Showing 461 - 480 results of 691 for search '"cloud computing"', query time: 0.08s Refine Results
  1. 461

    Concepts,issues,and applications of fog computing by Weijia JIA, Xiaojie ZHOU

    Published 2018-05-01
    “…Firstly,the previous work of fog computing was systematically analyzed and summarized.The background of fog computing and the comparison with cloud computing were introduced.Besides,based on the comparison with other computing style,the advantages and characteristics of fog computing were explained.In addition,the architecture of fog computing was described.Moreover,network management and resource scheduling of fog computing were discussed,where the related previous work were summarized and analyzed.At last,the applications of fog computing were described.Taking the intelligent driving and industrial Internet of things applications as examples,the key research issues of fog computing were proposed.…”
    Get full text
    Article
  2. 462

    Fusion of IDC Operation Support System Design and Analysis by Huazhao Liu, Xuefeng Chen, Qian Yu

    Published 2013-01-01
    “…By the establishment of IDC space, network, cloud computing various levels of resource element model, fusion process, data, operation and service, a standard, and loosely coupled IT support fusion architecture was designed and built, which laid the foundation for IDC intensive operation. …”
    Get full text
    Article
  3. 463

    Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach by Abdulaziz Aborujilah, Shahrulniza Musa

    Published 2017-01-01
    “…In this era of technology, cloud computing technology has become essential part of the IT services used the daily life. …”
    Get full text
    Article
  4. 464

    Analysis on network scheme and resolution test of SDN/NFV technology co-deployed in cloud datacenter by Rong GU, Ruixue WANG, Chen LI, Lu HUANG

    Published 2016-01-01
    “…Traditional datacenters have been heavily impacted due to the development and large-scale deployment of cloud computing technology.Co-deployment of SDN and NFV technology shows its distinct advantages of vitualizing network resources in the scenario of cloud datacenter.Resolution tests aiming at co-deployment of SDN and NFV have directive significance.According to the resolution test,SDN and NFV technology were matured already for the commercial deployment in operators' network.Further research needs to be focused on the key problems found out in scheme designing and the resolution test.…”
    Get full text
    Article
  5. 465

    Service-oriented security framework for datacenter networks by Teng HU, Guanwen LI, Huachun ZHOU

    Published 2018-01-01
    “…With the large-scale deployment of datacenters in cloud computing,there is an increasing attention to their security issues.However,with the ossify deployment of traditional security devices,it is hard to meet the requirements of dynamical network security situation and copy with new kinds of security threats.Therefore,a service-oriented security framework for datacenter networks was proposed,which was able to compose the virtualized security functions flexibly and update the security policies dynamically based on virtualization technology and software-defined networking.With the implementation of prototype,the feasibility and availability of the proposed security framework was proved,and a solution to promote the flexibility and security of datacenter networks was provided.…”
    Get full text
    Article
  6. 466

    Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal by Jun Li

    Published 2013-08-01
    “…In order to solve the increasingly serious security issues caused by malwares in mobile internet,a“cloud-pipeline-terminal”model was proposed to implement detection and killing of mobile internet malwares.The proposed model composes of a cloud computing platform to support the analysis and measurement of the malwares and to implement strategy distribution and management of the system,a monitoring and intercepting system on the side of mobile communication pipelines and a terminal security application to check and kill the malwares.The purpose is to build a safe and harmonious mobile internet environment.…”
    Get full text
    Article
  7. 467

    Research on SDN based network virtualization platform and its isolation by Kai ZHANG, Xiaofeng QIU, Xinning ZHU

    Published 2016-09-01
    “…The rapid development of cloud computing has recently prompted extensive application of visualization in enterprise-level environments.In addition to server and storage virtualization,network virtualization attracts more and more attention with the application of SDN and OpenFlow.Therewith,software-defined network platforms designed for network virtualization were presented.Firstly,the objectives of the SDN based network virtualization platform were analyzed.Subsequently,the system architectures and principles of four typical network virtualization platforms based on SDN were compared.At last,the safety and isolation mechanism provided by the network virtualization platforms were investigated.…”
    Get full text
    Article
  8. 468

    Research on Security Connotation and Response Strategies for Big Data by Kun Hu, Di Liu, Minghui Liu

    Published 2014-02-01
    “…Big data is easy to understand which has many potential application requirements and foreseeable enormous economic benefits.With the development of mobile internet,cloud computing and M2M,big data become a new focus in the information technology field.But,it brings some challenges and problems,such as data security and privacy protection.The security requirements of big data in various fields were reviewed,and the security features and problems in big data environment were analyzed.Then the security connotation of big data was summarized and some response strategies were proposed.…”
    Get full text
    Article
  9. 469

    Impact of technical and professional developments on audit risks Review study by Waheed Mahmood Ramo, Abdulwahid Ghazi Mohammed

    Published 2021-03-01
    “… The research provides an attempt to identify the effects of technical and professional developments on audit risks, important of these developments are cloud computing, blockchain, electronic commerce, fair value and corporate governance. …”
    Get full text
    Article
  10. 470

    Algorithm for the cloud service workflow scheduling with setup time and deadline constraints by Hong SHEN, Xiao-ping LI

    Published 2015-06-01
    “…Cost minimization with deadline constraints and setup time is a new resource allocation optimization problem in cloud computing.An integer programming model is constructed for this NP-hard problem.A novel probability model and updating mechanism is suggested for sampling the solution space.A heuristic method is investigated for generating good initial population.A hybrid estimation of distribution algorithm (HEDA) is proposed for the considered problem.The global best solution is adopted to balance the diversification and intensification of HEDA.Experimental results show that the proposed method is effective to optimize the workflow running cost within reasonable CPU time.…”
    Get full text
    Article
  11. 471

    Consideration on the Telecom Operators Developing Vehicle Network by Shuhui Ma, Yaliang Song, Bingyi Fang

    Published 2013-02-01
    “…Fina11y,studies on the new technologies such as LTE,mobile internet and cloud computing which would impact on the future vehicle network.…”
    Get full text
    Article
  12. 472

    Development of visual surveillance standardization by Yuan ZHANG, Ning CAO, Doudou HU

    Published 2018-10-01
    “…The standardization of visual surveillance in major standard organizations both domestic and international was focused on,and the progress of the visual surveillance standards in ITU-T,ONVIF,IEC,ISO,PSIA,HDcctv,IEEE,3GPP,ETSI,TC100,CCSA,AVS and National Information Technical Standardization Committee was introduced.The latest development in standardization area such as visual surveillance systems,architecture,terminals,codecs,intelligent applications,big data applications,cloud storage,cloud computing,edge storage and edge computing were introduced.On this basis,the future research areas of product development and standardization of visual surveillance were discussed.The visual surveillance standardization roadmap was laid out,and the future visual surveillance standardization and research fields were proposed.…”
    Get full text
    Article
  13. 473

    Research and Application of Mobile OA Technology in Power Generation Enterprise by Zheng Liu, Jing Wang

    Published 2013-11-01
    “…As the rapid development of mobile Internet and cloud computing technology, enterprise mobile OA needs bred. …”
    Get full text
    Article
  14. 474

    Assessment Architecture of SaaS System Based on Characteristics of System of Systems by Xiuwei Zhang, Keqing He, Jian Wang, Jian Wang

    Published 2013-12-01
    “…With the development of internet of things, cloud computing and software as a service as well as other new technologies, the distributed software system is becoming more and more complex because of interconnection and interoperability. …”
    Get full text
    Article
  15. 475

    Research and implementation of the IBN for cloud-network convergence service of operators by Xin ZHANG

    Published 2021-08-01
    “…Faced with the development of cloud computing technology and the increasing business needs, cloud-network convergence has become the inevitable choice of network architecture reform.The era of cloud-network convergence brought great challenges to the traditional network operation and maintenance, and the network needs to evolve to a more intelligent and convenient mode.The intent-based networking(IBN), which is widely studied by the scholars, has become the best choice to solve this problem.The development process, architecture and key steps of IBN were introduced.Combined with the needs of operator’s services, the business scenario of cloud-network convergence was taken as an example to analyze the implementation process of IBN for cloud-network convergence.It is expected to provide a reference for the future practice of IBN and cloud-network convergence services.…”
    Get full text
    Article
  16. 476

    System and application of video surrveillance based on edge computing by Sanming PAN, Mingqiang YUAN

    Published 2020-06-01
    “…With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.…”
    Get full text
    Article
  17. 477

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    “…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
    Get full text
    Article
  18. 478

    Research on intelligent cloud native architecture and key technologies for cloud and network integration by Gang LU, Changyi CHEN, Zelong HUANG, Zeyuan HUANG

    Published 2020-09-01
    “…Cloud native technology,as the latest technology achievement of cloud computing,promotes internet and enterprise application to cloud.Cloud native technology can provide more economical and convenient deployment and operation methods for communication operator network.With the promotion of cloud and network integration of operators,cloud native is the core technology and key grasp of operators’ network cloud.The application and problems of cloud native technology were analyzed,an intelligent cloud native architecture for cloud and network integration was proposed,evolution design,architecture deployment scheme and key technologies were studied,and cloud native promotion measures were prospected.…”
    Get full text
    Article
  19. 479

    Cloud Backup Solution by Wei Si, Feng Wang

    Published 2015-07-01
    “…As a new data backup form,cloud backup service provides users with putting the local data backup to the remote cloud.The cloud backup is being more and more focused by the industry.Combined with the demand of data backup under cloud computing environment,three aspects of“end-pipe-cloud”cloud backup solution were comprehensively analyzed,including cloud backup client,cloud backup network channel and cloud backup resource pool.In addition,according to the different business scenarios and user demand,feasible public cloud and hybrid cloud backup solutions were proposed,which could provide an important reference for the research and deployment of related field.…”
    Get full text
    Article
  20. 480

    Applications of a big data platform based on PaaS by Haiyong XU, Yan HUANG

    Published 2018-01-01
    “…As a platform of data storage,processing,and service,big data platform needs to support internal and external various big data applications.A solution applied PaaS technology to the big data platform was proposed.Details of the key technical solutions such as the architecture of PaaS cloud computing platform,hierarchical scheduling scheme,multi-tenant management and global scheduling of Hadoop tasks were described.It was proved that the platform could remarkably improve big data application development efficiency and help application deployment fast.In the meantime,good elastic scaling capability can effectively improve big data application system resource utilization.…”
    Get full text
    Article