Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
14181
Realization of vOLT and development trend
Published 2018-07-01“…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
Get full text
Article -
14182
Realization of vOLT and development trend
Published 2018-07-01“…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
Get full text
Article -
14183
Private Cloud Assistant Trust Model for P2P Secure Transactions
Published 2015-01-01“…With a few characteristics during computing and storage process(e.g. high efficiency, security, neutrality), private cloud platform is capable to provide trustworthiness calculation, storage and evaluation for each peer in P2P network. …”
Get full text
Article -
14184
机构综合的刚体运动混沌反控制方法研究
Published 2008-01-01“…The discovery of dynamical chaos is one of the main achievements in the modern science and how to expand its application has important significance to the development of modern science.Many questions in natural science and engineering are transformed into nonlinear equations to be found,Newton iterative method is an important technique to one dimensional and multidimensional variables and iterative process exhibits sensitive dependence on initial guess point.For the first time,a new method to find all solutions based on utilizing anti-control of chaos in rigid body motion to obtain locate initial points to find all solutions of the nonlinear questions was proposed.The range of chaotic variables is bigger than other methods and the chaotic variables are not emanative,so the computing time is less than other.The numerical examples in linkage synthesis and approximate synthesis show that the method is correct and effective.…”
Get full text
Article -
14185
Physarum Boats: If Plasmodium Sailed It Would Never Leave a Port
Published 2010-01-01“…The plasmodium is a promising substrate for non-classical, nature-inspired computing devices. It is capable of approximation of the shortest path in a maze, computation of planar proximity graphs and plane tessellations, primitive memory and decision making. …”
Get full text
Article -
14186
Matrix Approaches for Covering-Based Multigranulation Fuzzy Rough Set Models
Published 2023-01-01“…Hence, presenting novel methods to compute them quickly is our motivation for this paper. …”
Get full text
Article -
14187
-
14188
NUMERICAL SIMULATION OF TEMPERATURE FIELD AND STRESS FIELD FOR BRAKE DISK IN MINE HOIST
Published 2017-01-01“…Based on the of theory heat conduction and thermal-elasticity,simulated the braking process of mine hoist. The changing laws of the boundary condition on the brake disc’s surface during braking were analyzed and the computing method of the convective coefficient was discussed emphatically. …”
Get full text
Article -
14189
A Quantum Implementation Model for Artificial Neural Networks
Published 2018-02-01“… The learning process for multilayered neural networks with many nodes makes heavy demands on computational resources. …”
Get full text
Article -
14190
Application of flexible electronic materials and devices
Published 2019-09-01“…New flexible electronic materials and devices have been developed rapidly in nearly a decade from the proposition,discovery,implementation to application.The impact of its strong fold ability and multi-capacity composite structures to technological development and system applications will be enormous.Two mainstream flexible implementation methods were compared:the material-induced flexibility and the structure-induced flexibility.The research progress of domestic and international in related fields was analyzed,including infrastructure,process and potential application directions,and the technical problems faced were summarized.According to the basic research status,flexible electronic devices will have mature application technology innovations achievements in the next few years,new and unprecedented wearable communication,wearable computing,distributed energy,environmental sensing,conformal display devices and devices will be formed.…”
Get full text
Article -
14191
Research on the consensus of big data systems based on RDMA and NVM
Published 2019-07-01“…Distributed storage systems and computing systems are the foundation for constructing big data processing systems.High availability of the system is the cornerstone of any distributed system.High-availability technologies generally rely on consensus protocols.The classic non-Byzantine distributed consensus protocol was discussed,as well as the RDMA communication protocol and NVM storage media under the development of new technologies to achieve higher performance high availability systems by combining them.The consensus protocol to make the better use of the features of RDMA and NVM was modified.The implemented system effectively improves the performance of the protocol while ensuring the consistency and availability of the system data.Experiments show that the system implemented in this paper can achieve 40% performance improvement compared to existing systems.…”
Get full text
Article -
14192
Cyber-physical-social system:a data-centric framework
Published 2017-11-01“…Cyber-physical-social system(CPSS) connects the cyber space,the physical space,and the social space,which has become a promising human-in-the-loop computing system.The unique features of CPSS from the data-centric level were characterized,including the interweaving of spatio-temporal data,the fusion of cross-space data and the collaboration of human and machine intelligence.Furthermore,a general framework for data-centric CPSS was built,with the underpinnings such as resource management,collaborative sensing,data pre-processing,data fusion,and privacy protection.Finally,the major application areas of data-centric CPSS (e.g.…”
Get full text
Article -
14193
Security risk analysis of power 5G hybrid networking
Published 2022-01-01“…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
Get full text
Article -
14194
Écologie sociale et humanités numériques : intégrer la poésie à la science
Published 2025-06-01“…Do DH have a role to play in a process of degrowth? How would an ecological DH project be organised? …”
Get full text
Article -
14195
Probabilistic approach to robust wearable gaze tracking
Published 2017-11-01“…This paper presents a method for computing the gaze point using camera data captured with a wearable gaze tracking device. …”
Get full text
Article -
14196
Exploration of crowdsourcing in information extraction from remote sensing images
Published 2016-11-01“…Based on geospatial data cloud(GSCloud),the application of crowdsourcing in large scale information extraction from satellite images was studied,and a systematic architecture of this paradigm was proposed.By performing an experiment of extracting lakes on Qinghai-Tibetan plateau from landsat images,various aspects of the paradigm like the incentive mechanism,task assignment method,task division and many others were explored.Results show that paying part of the reward in advance and assigning a task to a team instead of individuals do not help attracting more applicants and improving the quality of results.And the accumulation of talents is of critical importance to obtain high-quality task results.Since this paradigm integrates crowdsourcing and machine computing power,and it is generic,it can be applied in more massive remote sensing image processing work which requires much human intervention.…”
Get full text
Article -
14197
Online Discrete Anchor Graph Hashing for Mobile Person Re-Identification
Published 2021-01-01“…Besides, mobile person re-id task also requires real-time processing. In this paper, we propose a novel hashing method: online discrete anchor graph hashing (ODAGH) for mobile person re-id. …”
Get full text
Article -
14198
Reverse-Engineered Exact Control of Population Transfer in Lossy Nonlinear Three-State Systems
Published 2024-10-01“…These features open doors for practical implementation and scalability in quantum technologies, with potential applications in quantum information processing, quantum computing, and quantum communication.…”
Get full text
Article -
14199
Design of Block-Scrambling-Based privacy protection mechanism in healthcare using fusion of transfer learning models with Hippopotamus optimization algorithm
Published 2025-07-01“…At first, the block-scrambling-based encryption (BSBE) technique is utilized in the image encryption pre-processing stage, and then the decryption process is performed. …”
Get full text
Article -
14200