Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1741
Research on Partner Selection of High-Speed Railway Dynamic Logistics Alliance Based on the Dynamic Programming Model
Published 2023-01-01“…This paper takes advantage of high speed to propose a high-speed railway dynamic logistics alliance based on a cloud platform to make up for the lack of transport capacity at both ends of the high-speed railway logistics trunk line. …”
Get full text
Article -
1742
Protein-Protein Interactions Inferred from Domain-Domain Interactions in Genogroup II Genotype 4 Norovirus Sequences
Published 2013-01-01“…Many protein-protein interactions were relevant; therefore, cloud techniques were used to analyze data because of their computational capacity. …”
Get full text
Article -
1743
Impact of digital transformation on the competitive advantage of companies
Published 2024-01-01“…Key factors of digital transformation, as well as ways in which technologies such as artificial intelligence, big data, automation, and cloud computing enable companies to improve their operations, innovate products and services, and achieve sustainable competitive advantage in the market. …”
Get full text
Article -
1744
Research on Business Requirement Analysis and Network Architecture of CDN for Power Grid
Published 2015-05-01“…During the“Twelfth Five Year Plan”,with the continuous deepening development of the SGCC information s ystem,the number of large management information system of one-1evel deployment continues to increase,wide coverage,1arge number of users,and new technologies such as the software-hardware resource pool and the cloud computing,brings new challenge to the data network. …”
Get full text
Article -
1745
Progress and Challenge of Optical Remote Sensing Inversion on Soil Moisture
Published 2021-01-01“…Soil moisture is an important parameter for influencing the land surface rainfall and runoff,and a key parameter for understanding the interaction of water and energy between the earth and the atmosphere.Monitoring of this parameter is of great significance to agricultural development and water resources management.As the main means for large-scale monitoring of soil moisture,the remote sensing inversion has received much attention in many studies in terms of method and accuracy.Among them,the research of optical remote sensing inversion on soil moisture lasts the longest,and many inversion methods have been developed currently.In order to sort out these inversion methods,this paper summarizes the commonly used remote sensing data for optical inversion on soil moisture at first,then classifies the inversion methods into reflectivity method,index method and thermal inertia method according to the different objects that correlates with soil moisture in the method and explains their principles,advantages,disadvantages and research progress,and finally discusses the main problems faced by the current optical remote sensing inversion methods as follow:The inversion methods are seriously affected by cloud and fog weather.The effective depth of soil moisture obtained by the inversion method is limited.The inversion methods take insufficient account of land surface heterogeneity.…”
Get full text
Article -
1746
Influence of Tooth Profile of Double Helical Synchronous Belt on Drive Performance based on RecurDyn
Published 2020-08-01“…Under the same conditions, for the three tooth profiles double helical synchronous belts, the stress distribution cloud diagram of the belt strong layer and the tooth and the stress distribution law of the special point of the tooth root are studied in the fully meshed area, and the study of the stress variation law of special points in the belt movement cycle. …”
Get full text
Article -
1747
Research on the Construction of Intelligent Media Ideological and Political Learning Platform Based on Artificial Intelligence Technology
Published 2022-01-01“…We build an artificial intelligence open source development platform framework based on the cloud platform and use the Ceph method to optimize the storage of artificial intelligence training platform data. …”
Get full text
Article -
1748
A fluid flow model for the software defined wide area networks analysis
Published 2025-01-01“…Abstract The advancement of IT systems necessitates efficient communication methods essential across various sectors, from streaming platforms to cloud-based solutions and Industry 4.0 applications. …”
Get full text
Article -
1749
Formation and Change of Beliefs through Online Environments: Analysis on the “Diyanet English” X Account
Published 2024-12-01“…The data obtained within the framework of the analysis were coded and the subject distribution, sub-codes, and word cloud of the shared content were presented. When the findings and results obtained in the study were evaluated, it was determined that the Presidency of Religious Affairs shared mostly religious information, official statements, and content related to social and communal issues from the account in question. …”
Get full text
Article -
1750
Every Second Counts: Integrating Edge Computing and Service Oriented Architecture for Automatic Emergency Management
Published 2018-01-01“…The choreography can be synthesized to generate detailed specification on peer-to-peer interaction logic, and then the specification can be enacted and deployed on cloud infrastructures.…”
Get full text
Article -
1751
Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks
Published 2014-01-01“…In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM) migration detection algorithm based on the cellular neural networks (CNNs), is presented. …”
Get full text
Article -
1752
This is Not a Nest
Published 2020-07-01“…We first dig into a sample of competition projects nicknames (Crystal, Birds’Nest, DNA, Cloud, Lace, Stealth, etc.) to confirm that these tropes have a paradoxical status at the intersection of architects’ intents and the public expectations. …”
Get full text
Article -
1753
Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study
Published 2025-01-01“…In the context of Industry 4.0, edge computing aims to process data directly on local devices rather than relying on a cloud infrastructure. This approach minimizes latency, enhances data security, and reduces the bandwidth required for data transmission, making it ideal for industrial applications that demand immediate response times. …”
Get full text
Article -
1754
The use of an automatic remote weight management system to track treatment response, identified drugs supply shortage and its consequences: A pilot study
Published 2025-01-01“…Methods The pilot study involved 11 participants using Semaglutide for weight management, monitored over a 12-month period. A cloud-based, Wi-Fi-enabled remote weight management system collected and analyzed daily weight data from smart scales. …”
Get full text
Article -
1755
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01“…However, the constraints of isolated network environments and the limitations of existing security frameworks hinder the adoption of cutting-edge technologies such as AI and cloud computing, as well as the safe utilisation of data. …”
Get full text
Article -
1756
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01“…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
Get full text
Article -
1757
Multi-tenant virtual domain isolation construction method based on L-DHT
Published 2020-06-01“…Aiming at the problem of security isolation of multi-tenant data in cloud environment,a tenant virtual domain isolation construction method based on L-DHT was proposed.Firstly,through the design of multi-tenant isolation mapping algorithm based on label-hash mapping,the balanced mapping mechanism of tenant resources was constructed to realize the distributed management of tenant resources.Secondly,for the security isolation and access between tenant data mapped to the same storage node,based on the predicate encryption mechanism,through the effective binding of security labels and tenant data,a tenant data isolation storage algorithm based on label predicate encryption was designed.Finally,by the design of multi-dimensional tenant data isolation control rules and using the analysis and authentication of security labels,independent,logical and secure virtual domains between tenants were built hierarchically.The security analysis shows that the method constructs tenant virtual domains which are secure and non-interference with each other.The simulation results show that the mapping algorithm can achieve a better dynamic load balance.The efficiency and security of data access are verified by the comparative analysis of tenant data retrieval efficiency and authentication access security.…”
Get full text
Article -
1758
Sustainable Development in the Digital Age: Harnessing Emerging Digital Technologies to Catalyze Global SDG Achievement
Published 2025-01-01“…This research explores the transformative potential of cutting-edge digital technologies—including artificial intelligence, big data analytics, cloud computing, and the Internet of Things—in fostering sustainable development across economic, social, and environmental dimensions. …”
Get full text
Article -
1759
Climate change and the single cell
Published 2024-12-01“…Stomata act as crucial regulatory components of a water hypercycle that contributes to the homeostasis of a warming planet by regulating evaporative cooling and reflective cloud cover generated by vast tropical rainforests of the South and the equally vast arboreal forests of the North. …”
Get full text
Article -
1760
Simulation of IoT Smart Home Network with Decision Making Based on MajorDoMo Platform
Published 2023-03-01“…The purpose of the article is to model a smart home with decision-making and the use of the MajorDoMo IoT platform instead of a cloud platform. The main features of the article are: modeling of the IoT network for controlling the control unit on the MajorDoMo platform, the use of the MajorDoMo IoT platform in the Windows system for making decisions when controlling household appliances (fan or air conditioner) based on the temperature and humidity values received from a smartphone modeling sensors, transmitting the results of controlled data to the user's home page. …”
Get full text
Article