Showing 1,001 - 1,020 results of 1,622 for search '"cloud computing"', query time: 0.08s Refine Results
  1. 1001

    Analysis of Bulk Queueing Model with Load Balancing and Vacation by Subramani Palani Niranjan, Suthanthiraraj Devi Latha, Sorin Vlase, Maria Luminita Scutaru

    Published 2024-12-01
    “…In this paper, we incorporated the load-balancing technique used in cloud computing with power business intelligence (BI) and cloud load based on the queueing theoretic approach. …”
    Get full text
    Article
  2. 1002
  3. 1003
  4. 1004

    Exploring on the integration of vBRAS architecture and DPU technology by GONG Xia, ZHU Yongqing, YUAN Shizhang, WANG Xiaoyong, ZHANG Jiancheng

    Published 2025-06-01
    “…With the rapid development of 5G, cloud computing, and edge computing, metropolitan area networks (MANs), as critical hubs connecting users and core networks, face multifaceted challenges in bandwidth, latency, and flexibility. …”
    Get full text
    Article
  5. 1005

    Model of runtime memory leak detection based on the virtual machine introspection by Ru-liang XIAO, Jun JIANG, You-cong NI, Xin DU, Guo-qing XIE, Sheng-zhen CAI

    Published 2013-08-01
    “…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. …”
    Get full text
    Article
  6. 1006

    System and application of video surrveillance based on edge computing by Sanming PAN, Mingqiang YUAN

    Published 2020-06-01
    “…With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.…”
    Get full text
    Article
  7. 1007

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    “…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
    Get full text
    Article
  8. 1008

    Research on intelligent cloud native architecture and key technologies for cloud and network integration by Gang LU, Changyi CHEN, Zelong HUANG, Zeyuan HUANG

    Published 2020-09-01
    “…Cloud native technology,as the latest technology achievement of cloud computing,promotes internet and enterprise application to cloud.Cloud native technology can provide more economical and convenient deployment and operation methods for communication operator network.With the promotion of cloud and network integration of operators,cloud native is the core technology and key grasp of operators’ network cloud.The application and problems of cloud native technology were analyzed,an intelligent cloud native architecture for cloud and network integration was proposed,evolution design,architecture deployment scheme and key technologies were studied,and cloud native promotion measures were prospected.…”
    Get full text
    Article
  9. 1009

    Parallel rail transportation system by Bin NING

    Published 2019-09-01
    “…With the development of new perception, big data, artificial intelligence, and cloud computing techniques, the innovation of railway transportation systems is completely promoted. …”
    Get full text
    Article
  10. 1010

    Research and Application of Mobile OA Technology in Power Generation Enterprise by Zheng Liu, Jing Wang

    Published 2013-11-01
    “…As the rapid development of mobile Internet and cloud computing technology, enterprise mobile OA needs bred. …”
    Get full text
    Article
  11. 1011

    Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society by Asadullah Shaikh

    Published 2020-09-01
    “…The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive peer-review process, 10 papers were finally selected for publication. …”
    Get full text
    Article
  12. 1012

    Model of runtime memory leak detection based on the virtual machine introspection by Ru-liang XIAO, Jun JIANG, You-cong NI, Xin DU, Guo-qing XIE, Sheng-zhen CAI

    Published 2013-08-01
    “…Virtualization technology has been widely used in the field of cloud computing and data center, and it is an important way to improve reliability of system under the virtual computing environment using runtime memory leak de-tecting to eliminate memory leaks. …”
    Get full text
    Article
  13. 1013

    Data security protection schema of telecom operators under the environment of big data by Shengli ZHOU, Bin CHEN, Lifa WU

    Published 2017-05-01
    “…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
    Get full text
    Article
  14. 1014

    FLEXIBILITY AS AN ESSENTIAL FORM OF LABOUR MARKET IN DIGITAL ECONOMY by Тарас Чатченко, Андрій Гриценко

    Published 2025-04-01
    “…Technologies such as automation, artificial intelligence, cloud computing, and platform work are considered as providers of s new forms of employment, such as platform-based work and remote collaboration. …”
    Get full text
    Article
  15. 1015

    Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG

    Published 2017-01-01
    “…With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic. …”
    Get full text
    Article
  16. 1016

    The impact of digitization on corporate controlling and the role of controllers by Jessica Hastenteufel, Max Dorow, Susanne Weber

    Published 2024-04-01
    “…Next, selected technologies such as the internet of things, big data, cloud computing and artificial intelligence are described in detail and their influence on controlling and the role of the controller is analysed. …”
    Get full text
    Article
  17. 1017

    Integration of remote sensing intelligent processing algorithm using container cloud technology by Zhitao ZHAO, Lijun ZHAO, Zheng ZHANG, Ping TANG

    Published 2022-03-01
    “…With the development of cloud computing technology in remote sensing data processing, container cloud technology was applied to remote sensing data processing, remote sensing intelligent processing algorithm image was deployed and storage services were distributed in the computing cluster, shielding complex environmental dependence problems.And management through configuration files was processed forming an overall technical route from development to deployment, which provides an efficient and reliable new scheme for the integration of remote sensing intelligent processing algorithms.Taking several typical remote sensing intelligent algorithms as examples, the efficiency of the scheme in the integrated development and deployment was proved, and the feasibility of the new cloud mode of remote sensing intelligent technology was explored.…”
    Get full text
    Article
  18. 1018

    Le cadre de management du tourisme intelligent by Shiwei Shen, Marios Sotiriadis

    Published 2022-04-01
    “…The advancement of information and communication technologies (ICT) in general, and cloud computing technologies in particular, is driving tourism destinations and providers to leverage smart technologies to optimize their decision-making, strategic planning, and improve the tourism experience for visitors. …”
    Get full text
    Article
  19. 1019

    Analysis and modeling of Internet backbone traffic with 5G/B5G by Yuan YANG, Mingwei XU, Hao CHEN

    Published 2019-08-01
    “…The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.…”
    Get full text
    Article
  20. 1020

    Software in Metrology for the Digital Age: Addressing Compliance Challenges with MID, NAWID, and MDR by Koval Martin, Tesař Jiří, Staněk Martin, Foltýnek Jaroslav

    Published 2025-01-01
    “…Emerging technologies like AI, IoT, or cloud computing introduce compliance challenges. This article analyzes and compares software requirements in MID, NAWID, and MDR, focusing on software lifecycle, regulatory gaps, and risk assessment.…”
    Get full text
    Article