Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
1001
Analysis of Bulk Queueing Model with Load Balancing and Vacation
Published 2024-12-01“…In this paper, we incorporated the load-balancing technique used in cloud computing with power business intelligence (BI) and cloud load based on the queueing theoretic approach. …”
Get full text
Article -
1002
Enhancing Nature Engagement through Mobile Applications: A Technological Approach
Published 2025-04-01Get full text
Article -
1003
-
1004
Exploring on the integration of vBRAS architecture and DPU technology
Published 2025-06-01“…With the rapid development of 5G, cloud computing, and edge computing, metropolitan area networks (MANs), as critical hubs connecting users and core networks, face multifaceted challenges in bandwidth, latency, and flexibility. …”
Get full text
Article -
1005
Model of runtime memory leak detection based on the virtual machine introspection
Published 2013-08-01“…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. …”
Get full text
Article -
1006
System and application of video surrveillance based on edge computing
Published 2020-06-01“…With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.…”
Get full text
Article -
1007
Discussion on the common sense of the Internet of things
Published 2020-12-01“…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
Get full text
Article -
1008
Research on intelligent cloud native architecture and key technologies for cloud and network integration
Published 2020-09-01“…Cloud native technology,as the latest technology achievement of cloud computing,promotes internet and enterprise application to cloud.Cloud native technology can provide more economical and convenient deployment and operation methods for communication operator network.With the promotion of cloud and network integration of operators,cloud native is the core technology and key grasp of operators’ network cloud.The application and problems of cloud native technology were analyzed,an intelligent cloud native architecture for cloud and network integration was proposed,evolution design,architecture deployment scheme and key technologies were studied,and cloud native promotion measures were prospected.…”
Get full text
Article -
1009
Parallel rail transportation system
Published 2019-09-01“…With the development of new perception, big data, artificial intelligence, and cloud computing techniques, the innovation of railway transportation systems is completely promoted. …”
Get full text
Article -
1010
Research and Application of Mobile OA Technology in Power Generation Enterprise
Published 2013-11-01“…As the rapid development of mobile Internet and cloud computing technology, enterprise mobile OA needs bred. …”
Get full text
Article -
1011
Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society
Published 2020-09-01“…The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive peer-review process, 10 papers were finally selected for publication. …”
Get full text
Article -
1012
Model of runtime memory leak detection based on the virtual machine introspection
Published 2013-08-01“…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. …”
Get full text
Article -
1013
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
1014
FLEXIBILITY AS AN ESSENTIAL FORM OF LABOUR MARKET IN DIGITAL ECONOMY
Published 2025-04-01“…Technologies such as automation, artificial intelligence, cloud computing, and platform work are considered as providers of s new forms of employment, such as platform-based work and remote collaboration. …”
Get full text
Article -
1015
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic. …”
Get full text
Article -
1016
The impact of digitization on corporate controlling and the role of controllers
Published 2024-04-01“…Next, selected technologies such as the internet of things, big data, cloud computing and artificial intelligence are described in detail and their influence on controlling and the role of the controller is analysed. …”
Get full text
Article -
1017
Integration of remote sensing intelligent processing algorithm using container cloud technology
Published 2022-03-01“…With the development of cloud computing technology in remote sensing data processing, container cloud technology was applied to remote sensing data processing, remote sensing intelligent processing algorithm image was deployed and storage services were distributed in the computing cluster, shielding complex environmental dependence problems.And management through configuration files was processed forming an overall technical route from development to deployment, which provides an efficient and reliable new scheme for the integration of remote sensing intelligent processing algorithms.Taking several typical remote sensing intelligent algorithms as examples, the efficiency of the scheme in the integrated development and deployment was proved, and the feasibility of the new cloud mode of remote sensing intelligent technology was explored.…”
Get full text
Article -
1018
Le cadre de management du tourisme intelligent
Published 2022-04-01“…The advancement of information and communication technologies (ICT) in general, and cloud computing technologies in particular, is driving tourism destinations and providers to leverage smart technologies to optimize their decision-making, strategic planning, and improve the tourism experience for visitors. …”
Get full text
Article -
1019
Analysis and modeling of Internet backbone traffic with 5G/B5G
Published 2019-08-01“…The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.…”
Get full text
Article -
1020
Software in Metrology for the Digital Age: Addressing Compliance Challenges with MID, NAWID, and MDR
Published 2025-01-01“…Emerging technologies like AI, IoT, or cloud computing introduce compliance challenges. This article analyzes and compares software requirements in MID, NAWID, and MDR, focusing on software lifecycle, regulatory gaps, and risk assessment.…”
Get full text
Article