-
61
Research on RTCWeb and Its Merging with IMS
Published 2013-01-01“…Compared with traditional client, RTCWeb client enables more convenient operation, more flexible development, and detachment from the operating system and platform. It is a better choice for service developers, network operators and terminal users. …”
Get full text
Article -
62
Video Service Quality Guarantee over Smart TV Termial
Published 2013-04-01“…With the development of internet business,intelligent terminals are becoming more and more popular.Faster CPU operating speed,more convenient operating system and flash and RAM with larger capacity than before are brought by terminal intelligence.Intelligent set-top box(STB)can support the IPTV service and OTT service at the same time.The method of estimating video quality experience,differences between IPTV and OTT service business realization mechanism in intelligent terminal was discussed.According to the difference between two types of video service,the method and requirement of quality assurance for video service was presented in the intelligent set-top box.…”
Get full text
Article -
63
Defense of hidden backdoor technology for Web
Published 2020-05-01“…Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.…”
Get full text
Article -
64
An Embedded Laser Marking Controller Based on ARM and FPGA Processors
Published 2014-01-01“…The existing laser marking machine based on PC and WINDOWS operating system, are large and inconvenient to move. Still, it cannot work outdoors or in other harsh environments. …”
Get full text
Article -
65
Finite Element Analysis of the Key Component of Chain- type Lifting System
Published 2015-01-01“…In order to study the security and reliability of chain force transmission components of note-temperature steam flooding snubbing workover machine lifting operating system,the analysis is carried out by using the finite element software,the distribution of the chain static strength stress is accurately simulated,the result of chain the maximum equivalent stress is less than the yield limit of the material is obtained,and the contact portion of the pin and sleeve is easy to wear,when worn,the chain pitch increase,the service life will be reduced with the increasing of total length of the chain. …”
Get full text
Article -
66
State feedback impulsive control of computer worm and virus with saturated incidence
Published 2018-11-01“…Considering the transmission features, saturated infectious is adopted to describe the spreading in the model, and all the treatment measures, such as patching operating system and updating antivirus software, are assumed to take effect instantly. …”
Get full text
Article -
67
Cloud storage scheme based on closed-box encryption
Published 2017-07-01“…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
Get full text
Article -
68
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01“…A novel duality and multi-level security model(DMLSM) based on intransitive noninterference theory was proposed,which protects confidentiality of information based on BLP model and integrity based on Biba model.To en-hance the usability of model,it introduces confidentiality trusted domain and integrality trusted domain which check the operations that violate the security policy in confidentiality check-room or integrity check-room respectively,then allow or refuse the access.The strict formal description of the model based on intransitive noninterference theory of informa-tion flow is given;furthermore,it proves the security of the model.The implementation of the model in Linux operating system is discussed and the application of model in practice is also demonstrated.The research gives Some contributes on the protection for sensitive important information and national information content security infrastructure.…”
Get full text
Article -
69
Technical solution and application of 5G slicing private network based on cloud-network integration
Published 2022-07-01“…Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.…”
Get full text
Article -
70
Traffic characteristic based privacy leakage assessment scheme for Android device
Published 2020-02-01“…Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering method,which was applied in mobile device.The TF-IDF model calculated the business relevance between Apps and hosts via the behavior characteristics of the hosts in these Apps.For the business related hosts that fail to express the business relevance characteristics,those hosts were adjusted and optimized via the average connected hierarchical agglomerative clustering method.Finally,the harmful degree of privacy leakage was evaluated based on the ranking of all hosts in the App.The experimental results verify the effectiveness and efficiency of the scheme.…”
Get full text
Article -
71
« Le droit français aux prises avec les limites planétaires »
Published 2023-12-01“…The objective is to ensure a safe operating system for humanity based on ecological thresholds associated with nine biophysical processes that regulate the stability of the Earth as a whole. …”
Get full text
Article -
72
FORMATION OF SYSTEMICALLY INTEGRATED ACCOUNTING AND THE MECHANISM OF ITS IMPLEMENTATION IN THE SYSTEM OF QUALITY MANAGEMENT OF BUSINESS PROCESSES
Published 2018-07-01“…It is determined that for efficient business management systems not only need to have highly qualified managers and technical base (expensive operating system), but also two information systems that interact on the basis of the principle of convergence and economic viability (growth strategy of the business value) of accounting and analytical control-regulatory system for business management purposes. …”
Get full text
Article -
73
Landscape Design Software: Evaluation and Recommendations for Homeowners
Published 2016-02-01“…This 9-page fact sheet will help you estimate costs, ensure compatibility with your Windows-based or Apple-based operating system, and compare reviews from consumer websites so that you can choose the software that best fits your needs. …”
Get full text
Article -
74
IEEE 802.1x-based user identity-embedded IPv6 address generation scheme
Published 2019-12-01“…Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.…”
Get full text
Article -
75
Cost optimization model for multi-cloud network based on Kubernetes
Published 2023-02-01“…The cloud-native scheduling system, represented by Kubernetes, is widely used by cloud tenants in a multi-cloud environment.The problem of network observation becomes more and more serious, especially the cost of network traffic across cloud and region.In Kubernetes, the eBPF technology was introduced to collect the network data features of kernel state of operating system to solve the network observation problem, and then the network data features were modeled as QAP, a combination of heuristic and stochastic optimization was used to obtain the best near optimal solution in a real-time computing scenario.This model is superior to the Kubernetes native scheduler in the cost optimization of network resources, which is based on the scheduling strategy of computing resources only, and increases the complexity of scheduling links in a controllable range, effectively reduces the cost of network resources in a multi-cloud area deployment environment.…”
Get full text
Article -
76
Landscape Design Software: Evaluation and Recommendations for Homeowners
Published 2016-02-01“…This 9-page fact sheet will help you estimate costs, ensure compatibility with your Windows-based or Apple-based operating system, and compare reviews from consumer websites so that you can choose the software that best fits your needs. …”
Get full text
Article -
77
Autonomous Navigation of Robots Based on the Improved Informed-RRT∗ Algorithm and DWA
Published 2022-01-01“…Combined with the dynamic window approach (DWA), the improved algorithm is utilized to simulate the autonomous navigation process of the robot based on the Robot Operating System (ROS) platform. The simulation results show that compared with the original algorithm, the length of the global path is reduced by 5.15%, and the time of planning path and autonomous navigation is shortened by 78.34% and 21.67%, respectively.…”
Get full text
Article -
78
Digital Transformation of Technological Design in the Preparation of Design Engineers: History and Prospects
Published 2020-04-01“…It was the general name for several types of Soviet minicomputers produced in the 1970s and 1980s) operating under the control of a real-time operating system, and ending with electronic complexes for information support of design and technological design based on PDM systems.…”
Get full text
Article -
79
Ringworm Detection and Diagnosis System.
Published 2024“…The system employs picture imaging using processor Intel i5, 8GB RAM, and the operating system Windows 10 Pro. The proposed system achieves an accurate detection rate of ringworm. …”
Get full text
Thesis -
80
Implementing Computer Vision in Android Apps and Presenting the Background Technology with Mathematical Demonstrations
Published 2025-01-01“…The mobile app was implemented on the Android operating system. The app has a live video feed of the surroundings. …”
Get full text
Article