-
101
QoS Assurance Key Technologies in Space-Ground Heterogeneous Network
Published 2024-03-01“…The high dynamics of the topology structure, the high variability of the links between space and ground, and the highly limited network resource in the space-ground heterogeneous network pose significant challenges.To address these challenges, a space-ground heterogeneous joint QoS assurance scheme was proposed based on deep analysis of space-ground heterogeneous network development situation.The cross-domain network resource orchestration, construction of a space-ground QoS system, dynamic policy control of heterogeneous joint QoS, and on-demand adaptation and deployment of space-ground network resources technologies were discussed.…”
Get full text
Article -
102
The Un/Bearable Lightness of (Slow) Watching: Audiovisual Boredom as Stimulation
Published 2022-12-01“…Slow cinema and serials—in particular those coming to us via streaming platforms as full seasons to binge-watch—are a special case of such a breakthrough for they offer us a new dynamics of experiencing culture; dynamics that relies on a meticulous orchestration of boredom to stimulate our creative participation in culture. …”
Get full text
Article -
103
An architecture of database-based open resource service networking
Published 2023-08-01“…The deep cloud-network integration hopes that the network side can provide fine-grained and on-demand customized services for cloud-side services, which poses a great challenge to existing IP bearer networks.To this end, an architecture of database-based open resource service networking was proposed.By abstracting the atomic service capabilities of the network and publishing services through a strongly consistent distributed key-value database, on-demand use of networking services at the cloud-side, joint cloud-network orchestration, and one point of business access could be achieved, which could flexibly meet the needs of cloud-network integration and achieve efficient carrying and refined services for diversified businesses.…”
Get full text
Article -
104
KubeTelecom: a multi-cloud multi-container cluster management and operation engine for 5G network slicing
Published 2021-12-01“…KubeTelecom design architecture and implementation were proposed and introduced in detail, which was for multi-cloud multi-container cluster management and operation and maintenance engine operators’ multiple network cloud applications.Based on the bearer requirements of the 5G slicing scenario, KubeTelecom provided the upper-layer application platform with multi-container cluster management and orchestration capabilities and data-driven comprehensive operation and maintenance capabilities were analyzed in detail.The future telecom cloud platform integrates the KubeTelecom module to provide unified resource management and operation and maintenance capabilities for multiple cloud-native applications, and provide solid technical support for the development of operators’ multiple DICT business ecosystems.…”
Get full text
Article -
105
Study on digital twins in network lifecycle management
Published 2022-04-01“…As consumers’ demands for mobile services have become more abundant and diversified, the architecture and functions of mobile network have become more complex.With the development of 5G technology, 5G mobile network could realize on-demand orchestration and flexible exposure of network capabilities, which made higher requirements for network lifecycle management.Digital twins technology could be used to assist the network lifecycle management, so as to improve the network management quality, reduce network risks and costs, and achieve the visual perception and the real-time closed-loop control.The network digital twin platform and application cases show that the proposed network digital twins platform can realize visual monitoring and analysis of mobile network operation key performance indicators and quickly diagnosis of network faults.…”
Get full text
Article -
106
Large-scale resource state monitoring strategy in network function virtualization environment
Published 2019-12-01“…In order to improve the utilization of the infrastructure resource and efficiently deploy the service function chain dynamically in network function virtualization,the orchestration management domain needs to monitor the network resources and virtual network function status in real time,but real-time monitoring will bring large communication overhead.An intelligent distributed monitoring strategy with minimal network communication overhead was proposed.The improved label propagation algorithm intelligently subnets and selects agent monitoring nodes to achieve efficient monitoring of resource and virtual function status and minimize monitoring information communication overhead.The simulation results show that the monitoring strategy proposed reduces the monitoring information communication overhead in the network by about 13%.…”
Get full text
Article -
107
MEIOSIS: HOW TO HALVE THE CHROMOSOME NUMBER
Published 2014-12-01“…Its success depends on precise time and space orchestration of many processes, such as chromosome replication, packaging, exchange of homologous regions, alignment in the plane of division, and disjunction. …”
Get full text
Article -
108
L’Histoire culbutée : Shakespeare et ses jeux de mots
Published 2022-01-01“…Out of ancient history and the history of England, Shakespeare created a parallel world of obscene tableaux, shows, and stories, through a selective and meticulous orchestration of the signifying at play in any language. …”
Get full text
Article -
109
Survey of the future network technology and trend
Published 2021-01-01“…Several typical technologies about the future network were introduced.First, the background of each technology were introduced.Then, the current research progress and main results of each technology were expounded from eight aspects: network control and orchestration, programmable network, deterministic network, network computing and storage integration, network with artificial intelligence, network with blockchain, intelligent security network, space network.Finally the development trends and challenges of each technology were analyzed.It was expected that by 2030, the future network will support trillion-level, human-machine, all-time-space, safe, and intelligent connections and services.It is hoped that it can provide references and help for future network research.…”
Get full text
Article -
110
La Donna del Lago de Rossini : première entrée en scène de Walter Scott dans l’opéra italien
Published 2011-12-01“…If the libretto is unfaithful to the letter of the source, the music pays homage to its spirit and conveys the heroic and legendary aspect of the drama with an extended, inventive and attentive orchestration, thus indicating a decisive step in the “Rossinian Revolution” with the development of a pastoral style, one of the bases of Romantic opera.…”
Get full text
Article -
111
Research and practice of software-defined security technology architecture in the 5G+ era
Published 2021-12-01“…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
Get full text
Article -
112
Dynamic Capabilities: A Measurement Proposal and its Relationship with Performance
Published 2020-01-01“…There is a lack of empirical research that is attempting to investigate the existence, development, and orchestration of Dynamic Capabilities to support superior performance. …”
Get full text
Article -
113
Management technologies of cyberspace endogenous safety and security test site
Published 2021-03-01“…The cyber range has been widely recognized as an effective way to study the technologies of network attack/defense and the vulnerability of network architecture.The endogenous safety and security test site that receives high attention recently is a type of cyber range for cyber space endogenous safety and security technologies.Based on the new situation of cyberspace with 5G development, a test site management technology for virtual-real network settings was proposed, and a test site management architecture based on the endogenously secured software defined network controller was designed.A design of the endogenously secured network control system was also proposed, which used a middle layer forwarding agent to achieve data isolation and supported multiple heterogeneous open-source controllers.Finally, a test site scenario reconfiguration and resource orchestration method was proposed based on a test site networking scheme.…”
Get full text
Article -
114
Locating the university lecture as a contemporary educational practice
Published 2022-07-01“…These are characterised in terms of three communication priorities: orchestration, enactment, and dialogue. An emphasis on the dialogic nature of exposition suggested an exploratory intervention in which students collaborated with a peer around a recorded lecture. …”
Get full text
Article -
115
Intelligent and open new generation telecom service architecture and its key technologies
Published 2020-09-01“…For complex heterogeneous networks,IOTSA (intelligent and open telecom service architecture) based on the comprehensive decoupling of service systems was proposed,as well as core mechanisms such as intelligent scheduling of network resources,dynamic service orchestration and combination,and intelligent monitoring of abnormal behavior.Through the establishment of a three-level interface and four-layer capability opening architecture,multi-granular capability opening and comprehensive resource sharing were realized,which met the needs of multiple scenarios.Key technologies such as low-risk and low-cost rapid decoupling of service systems and dynamic coordination of multiple services were proposed.These achievements had formed a series of international standards and had been applied on a large scale on existing networks.By providing a large number of ultra-fine-grained capabilities,396 atomic capabilities,and flexible composite capabilities,the development of operator and third-party services and applications were strongly supported.…”
Get full text
Article -
116
Choreography-driven business process management framework based on blockchain
Published 2021-09-01“…Aiming at the problems of high process instantiation cost and difficult version iteration in the current blockchain-based business process management systems, a choreography-driven blockchain business process management framework was proposed.The framework included a general smart contract that could be used to store business process choreography meta-models, model component evolution versions, and instance execution status.The cost of process model instantiation on the blockchain was significantly reduced by delaying model elements instantiation timing and integrating multiple process instances.At the same time, a version control method based on model data reuse and voting mechanism was introduced, so that process instances of different versions of orchestration models could be created in a single smart contract.A real case validates the effectiveness of the framework in distributed business process management.…”
Get full text
Article -
117
The Pyramid and the Mosaic. Otto Neurath’s encyclopedism as a critical model
Published 2017-07-01“…Particularly, Neurath conceives of a comprehensive theory of a unified science that postulates the necessity of orchestration within the discursive procedures in science, inspired by the model of encyclopedism. …”
Get full text
Article -
118
Research and application of G-SRv6 head compressions optimization technology
Published 2020-08-01“…As the key technology of the new generation IP network,SRv6 has gradually become the direction of network evolution in the 5G and cloud networks.The problems how to solve the problems of excessive head overhead,low payload efficiency,and difficult upgrading from the existing network has become the focus of the industry.Based on this technical problem,header compression design principles were proposed firstly,including mechanism compatible with standard SRv6 header encapsulation,inheriting the advantages of standard SRv6 and IPv6,compatible with existing network address plan,achieving an effective balance of compression efficiency and processing performance,and interconnecting with existing networks.Secondly,a G-SID header compression solution was proposed based on common prefix stitching,the key technical capabilities of G-SID container,COC flavor,and SID index were defined,and a network orchestration solution for mixed deployment of compressed and uncompressed networks was proposed.Finally,the progress of the G-SID solution in the industry’s international standards was introduced,and has been verified by the interoperability of multi-vendor equipment,and the pilot deployment on the existing network was planned to promote the rapid deployment of SRv6 on the entire network.…”
Get full text
Article -
119
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
120
Phased array radar individual recognition based on phase-frequency fusion feature
Published 2024-12-01“…Considering that the phased array radar signal was difficult to collect, the number of transceiver components was large, and the unintentional modulation features were complex, the phased array radar unintentional modulation signal model was constructed based on the method of wave-position orchestration and isophase surface. Based on the bispectral method, the signal bispectral map was obtained and perimeter integration was performed to extract the unintentionally modulated phase features of the signal. …”
Get full text
Article