Showing 101 - 120 results of 432 for search '"orchestration"', query time: 0.06s Refine Results
  1. 101

    QoS Assurance Key Technologies in Space-Ground Heterogeneous Network by Lin LIN, Bin ZHU, Zelin WANG, Guangquan WANG, Haipeng YAO, Tao DONG, Weiying FENG

    Published 2024-03-01
    “…The high dynamics of the topology structure, the high variability of the links between space and ground, and the highly limited network resource in the space-ground heterogeneous network pose significant challenges.To address these challenges, a space-ground heterogeneous joint QoS assurance scheme was proposed based on deep analysis of space-ground heterogeneous network development situation.The cross-domain network resource orchestration, construction of a space-ground QoS system, dynamic policy control of heterogeneous joint QoS, and on-demand adaptation and deployment of space-ground network resources technologies were discussed.…”
    Get full text
    Article
  2. 102

    The Un/Bearable Lightness of (Slow) Watching: Audiovisual Boredom as Stimulation by Beata Zawadka

    Published 2022-12-01
    “…Slow cinema and serials—in particular those coming to us via streaming platforms as full seasons to binge-watch—are a special case of such a breakthrough for they offer us a new dynamics of experiencing culture; dynamics that relies on a meticulous orchestration of boredom to stimulate our creative participation in culture. …”
    Get full text
    Article
  3. 103

    An architecture of database-based open resource service networking by Fenlin ZHOU, Xiaocong QIAN, Dongyu YUAN

    Published 2023-08-01
    “…The deep cloud-network integration hopes that the network side can provide fine-grained and on-demand customized services for cloud-side services, which poses a great challenge to existing IP bearer networks.To this end, an architecture of database-based open resource service networking was proposed.By abstracting the atomic service capabilities of the network and publishing services through a strongly consistent distributed key-value database, on-demand use of networking services at the cloud-side, joint cloud-network orchestration, and one point of business access could be achieved, which could flexibly meet the needs of cloud-network integration and achieve efficient carrying and refined services for diversified businesses.…”
    Get full text
    Article
  4. 104

    KubeTelecom: a multi-cloud multi-container cluster management and operation engine for 5G network slicing by Yuting WU, Xuliang WANG, Shuo QUAN

    Published 2021-12-01
    “…KubeTelecom design architecture and implementation were proposed and introduced in detail, which was for multi-cloud multi-container cluster management and operation and maintenance engine operators’ multiple network cloud applications.Based on the bearer requirements of the 5G slicing scenario, KubeTelecom provided the upper-layer application platform with multi-container cluster management and orchestration capabilities and data-driven comprehensive operation and maintenance capabilities were analyzed in detail.The future telecom cloud platform integrates the KubeTelecom module to provide unified resource management and operation and maintenance capabilities for multiple cloud-native applications, and provide solid technical support for the development of operators’ multiple DICT business ecosystems.…”
    Get full text
    Article
  5. 105

    Study on digital twins in network lifecycle management by Da WANG, Tao SUN, Xiaowen SUN, Jianchao GUO, Jie SUN, Guo CHEN, Aidong YANG, Ye OUYANG

    Published 2022-04-01
    “…As consumers’ demands for mobile services have become more abundant and diversified, the architecture and functions of mobile network have become more complex.With the development of 5G technology, 5G mobile network could realize on-demand orchestration and flexible exposure of network capabilities, which made higher requirements for network lifecycle management.Digital twins technology could be used to assist the network lifecycle management, so as to improve the network management quality, reduce network risks and costs, and achieve the visual perception and the real-time closed-loop control.The network digital twin platform and application cases show that the proposed network digital twins platform can realize visual monitoring and analysis of mobile network operation key performance indicators and quickly diagnosis of network faults.…”
    Get full text
    Article
  6. 106

    Large-scale resource state monitoring strategy in network function virtualization environment by Meisheng HAI, Peng YI, Yiming JIANG, Jichao XIE

    Published 2019-12-01
    “…In order to improve the utilization of the infrastructure resource and efficiently deploy the service function chain dynamically in network function virtualization,the orchestration management domain needs to monitor the network resources and virtual network function status in real time,but real-time monitoring will bring large communication overhead.An intelligent distributed monitoring strategy with minimal network communication overhead was proposed.The improved label propagation algorithm intelligently subnets and selects agent monitoring nodes to achieve efficient monitoring of resource and virtual function status and minimize monitoring information communication overhead.The simulation results show that the monitoring strategy proposed reduces the monitoring information communication overhead in the network by about 13%.…”
    Get full text
    Article
  7. 107

    MEIOSIS: HOW TO HALVE THE CHROMOSOME NUMBER by A. A. Torgasheva

    Published 2014-12-01
    “…Its success depends on precise time and space orchestration of many processes, such as chromosome replication, packaging, exchange of homologous regions, alignment in the plane of division, and disjunction. …”
    Get full text
    Article
  8. 108

    L’Histoire culbutée : Shakespeare et ses jeux de mots by Jean-Pierre Richard

    Published 2022-01-01
    “…Out of ancient history and the history of England, Shakespeare created a parallel world of obscene tableaux, shows, and stories, through a selective and meticulous orchestration of the signifying at play in any language. …”
    Get full text
    Article
  9. 109

    Survey of the future network technology and trend by Tao HUANG, Jiang LIU, Shuo WANG, Chen ZHANG, Yunjie LIU

    Published 2021-01-01
    “…Several typical technologies about the future network were introduced.First, the background of each technology were introduced.Then, the current research progress and main results of each technology were expounded from eight aspects: network control and orchestration, programmable network, deterministic network, network computing and storage integration, network with artificial intelligence, network with blockchain, intelligent security network, space network.Finally the development trends and challenges of each technology were analyzed.It was expected that by 2030, the future network will support trillion-level, human-machine, all-time-space, safe, and intelligent connections and services.It is hoped that it can provide references and help for future network research.…”
    Get full text
    Article
  10. 110

    La Donna del Lago de Rossini : première entrée en scène de Walter Scott dans l’opéra italien by Liliane Lascoux

    Published 2011-12-01
    “…If the libretto is unfaithful to the letter of the source, the music pays homage to its spirit and conveys the heroic and legendary aspect of the drama with an extended, inventive and attentive orchestration, thus indicating a decisive step in the “Rossinian Revolution” with the development of a pastoral style, one of the bases of Romantic opera.…”
    Get full text
    Article
  11. 111

    Research and practice of software-defined security technology architecture in the 5G+ era by Shuo QUAN, Xuliang WANG, Zeya ZHU

    Published 2021-12-01
    “…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
    Get full text
    Article
  12. 112

    Dynamic Capabilities: A Measurement Proposal and its Relationship with Performance by Ivan Lapuente Garrido, Caroline Kretschmer, Silvio Luis de Vasconcellos, Cláudio Reis Gonçalo

    Published 2020-01-01
    “…There is a lack of empirical research that is attempting to investigate the existence, development, and orchestration of Dynamic Capabilities to support superior performance. …”
    Get full text
    Article
  13. 113

    Management technologies of cyberspace endogenous safety and security test site by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2021-03-01
    “…The cyber range has been widely recognized as an effective way to study the technologies of network attack/defense and the vulnerability of network architecture.The endogenous safety and security test site that receives high attention recently is a type of cyber range for cyber space endogenous safety and security technologies.Based on the new situation of cyberspace with 5G development, a test site management technology for virtual-real network settings was proposed, and a test site management architecture based on the endogenously secured software defined network controller was designed.A design of the endogenously secured network control system was also proposed, which used a middle layer forwarding agent to achieve data isolation and supported multiple heterogeneous open-source controllers.Finally, a test site scenario reconfiguration and resource orchestration method was proposed based on a test site networking scheme.…”
    Get full text
    Article
  14. 114

    Locating the university lecture as a contemporary educational practice by Crook Charles

    Published 2022-07-01
    “…These are characterised in terms of three communication priorities: orchestration, enactment, and dialogue. An emphasis on the dialogic nature of exposition suggested an exploratory intervention in which students collaborated with a peer around a recorded lecture. …”
    Get full text
    Article
  15. 115

    Intelligent and open new generation telecom service architecture and its key technologies by Jianxin LIAO, Hao ZHANG, Tong XU, Lingfei NI, Jingyu WANG, Wenfu WU

    Published 2020-09-01
    “…For complex heterogeneous networks,IOTSA (intelligent and open telecom service architecture) based on the comprehensive decoupling of service systems was proposed,as well as core mechanisms such as intelligent scheduling of network resources,dynamic service orchestration and combination,and intelligent monitoring of abnormal behavior.Through the establishment of a three-level interface and four-layer capability opening architecture,multi-granular capability opening and comprehensive resource sharing were realized,which met the needs of multiple scenarios.Key technologies such as low-risk and low-cost rapid decoupling of service systems and dynamic coordination of multiple services were proposed.These achievements had formed a series of international standards and had been applied on a large scale on existing networks.By providing a large number of ultra-fine-grained capabilities,396 atomic capabilities,and flexible composite capabilities,the development of operator and third-party services and applications were strongly supported.…”
    Get full text
    Article
  16. 116

    Choreography-driven business process management framework based on blockchain by Dongjin YU, Yijie WEI, Xiaoxiao SUN, Ke NI, Hujun SHEN

    Published 2021-09-01
    “…Aiming at the problems of high process instantiation cost and difficult version iteration in the current blockchain-based business process management systems, a choreography-driven blockchain business process management framework was proposed.The framework included a general smart contract that could be used to store business process choreography meta-models, model component evolution versions, and instance execution status.The cost of process model instantiation on the blockchain was significantly reduced by delaying model elements instantiation timing and integrating multiple process instances.At the same time, a version control method based on model data reuse and voting mechanism was introduced, so that process instances of different versions of orchestration models could be created in a single smart contract.A real case validates the effectiveness of the framework in distributed business process management.…”
    Get full text
    Article
  17. 117

    The Pyramid and the Mosaic. Otto Neurath’s encyclopedism as a critical model by Andrea Alberto Dutto

    Published 2017-07-01
    “…Particularly, Neurath conceives of a comprehensive theory of a unified science that postulates the necessity of orchestration within the discursive procedures in science, inspired by the model of encyclopedism. …”
    Get full text
    Article
  18. 118

    Research and application of G-SRv6 head compressions optimization technology by Weiqiang CHENG, Yisong LIU, Wenying JIANG, Geng ZHANG

    Published 2020-08-01
    “…As the key technology of the new generation IP network,SRv6 has gradually become the direction of network evolution in the 5G and cloud networks.The problems how to solve the problems of excessive head overhead,low payload efficiency,and difficult upgrading from the existing network has become the focus of the industry.Based on this technical problem,header compression design principles were proposed firstly,including mechanism compatible with standard SRv6 header encapsulation,inheriting the advantages of standard SRv6 and IPv6,compatible with existing network address plan,achieving an effective balance of compression efficiency and processing performance,and interconnecting with existing networks.Secondly,a G-SID header compression solution was proposed based on common prefix stitching,the key technical capabilities of G-SID container,COC flavor,and SID index were defined,and a network orchestration solution for mixed deployment of compressed and uncompressed networks was proposed.Finally,the progress of the G-SID solution in the industry’s international standards was introduced,and has been verified by the interoperability of multi-vendor equipment,and the pilot deployment on the existing network was planned to promote the rapid deployment of SRv6 on the entire network.…”
    Get full text
    Article
  19. 119

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  20. 120

    Phased array radar individual recognition based on phase-frequency fusion feature by LI Baozhu, MA Lu, LI Longhui, HONG Tao, JIANG Wen

    Published 2024-12-01
    “…Considering that the phased array radar signal was difficult to collect, the number of transceiver components was large, and the unintentional modulation features were complex, the phased array radar unintentional modulation signal model was constructed based on the method of wave-position orchestration and isophase surface. Based on the bispectral method, the signal bispectral map was obtained and perimeter integration was performed to extract the unintentionally modulated phase features of the signal. …”
    Get full text
    Article