chen, Dingwen Wang, Di Bai

    Published 2025-01-01
    “…Next, the corresponding real-scene 3D point cloud data within the point cloud dataset is extracted in accordance with the image-matching results. …”
    Get full text
    Article
  12. 1232

    Climatology of Total Cloudiness in the Arctic: An Intercomparison of Observations and Reanalyses by Alexander Chernokulsky, Igor I. Mokhov

    Published 2012-01-01
    “…Total cloud fraction over the Arctic (north of 60°N) has been evaluated and intercompared based on 16 Arctic cloud climatologies from different satellite and surface observations and reanalyses. …”
    Get full text
    Article
  13. 1233

    An Efficient Data Analysis Framework for Online Security Processing by Jun Li, Yanzhao Liu

    Published 2021-01-01
    “…Most existing studies on traditional cloud data security analysis were focused on inspecting techniques for block storage data in the cloud. …”
    Get full text
    Article
  14. 1234

    English Writing Correction Based on Intelligent Text Semantic Analysis by Shuang Yang

    Published 2022-01-01
    “…Moreover, this paper deduces the relationship formula between the range of English semantic information cloud drop and the evaluation word through the contribution of cloud drop group to qualitative concepts, the association between cloud drop central area and evaluation words, and the relationship between cloud drop ring area and evaluation word. …”
    Get full text
    Article
  15. 1235

    Assessment of the Symmetry and Deformation of a Submarine Hull Using the PCSE Method by Dąbrowski Paweł, Marchel Łukasz, Kiciński Radosław, Lindenbergh Roderik

    Published 2024-12-01
    “…The paper presents a new dry-dock method for assessing the deformation of submarine hulls using TLS point cloud data and the point cloud spatial expansion method (PCSE). …”
    Get full text
    Article
  16. 1236

    Verifiable attribute-based searchable encryption scheme based on blockchain by Xixi YAN, Xiaohan YUAN, Yongli TANG, Yanli CHEN

    Published 2020-02-01
    “…For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was proposed.The ciphertext policy attribute-based encryption mechanism was used on the shared key to achieve fine-grained access control.Ethereum blockchain technology was combined to solve the problem of incorrect search results returned by the semi-honest and curious cloud server model,so it could prompt both the cloud server and the user to follow the rules of the contract honestly and achieved service-payment fairness between the user and the cloud server in the pay-per-use cloud environment.In addition,based on the irreversible modification of the blockchain,the cloud server was guaranteed to receive the service fee,and the user was assured to obtain the correct retrieval results without additional verification which reduced the computational overhead of the user.The security analysis shows that the scheme satisfies the semantic security against adaptive chosen keyword attack and can protect the privacy of users and the security of data.The performance comparison and experimental results show that the scheme has certain optimizations in security index generation,search token generation,retrieval efficiency and transaction quantity,so it is more suitable for one-to-many search scenarios such as smart medical.…”
    Get full text
    Article
  17. 1237

    Potential impacts of marine fuel regulations on an Arctic stratocumulus case and its radiative response by L. F. Escusa dos Santos, L. F. Escusa dos Santos, H. C. Frostenberg, A. Baró Pérez, A. M. L. Ekman, A. M. L. Ekman, L. Ickes, E. S. Thomson

    Published 2025-01-01
    “…Compliance measures affect the physicochemical properties of exhaust particles and their cloud condensation nucleus (CCN) activity in different ways, with the potential to have both direct and indirect impacts on atmospheric processes such as the formation and lifetime of clouds. …”
    Get full text
    Article
  18. 1238

    Virtual reality compressing and transmitting system based on mobile edge computing by Bin TAN, Songyuan ZHAO, Jun WU, Wenru ZHANG

    Published 2020-04-01
    “…In order to solve the problem of the high requirements of data transmission rate and sensitivity to transmission delay in virtual reality (VR) based on cloud services,a Cloud VR system with MEC (mobile edge computing) was proposed,mainly including viewpoint-based VR processing and HDA (hybrid digital-analog) transmission optimization.Firstly,a dynamic streaming method based on user viewpoint and pyramid projection was used to implement a complete edge cloud VR system.Then,HDA transmission was introduced to optimize the transmission,and a heuristic algorithm for resource allocation was given.Finally,the base station protocol stack was transformed,and the MEC was integrated into the LTE (long term evolution) system to implement a complete mobile edge cloud VR system.Experimental results demonstrate that the proposed scheme has good robustness and efficient transmission by comparing with the existing schemes.…”
    Get full text
    Article
  19. 1239

    3D Modeling of Sculpture Nano-Ceramics under Sparse Image Sequence by Zeyin Yang

    Published 2022-01-01
    “…To improve the analysis ability of point cloud 3D reconstruction of sparse images of nano-ceramic sculpture points, an automatic cloud 3D reconstruction method of nano-ceramic sculpture points based on sparse image sequence is proposed. …”
    Get full text
    Article
  20. 1240

    An efficient load balancing algorithm for virtual machine allocation based on ant colony optimization by Peng Xu, Guimin He, Zhenhao Li, Zhongbao Zhang

    Published 2018-12-01
    “…With the rapid development of information technologies and the popularization of Internet applications, more and more companies and developers pay great attention to the cloud computing. As one of the most significant problems in cloud computing, virtual machine allocation has attracted significant attention. …”
    Get full text
    Article