Showing 1,681 - 1,700 results of 2,372 for search '"cloud"', query time: 0.06s Refine Results
  1. 1681

    Service mesh technology evaluation and integration scheme based on telecom operator perspective by Liyun YAN, Xinzhang YANG, Zhenwei HE, Yuanzhi LIN, Shaoxin HOU

    Published 2020-06-01
    “…Microservice architecture has evolved along with the changes in enterprise software architecture,from the embedded and integrated micro-service architecture to the non-intrusive and decoupled service mesh.The various of micro-service architectures have sprung up.Choose which microservice architecture to integrate has become an important part of the layout of microservices for the telecom operators.The evaluation and integration of service mesh (non-intrusive architecture) technologies based on the operator’s business characteristics was focused on.In the evaluation,choose the open source,mainstream service mesh technologies and cloud service provider’s microservice solutions were compared and analyzed from multiple dimensions,and the development trend of microservice technology and architecture was obtained.The integration category focused on the integration of Istio technology and Kubernetes which were mainstream technologies in their respective fields,and a heterogeneous microservice framework and development ideas that supported complex scenarios was innovatively proposed.Finally,combined with the differentiated needs of operators’ 5G SBA services,the key research and optimization directions of the operator’s service mesh technology were probed.…”
    Get full text
    Article
  2. 1682

    Simulation Analysis and Prediction of Wear for Neck Journal of Shifting Slider on AMT by Yuwei Liu, Ye Wang, Chongzhi Fu, Yuanzhi Sun, Hao Chen, Zixi Wang

    Published 2021-10-01
    “…A finite element model is established,and based on the heat transfer theory,the thermal boundary conditions of the shift fork and the slider are set,and the wear amount and temperature distribution cloud of the shift slider at the end of a single shift in the synchronization process is obtained. …”
    Get full text
    Article
  3. 1683

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  4. 1684

    Application of BIM+GIS in Water Resources Allocation Project of the Pearl River Delta by DU Canyang, DENG Peng, ZHANG Zhaobo, ZHU Xiaobin

    Published 2022-01-01
    “…On this basis,new information technologies such as BIM,GIS,electronic signature,cloud computing,big data,Internet of Things (IoT),artificial intelligence (AI),and mobile Internet are applied to build a whole-life-cycle BIM+GIS system platform by integrated innovation and collaborative sharing. …”
    Get full text
    Article
  5. 1685

    Fatigue Life Analysis of a New Type of Driving Drum by Yu Yuzhen, Wang Fei, Li Wenyu, Wang Kailiang

    Published 2017-01-01
    “…The transient dynamics analysis of the new driving drum is carried out by using ANSYS,its maximum equivalent stress cloud pictures and maximum principal stress time history in different work conditions are obtained. …”
    Get full text
    Article
  6. 1686

    Cooperative game based bandwidth allocation mechanism live migration of multiple virtual machines by Yong CUI, Yu-song LIN, Run-zhi LI, Zong-min WANG

    Published 2016-04-01
    “…In IaaS cloud computing platform, live migration of virtual machines plays a significant role in resource dy-namic dispatching and management. …”
    Get full text
    Article
  7. 1687

    Software as a Service: an effective platform to deliver holistic Hotel Performance Management Systems by Nuno Antonio, Francisco Serra

    Published 2018-01-01
    “…Software deployed in the cloud, delivered and licensed as a service, is becoming increasingly common and accepted in a business context. …”
    Get full text
    Article
  8. 1688

    Research on Data Analysis and Visualization of Recruitment Positions Based on Text Mining by Yuanyuan Chen, Ruijie Pan

    Published 2022-01-01
    “…However, existing online recruitment platforms fail to fully combine the job seekers’ demands for salary, region, benefits, and other aspects, which cloud not display the information related to recruitment positions in a multidimensional way. …”
    Get full text
    Article
  9. 1689

    Designing and Prototyping of a Battery Management System for Solar Power Plants in Uganda. by Ssembalirwa, Denis

    Published 2024
    “…Utilizing IoT technology, it transmits real-time data to the cloud, enabling global monitoring of the battery’s state. …”
    Get full text
    Thesis
  10. 1690

    Parameter Study on Ultraviolet Rayleigh–Brillouin Doppler Lidar with Dual-Pass Dual Fabry–Perot Interferometer for Accurately Measuring Near-Surface to Lower Stratospheric Wind Fie... by Fahua Shen, Zhifeng Shu, Jihui Dong, Guohua Jin, Liangliang Yang, Zhou Hui, Hua Xu

    Published 2025-01-01
    “…The simulation results show that at an altitude of 0–20 km, within the radial wind speed dynamic range of ±50 m/s, the radial wind speed measurement bias caused by aerosol scattering signal is less than 0.17 m/s in the cloudless region; within the radial wind speed dynamic range of ±30 m/s, the bias is less than 0.44 m/s and 0.91 m/s in the simulated cumulus cloud at 4 km where aerosol backscatter ratio <i>R<sub>β</sub></i> = 3.8 and cirrus cloud at 9 km where <i>R<sub>β</sub></i> = 2.9, respectively; using a laser with a pulse energy of 350 mJ and a repetition frequency of 50 Hz, a 450 mm aperture telescope, setting the detection zenith angle of 30°, vertical resolution of 26 m@0–10 km, 78 m@10–20 km, and 260 m@20–30 km, and a time resolution of 1 min, with the daytime sky background brightness taking 0.3 WSr<sup>−1</sup>m<sup>−2</sup>nm<sup>−1</sup>@355 nm, the radial wind speed measurement errors of the system during the day and night are below 2.9 m/s and 1.6 m/s, respectively, up to 30 km altitude, below 0.28 m/s at 10 km altitude, and below 0.91 m/s at 20 km altitude all day.…”
    Get full text
    Article
  11. 1691

    Rancang Bangun Aplikasi Berbasis Android untuk Perbaikan Kualitas Citra Tanaman Atas Perbedaan Spesifikasi Kamera Smartphone pada Prediksi Kandungan Pigmen Fotosintesis Secara Real... by Felix Adrian Tjokro Atmodjo, Kestrilia Rega Prilianti, Hendry Setiawan

    Published 2022-12-01
    “…Aplikasi Fuzzy Piction difasilitasi dengan layanan cloud yang dikembangkan menggunakan Flask web service sehingga model perbaikan citra dan prediksi pigmen lebih mudah diperbarui. …”
    Get full text
    Article
  12. 1692

    Influence of land cover change on atmospheric organic gases, aerosols, and radiative effects by R. Vella, R. Vella, M. Forrest, A. Pozzer, A. Pozzer, A. P. Tsimpidi, T. Hickler, T. Hickler, J. Lelieveld, J. Lelieveld, H. Tost

    Published 2025-01-01
    “…Secondary organic aerosols (SOAs) resulting from BVOC oxidation affect the radiation budget both directly, through the scattering and absorption of sunlight, and indirectly, by modifying cloud properties. Human activities have extensively altered natural vegetation cover, primarily by converting forests into agricultural land. …”
    Get full text
    Article
  13. 1693

    Teknologi Text To Speech Menggunakan Amazon Polly Untuk Meningkatkan Kemampuan Membaca Pada Anak Dengan Gejala Disleksia by Karlina Diah Fatmawati, Imam Tahyudin

    Published 2024-12-01
    “…Penelitian ini bertujuan untuk meningkatkan kemampuan membaca menggunakan teknologi Text-To-Speech (TTS) dengan Machine Learning Amazon Polly yang ada pada AWS cloud. Penelitian menggunakan dua metode: review literatur dan eksperimen dengan pre-test dan post-test untuk menilai pengaruh teknologi terhadap kemampuan membaca. …”
    Get full text
    Article
  14. 1694

    Technologies for Interoperable Internet of Medical Things Platforms to Manage Medical Emergencies in Home and Prehospital Care: Scoping Review by Mattias Seth, Hoor Jalo, Åsa Högstedt, Otto Medin, Bengt Arne Sjöqvist, Stefan Candefjord

    Published 2025-01-01
    “…Message queuing telemetry transport (MQTT; 7/30, 23%) and WebSocket (7/30, 23%) were commonly used for real-time emergency alerts, while fog and edge computing were often combined with cloud computing for enhanced processing power and reduced latencies. …”
    Get full text
    Article
  15. 1695
  16. 1696

    Impact of mineral dust on the global nitrate aerosol direct and indirect radiative effect by A. Milousis, K. Klingmüller, A. P. Tsimpidi, J. F. Kok, M. Kanakidou, M. Kanakidou, M. Kanakidou, A. Nenes, A. Nenes, V. A. Karydis

    Published 2025-01-01
    “…This mechanism results in an overall reduced cloud albedo effect and is thus attributed as warming.…”
    Get full text
    Article
  17. 1697

    Research and application of G-SRv6 head compressions optimization technology by Weiqiang CHENG, Yisong LIU, Wenying JIANG, Geng ZHANG

    Published 2020-08-01
    “…As the key technology of the new generation IP network,SRv6 has gradually become the direction of network evolution in the 5G and cloud networks.The problems how to solve the problems of excessive head overhead,low payload efficiency,and difficult upgrading from the existing network has become the focus of the industry.Based on this technical problem,header compression design principles were proposed firstly,including mechanism compatible with standard SRv6 header encapsulation,inheriting the advantages of standard SRv6 and IPv6,compatible with existing network address plan,achieving an effective balance of compression efficiency and processing performance,and interconnecting with existing networks.Secondly,a G-SID header compression solution was proposed based on common prefix stitching,the key technical capabilities of G-SID container,COC flavor,and SID index were defined,and a network orchestration solution for mixed deployment of compressed and uncompressed networks was proposed.Finally,the progress of the G-SID solution in the industry’s international standards was introduced,and has been verified by the interoperability of multi-vendor equipment,and the pilot deployment on the existing network was planned to promote the rapid deployment of SRv6 on the entire network.…”
    Get full text
    Article
  18. 1698

    Building mechanism of trusted virtual domain via the VPE by Li-na WANG, Hao ZHANG, Rong-wei YU, Han-jun GAO, Ning GAN

    Published 2013-12-01
    “…Due to lack of flexible networking control,most exiting trusted virtual domain deployment approaches fail to provide elastic and secure interconnection.A trusted virtual domain architecture TVD-VPE was proposed in cloud com-puting enterprises which greatly enhances sensitive data protection.TVD-VPE constructs a virtual private ethernet based on separate device driver,VPE captures network packets at the backend driver and checks whether the packets comply with border security strategy,and data frames are encrypted among trusted virtual domains to ensure the security of sensi-tive data.Simultaneously,four protocols were proposed,TVDJOP/TVDEXP protocol for any new VM joining in or exit-ing TVD securely,TVDMP protocol for deploying border cross-domain access.Finally,the prototype system and tests of its functionality and performance were implemented.The experiment results reveal that the architecture can effectively prevent unauthorized access between these trusted virtual domains,while introduces little overhead to Xen network performance.…”
    Get full text
    Article
  19. 1699

    Large-Scale Real-Time Semantic Processing Framework for Internet of Things by Xi Chen, Huajun Chen, Ningyu Zhang, Jue Huang, Wen Zhang

    Published 2015-10-01
    “…Nowadays, the advanced sensor technology with cloud computing and big data is generating large-scale heterogeneous and real-time IOT (Internet of Things) data. …”
    Get full text
    Article
  20. 1700

    Research and Application Progress of Dual-energy CT in Prostate Lesions by Yize LI, Ziqi CHEN, Luyao ZHANG, Yingmin CHEN

    Published 2025-01-01
    “…DECT not only provides routine anatomical information of lesions, tissues, and organs, but also generates virtual single-energy spectral images, virtual decalcification images, effective atomic number diagrams, iodine maps, electron cloud density maps, and other energy spectral images through post-processing. …”
    Get full text
    Article