Showing 21 - 40 results of 108 for search '"Computing platform"', query time: 0.05s Refine Results
  1. 21

    Precision Analysis of Noncircular Gears Based on CNC Machining Technology under Cloud Computing Platform by JianQing Dai, Wei Xu, FenFen OuYang

    Published 2022-01-01
    “…The results show that the technical support of the cloud computing platform can effectively improve the accuracy of noncircular gears.…”
    Get full text
    Article
  2. 22

    Task security scheduling method for 5G+MEC based grid edge computing platform by Shimulin XIE, Ijie BA, Xiang ZHANG, Zeyi TANG, Weifan NIAN, Xujie LIU

    Published 2022-12-01
    “…In order to ensure the security of task scheduling of grid edge computing platform and the data quality required by task scheduling, a task security scheduling method of grid edge computing platform based on 5G + MEC was proposed.Combined with confidentiality service and integrity service, the security level model of task scheduling was constructed to restrict the risk in the process of scheduling and transmission of scheduling task queue, so as to realize the secure transmission of 5G core network.The priority queue type was confirmd, the minimum queue and the maximum queue was selected, the maximization of data resources and the task scheduling of MEC equipment was supported, and a distributed task scheduling model was built.Using Lyapunov candidate function to improve the stability of task scheduling, and the model was solved by alternating direction multiplier method to obtain the optimal solution of task security scheduling.The test results show that after the application of this method, the risk probability results fluctuate in the range of 0.15~0.35, and the fitting degree between the relevant data provided by MEC equipment and the scheduling task of core server is higher than 0.92, the quality score of task scheduling data is also higher than 0.94.…”
    Get full text
    Article
  3. 23
  4. 24
  5. 25

    Model checking of trusted cryptographic module by CHEN Xiao-feng, FENG Deng-guo

    Published 2010-01-01
    Subjects: “…trusted computing platform…”
    Get full text
    Article
  6. 26
  7. 27

    Revolution of the development paradigm of network technology system—network of networks by Jiangxing WU

    Published 2022-06-01
    Subjects: “…polymorphic network cloud computing platform…”
    Get full text
    Article
  8. 28

    VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms by UZhi-jun W, UIYi C, UEMeng Y

    Published 2015-01-01
    “…Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence,the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP,the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore,the virtual nodes have the ability of resilience,which can complete the seamless switching between being attacked nodes in cloud computing platform,and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters,such as the number of being attacked nodes in hash secure access path (HSAP),and the switching time and the handoff delay between nodes,are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach,and enhances the security of cloud computing platform.…”
    Get full text
    Article
  9. 29

    Design on Cloud Computing Application Platform Based on CDMA VPDN by Min Cai

    Published 2013-09-01
    “…In order to meet the express deployment of mobile application, the cloud computing platform is used to integrate traditional leased line and platform. …”
    Get full text
    Article
  10. 30

    Resource Monitoring Model in Cloud Computing Based on Dynamic Period and Event-Driven by Ping Guo, Tingying Feng

    Published 2012-09-01
    “…Resource monitoring in cloud computing environment is a significant part of cloud computing platform for resource management, which provides a basis for resource allocation, task scheduling and load balancing, etc. …”
    Get full text
    Article
  11. 31

    Survey on trusted cloud platform technology by Xinfeng HE, Junfeng TIAN, Fanming LIU

    Published 2019-02-01
    “…Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed.…”
    Get full text
    Article
  12. 32

    Maximum Mutual Information Feature Extraction Method Based on the Cloud Platform by Shasha Wei, Huijuan Lu, Wei Jin, Chao Li

    Published 2013-10-01
    “…With the large-scale application of gene chip,gene expression data with high dimension which exists a large number of irrelevant and redundant features may reduce classifier performance problem.A maximum mutual information feature extraction method based on cloud platforms was proposed.Hadoop cloud computing platform could be a parallel computing after gene expression data segmentation,features was extracted at the same time combined with the maximum mutual information method and the characteristics of cloud computing platform filter model was realized.Simulation experiments show that the maximum mutual information feature extraction method based on the cloud platform can rapid extraction of features in a higher classification accuracy which save a lot of time resources to make a highly efficient gene feature extraction system.…”
    Get full text
    Article
  13. 33

    An efficient load balancing algorithm for virtual machine allocation based on ant colony optimization by Peng Xu, Guimin He, Zhenhao Li, Zhongbao Zhang

    Published 2018-12-01
    “…In this article, we aim at multidimensional resource load balancing of all the physical machines in the cloud computing platform to maximize the utilization of resources. …”
    Get full text
    Article
  14. 34

    Review of Intelligent Routing Technology in Integrated Satellite-Ground Network by Suzhi CAO, Xue SUN, Houpeng WANG, Jiarong HAN, Siyan PAN, Lei YAN

    Published 2021-06-01
    “…In view of the complex routing problems faced by the integrated satellite-ground network, the research progress of softwaredefi ned integrated satellite-ground network and intelligent routing was investigated.The training and deployment schemes of on-orbit routing mechanisms based on deep reinforcement learning were discussed, and a specifi c analysis was made in conjunction with the space intelligent computing platform.…”
    Get full text
    Article
  15. 35

    Research of single sign-on in grid by MENG Fan-rong1, XIE Hong-xia1, WANG Ru-chuan2, XIA Shi-xiong1

    Published 2007-01-01
    “…Grid was a kind of new-type network computing platform following World Wide Web;An infrastructure of sharing different resources including webpage in an all-round way was offered.In order to complete one task,many re-sources were often needed the participants to assort with,so single sign-on to simplify users’ operations was needed.The disadvantages of single sign-on were analyzed,and a solution based on SAML was proposed,the test and the perform-ance evaluation to it had been carried on.…”
    Get full text
    Article
  16. 36

    Guaranteeing service availability in cloud computing by Shi-jun SHEN, Xin-ran LIU, Hong ZHANG, Chun-ge ZHU

    Published 2014-02-01
    “…SWRR was applied to a large cloud computing platform. Experiments reveal that SWRR can provide high service availability for specific users while taking all users into account by proper resource reservation.…”
    Get full text
    Article
  17. 37

    Bearing thinking of edge computing based on NFV by Yujia LUO, Liang OU, Hong TANG

    Published 2018-08-01
    “…Aiming at introducing edge computing into operator’s network,a bearing and deployment thinking based on NFV was presented.Firstly,the industry development trends of edge computing were introduced.Then the concept,service scenarios and special requirements of edge computing were described,as well as the relationship between edge computing and NFV.Then,a bearing thinking of edge computing based on NFV was provided.Furthermore,some preliminary discussions about deploying edge computing platform on operator’s network were offered.Techni cal reference foRthe future deployment of edge computing was provided.…”
    Get full text
    Article
  18. 38

    Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal by Jun Li

    Published 2013-08-01
    “…In order to solve the increasingly serious security issues caused by malwares in mobile internet,a“cloud-pipeline-terminal”model was proposed to implement detection and killing of mobile internet malwares.The proposed model composes of a cloud computing platform to support the analysis and measurement of the malwares and to implement strategy distribution and management of the system,a monitoring and intercepting system on the side of mobile communication pipelines and a terminal security application to check and kill the malwares.The purpose is to build a safe and harmonious mobile internet environment.…”
    Get full text
    Article
  19. 39

    Non-interference trusted model based on processes by ZHANG Xing1, CHEN You-lei2, SHEN Chang-xiang2

    Published 2009-01-01
    “…A novel abstract model for the design of trusted computing platform system was proposed.By using the basic idea of non-interference theory as reference and introduces the reasoning method of process algebra, thus abstracting the system as processes, actions, states and outputs, and giving the formal definition of the trusted of process running.Process isolation trusted theorem was verified formally.Furthermore, by associating process with system state, the definition and the theorem of system running trusted was proposed.The model was established by logic reasoning and independent of special security mechanism and enforcement.The trust of the running system can be realized by any method which satisfies the conditions of the model.…”
    Get full text
    Article
  20. 40

    Applications of a big data platform based on PaaS by Haiyong XU, Yan HUANG

    Published 2018-01-01
    “…As a platform of data storage,processing,and service,big data platform needs to support internal and external various big data applications.A solution applied PaaS technology to the big data platform was proposed.Details of the key technical solutions such as the architecture of PaaS cloud computing platform,hierarchical scheduling scheme,multi-tenant management and global scheduling of Hadoop tasks were described.It was proved that the platform could remarkably improve big data application development efficiency and help application deployment fast.In the meantime,good elastic scaling capability can effectively improve big data application system resource utilization.…”
    Get full text
    Article