Showing 9,261 - 9,280 results of 17,664 for search '"Architecture"', query time: 0.16s Refine Results
  1. 9261

    Linguistic analysis of virtual course's terminology by Danutė Kaklauskienė, Liudvikas Kaklauskas

    Published 2004-12-01
    “… A virtual course of computers architecture is analyses in the present article. A computer-aided set of words for this course is prepared. …”
    Get full text
    Article
  2. 9262
  3. 9263
  4. 9264

    Neural Network Approaches for Distributional Shifts in Environmental Sensors by Tobias Sukianto, Sebastian A. Schober, Cecilia Carbonelli, Simon Mittermaier, Robert Wille

    Published 2024-03-01
    “…We propose a novel transformer-based model architecture inspired by the field of natural language processing, showing advantages compared to other architectures in the presence of distributional shifts.…”
    Get full text
    Article
  5. 9265
  6. 9266

    Software reliability prediction with an improved Elman network model by CHENG Xu-chao1, CHEN Xin-yu1, GUO Ping1

    Published 2011-01-01
    “…In order to improve accuracy and dependability of using neural network for software reliability prediction,a multi-objective optimization-based improved Elman recurrent network method(Mop-IElman) was proposed.First,on the basis of the Elman network,a self-delay feedback of the output layer as another context layer was designed.Second,the network architecture and the initial outputs of these two context layers were taken as variables of network configuration setting,and NSGA-II was employed to simultaneously optimize prediction performance and robustness,then the Pareto solution was obtained.After that,by maximizing the sum of prediction performance and robustness,the final network configuration setting was determined.Finally,the proposed method was compared with the feed-forward neural network,the Elman network,both the single-objective and the multi-objective optimization Elman networks with respect to two real software failure data.It demonstrated that the proposed Mop-IElman achieves higher prediction accuracy and de-pendability.…”
    Get full text
    Article
  7. 9267

    Overview of the data security and privacy-preserving of mobile cloud services by Rui-xuan LI, Xin-hua DONG, Xi-wu GU, Wan-wan ZHOU, Cong WANG

    Published 2013-12-01
    “…Compared with the traditional cloud services,the mobi cloud services have the characteristics of the mobile interconnected,flexible end-user applications and convenient data access.However,the rich applications of mobile cloud services bring more security and privacy-leaking problems.The basic concepts,applications and security issues of mobile cloud services were shaded light on,and then describes the architecture of security and privacy-preserving was described,some key technologies were studied in this domain,mainly focusing on the research progress of the security protocols and authentication,access control,integrity verification,mobile trusted computing and the privacy-preserving based on encryption,anonymous and confusion,and the advantages and disadvantages were pointed out respectively.Finally,some future research direction were given at the end.…”
    Get full text
    Article
  8. 9268

    Research on isolated-forwarding technology oriented polymorphic network by Aihua LIU, Hanguang LUO, Jianzhong WEN, Zhiguo ZHAN

    Published 2023-06-01
    “…The polymorphic network adopted the idea of “separation of network technology system and supporting environment”, and through innovative network development paradigms, various existing or future network technology systems dynamically load and run on a fully dimensional and definable network environment in the form of network polymorph.The “self-directed and self-sustainable development” of diversified network technology systems was realized in the same physical facility.Based on the study of polymorphic network architecture, the technology of mutual isolation between network polymorphs was mainly proposed in polymorphic forwarding processing, and in the current Ethernet physical facilities, the Ethernet physical layer technology was used to realize the hard isolation function of polymorphic network forwarding, so as to achieve the effect of physical isolation of polymorphic network in the same Ethernet interface and switching medium, then provided independent forwarding environment support for network polymorph.…”
    Get full text
    Article
  9. 9269

    Fixed features of future networks based on future applications by Yawen ZHANG, Miao WANG, Linghao WANG, Hanwen ZHANG, Yujun ZHANG

    Published 2019-08-01
    “…More and more network applications place higher demands on the network functions and performance.Internet of vehicles requires the network to support low latency and high reliability,telemedicine requires it with deterministic latency and security assurance,the industrial internet requires networks to meet large connections and high reliability,AR/VR applications require low latency and high bandwidth,quantum computing also brings new challenges to network security.Due to the limitations of its own architecture,existing IP networks only provide best-effort services that cannot meet the needs of future network applications.Future network applications in the next 20 years were investigated,the functional and performance of the future network were analyzed.By describing the application scenarios of internet of vehicles,telemedicine,industrial internet AR/VR and quantum computing,the network performance to meet the needs of these scenarios was analyzed and the performance indicators of future networks were obtained.…”
    Get full text
    Article
  10. 9270

    Key technologies and application of artificial intelligence in telecom real-name system by Hui YAO, Siyan MA

    Published 2019-05-01
    “…Firstly, a real-name authentication system architecture which is based on artificial intelligence technologies was introduced. …”
    Get full text
    Article
  11. 9271

    Cloud native based edge computing: vision and challenges by Deze ZENG, Lvhao CHEN, Lin GU, Yuepeng LI

    Published 2021-06-01
    “…Cloud native computing, featured by low-cost container technology, well fits edge computing.It was proposed to apply cloud native computing to make edge computing resource management and control transparent to application development and operation.Compared with cloud computing, edge computing resources are widely distributed, highly heterogeneous, and fragmented, which called for collaborative resource management and control.According to the development status of cloud native related technologies, through the integration of future networking technologies such as soft were defined network and network function virtualization, a full-stack cloud native based edge computing architecture was proposed.Then, considering the hierarchical characteristics of containers, a low-overhead container deployment optimization problem for resource-limited edge computing was studied.Finally, the development challenges faced by cloud native based edge computing were discussed.…”
    Get full text
    Article
  12. 9272
  13. 9273

    Evaluating the Efficiency and Reliability of Fertilizer Subsidy Systems: The Role of Blockchain in Driving Enhancements in Tanzania by O. D. Mbita, M. R. Nicholaus, R. K. Twahir

    Published 2025-02-01
    “…The proposed hybrid architecture integrates well-structured algorithms to improve operational efficiency and ensure a more secure and fair distribution system. …”
    Get full text
    Article
  14. 9274

    Temporary city between emergency and recovery by Roberto Ruggiero

    Published 2018-12-01
    “…The paper presents the first results of a scientific-design research carried out at the School of Architecture and Design Eduardo Vittoria of Ascoli Piceno (SAAD) of the University of Camerino concerning the transformation of post-disaster first emergency settlements into temporary urban systems capable of reactivating social and productive dynamics.…”
    Get full text
    Article
  15. 9275

    Study on 5G wireless network enhancement technology for time sensitive networks by Jincan XIN, Sen XU, Hua ZHANG, Shangkun XIONG, Hua XU

    Published 2022-05-01
    “…5G deterministic network is a new type of industrial communication technology vigorously promoted by the international industry.3GPP had introduced the time-sensitive communication technology to facilitate deterministic transmission.Compared with ultra-reliable and low-latency communication technology, time-sensitive communication technology further enhanced the 5G network in terms of delay jitter and time synchronization to realize the end-to-end time sensitive communication.Characteristics of time sensitive communication technology were analyzed.Based on the time-sensitive networking and 5G network converged architecture, the time-sensitive communication technology reduces the time synchronization error through the accurate time synchronization mechanism.Additionally, the scheduling enhancement mechanism was introduced to reduce the transmission delay.Furthermore, the Ethernet header compression mechanism was proposed to improve transmission efficiency.…”
    Get full text
    Article
  16. 9276

    Les jardins paysagers des seigneurs domaniaux de l’époque d’Edo et les manuels relatifs à la composition des jardins by Nicolas Fiévé

    Published 2012-07-01
    “…Living far from Kyôto, which had been the cradle of gardening art until then, these lords call upon specialists who are in charge of the conception of landscape parks and their architectures: thus, the figure of the landscape-architect was born in Japan at the beginning of the 17th century. …”
    Get full text
    Article
  17. 9277

    Design and implementation of observability system based on event storage engine by CHEN Hongxi, QIU Xiaobin, QU Yang, CAO Lei, WANG Juzheng, CHEN Xin

    Published 2024-11-01
    “…To solve the challenges posed by the significant increase in software system complexity due to the drastic changes in software architecture and the widespread adoption of new technologies over the past decade—challenges that have led to a surge in software bugs and difficulties in system failure troubleshooting, a design and implementation method for a more flexible and efficient monitoring system tailored to traditional monolithic service-based monitoring systems was proposed. …”
    Get full text
    Article
  18. 9278

    MCKite: A Multi-Producer Multicast Scheme in Named Data Networking by Yu Zhang, Yanbin Sun, Hongli Zhang

    Published 2015-12-01
    “…Named data networking(NDN)-a future internet architecture replacing hosts with named data as the core objects in the network layer and natively supports single producer- multi consumer multicast application pattern. …”
    Get full text
    Article
  19. 9279

    Context, Community, and Capital by Susanne Schindler

    Published 2019-07-01
    “…This essay focuses on the language architects use to navigate the intersection of architecture, housing, and neoliberalism. Schindler argues that terminology plays a powerful role in allowing architects to avoid the socio-economic assumptions embedded in their work. …”
    Get full text
    Article
  20. 9280

    Application of IPv6 for State Grid Corporation Company Smart Grid by Biyao Huang, Jinghong Guo, Nan Quan, Yang Wang, Huixia Ding, Guojun Liu, Jie Tong, Geng Zhang, Nan Wang

    Published 2013-09-01
    “…Smart grid must be open, distributed architecture, there are multiple internet, addressable, independently managed entity. …”
    Get full text
    Article