Showing 181 - 200 results of 228 for search '"operating system"', query time: 0.05s Refine Results
  1. 181

    Build Efficient and Simple Network Operation and Maintenance of OTN by Wenxin Gong

    Published 2013-09-01
    “…Suzhou Telecom tested and explored again and again to find out the new thinking of OTN network operations, through the establishment of OTN operational system and realized the visualization of the resource management and health analysis, carried out the routine maintenance work plan,form the network evaluation and optimization method and so on to realized the real-time monitoring and analysis of OTN, active operations, avoided the happening of the fault in advance, to build a business-centric OTN network reform mode and achieved great results.…”
    Get full text
    Article
  2. 182

    Research on the Influence of Sensor Network Communication in the Electromagnetic Environment of Smart Grid by Yiying Zhang, Suxiang Zhang, Yuemin Ding

    Published 2016-01-01
    “…And the sensing and communication device must be after equal parameter simulation environment under strict evaluation and verification can be put to use in actual production operation system. In this paper, we analyze the application of wireless sensor network in smart grid and propose the test method of the interaction between WSN and smart grid.…”
    Get full text
    Article
  3. 183

    A Benders Decomposition Algorithm for the Passenger Train Service Planning by Song Pu

    Published 2021-01-01
    “…The passenger train service planning is the key of the rail operations system to balance the transport service and the passenger demand. …”
    Get full text
    Article
  4. 184

    Cross-Platform Ecological Momentary Assessment App (JTrack-EMA+): Development and Usability Study by Mehran Sahandi Far, Jona M Fischer, Svea Senge, Robin Rathmakers, Thomas Meissner, Dominik Schneble, Mamaka Narava, Simon B Eickhoff, Juergen Dukart

    Published 2025-01-01
    “…ObjectiveThe primary aim of this research was to develop a cross-platform EMA app that ensures a uniform user experience and core features across various operating systems. Emphasis was placed on maximizing the integration and adaptability to various study designs, all while maintaining strict adherence to security and privacy protocols. …”
    Get full text
    Article
  5. 185

    Characterization of Antibiotics and Antibiotic Resistance Genes on an Ecological Farm System by Songhe Zhang, Ju Gu, Chao Wang, Peifang Wang, Shaojun Jiao, ZhenLi He, Bing Han

    Published 2015-01-01
    “…Therefore, continuous monitoring of antibiotics and their corresponding ARGs should be conducted in the agroecosystem near the concentrated animal farming operation systems.…”
    Get full text
    Article
  6. 186

    A ChIP-Seq Data Analysis Pipeline Based on Bioconductor Packages by Seung-Jin Park, Jong-Hwan Kim, Byung-Ha Yoon, Seon-Young Kim

    Published 2017-03-01
    “…This workflow runs well independently of operating systems (e.g., Windows, Mac, or Linux) and processes the input fastq files into various results in one run. …”
    Get full text
    Article
  7. 187
  8. 188

    THE CONSEQUENCES OF THE INTERNET FOR POLITICS by V. P. Terin

    Published 2013-08-01
    “…Barack Obama influences global politics as if it were operation system of the computer. Thus the author believes that such problems as determination of the driving forces of the Arab spring and real reasons for the USA refusal to sign new telecommunications treaty at the ITU conference in Dubai deserve special analysis taking into account the role of the information and communication technologies.…”
    Get full text
    Article
  9. 189

    Grenoble entre natures et cultures : exemple de la valorisation de l’agriculture périurbaine grenobloise by Anthony Tchékémian

    Published 2012-01-01
    “…Taking into account the social demand for nature, as a pattern of the operating systems, allows to further develop the debate around agriculture, through the role assigned to peri-urban agriculture. …”
    Get full text
    Article
  10. 190

    Research and implementation of intelligent endogenous technology for SDN cooperative controller by Le ZHANG, Yanqin WU, Ke ZHANG, Dongfeng MAO, Song JIANG, Huawei HU

    Published 2021-12-01
    “…In the face of new demands and challenges such as business diversification, data quantification and cloud network integration, the ideas and methods of cloud network operation are changing.As the core capability of the new generation of cloud network operation system, SDN controller was deeply integrated with artificial intelligence technology.The key technologies and application practices of full-process closed-loop autonomy capability including intention analysis, cloud network intelligence perception, guarantee, optimization and automatic execution were studied to form intelligent endogenous capability of SDN controller.Firstly, the SDN controller intelligent endogenous development background and significance were clarified.And then, the ability of intelligent endogenous architecture and distribution of core competence were illustrated, which gradually form the whole process of the closed loop cloud network autonomy.Finally, focusing on 5G slice, SRv6 scene of new technology new business use cases, the intelligent perception, independent guarantee, automatic optimization of the key aspects of technology, and the effect of implementation and application were resolved.Through capability architecture design, key capability research and development, implementation verification and layout in standardization, the internal intelligence of SDN controller would gradually mature and enable smart operation of cloud network.…”
    Get full text
    Article
  11. 191

    An English Online Homework Tutoring System Supported by Internet Database by Huanxiang Hao

    Published 2021-01-01
    “…It can be connected to different operating systems.…”
    Get full text
    Article
  12. 192

    Implementation of Static Line Voltage Stability Indices for Improved Static Voltage Stability Margin by Natakorn Thasnas, Apirat Siritaratiwat

    Published 2019-01-01
    “…Nowadays, the changes of economic, environment, and regulations are forcing the electric utilities to operate systems at maximum capacity. Therefore, the operation and control of power system to improve the system stability has been receiving a great deal of attention. …”
    Get full text
    Article
  13. 193

    Software diversity evaluating method based on gadget feature analysis by Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG

    Published 2023-06-01
    “…Software diversity is commonly utilized in scenarios such as software distribution and operating systems to improves system resilience and security.However, existing software diversity evaluation methods are typically based on conventional code features and are relatively limited in scope, which can make it difficult to accurately reflect the security benefits of software diversity.To address this issue, a software diversity evaluation method was proposed from the perspective of ROP attack by analyzing the impact of software diversity on the difficulty of building a gadget attack chain, the attacker’s potentially available computing power, and the attacker’s cost of searching for gadgets in different variants.Metrics for the quality, practicability, and distribution of gadgets were integrated into this method.Testing was conducted using diversity technologies with different granularity.The evaluation results showed that the proposed method could accurately and comprehensively reflect the security gain brought by software diversity.It was observed that software diversity could relocate/modify/delete a large number of gadgets in the software, increasing the cost of attacking different software variants but also leading to different degrees of software expansion.Finally, an analysis and discussion of the advantages and disadvantages of existing diversity techniques were conducted based on the experimental results.…”
    Get full text
    Article
  14. 194

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. …”
    Get full text
    Article
  15. 195

    Host security assessment method based on attack graph by Hongyu YANG, Haihang YUAN, Liang ZHANG

    Published 2022-02-01
    “…In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.…”
    Get full text
    Article
  16. 196

    A Resilience-Based Security Assessment Approach for CBTC Systems by Ruiming Lu, Huiyu Dong, Hongwei Wang, Dongliang Cui, Li Zhu, Xi Wang

    Published 2021-01-01
    “…With the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. With the continuous exposure of information technology vulnerabilities, security risks are increasing, and information is easy to use by malicious attackers, which can bring huge property and economic losses. …”
    Get full text
    Article
  17. 197

    Operational strategy, capabilities, and successfully accomplishing business strategy by Ayman Sadik Al Najjar, Mahmoud Salameh Qandeel

    Published 2025-01-01
    “…The results exhibit the challenges posed by rapid market changes, revealing the deficiencies of traditional operational systems focused solely on efficiency and cost. …”
    Get full text
    Article
  18. 198

    Quorum Systems towards an Asynchronous Communication in Cognitive Radio Networks by Sylwia Romaszko, Petri Mähönen

    Published 2012-01-01
    “…Quorum systems were originally developed for and widely used in the scope of operating systems. Recently, quorum systems have been also started to be applied to wireless communications. …”
    Get full text
    Article
  19. 199

    Using Shadow Page Cache to Improve Isolated Drivers Performance by Hao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Zhengdong Zhu, Chengzhe Liu

    Published 2015-01-01
    “…With the advantage of the reusability property of the virtualization technology, users can reuse various types and versions of existing operating systems and drivers in a virtual machine, so as to customize their application environment. …”
    Get full text
    Article
  20. 200

    Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection by S Mekid, D Wu, R Hussain, K Youcef-Toumi

    Published 2017-11-01
    “…This constitutes one of the timely and challenging issues of battery-operated systems. The purpose of this work is to characterize the radio transmission between underground buried pipes and base station using multi-layer media including both theoretical and experimental approaches by utilizing various modulation schemes. …”
    Get full text
    Article