Showing 181 - 200 results of 675 for search '"open source"', query time: 0.06s Refine Results
  1. 181

    ICFF: a cloud forensics framework under the IaaS model by Ya-long XIE, Li-ping DING, Yu-qi LIN, Xiao-ke ZHAO

    Published 2013-05-01
    “…Technical challenges of cloud forensics was summarized and a forensics framework under an infrastructure as a service(IaaS) cloud model called ICFF was proposed.Then,this framework on the open source IaaS cloud platform Eucalyptus was implemented.Finally,a test case to demonstrate the effectiveness of ICFF was designed.Experiments show that the framework can obtain evidence data in cloud platform effectively and efficiently.…”
    Get full text
    Article
  2. 182

    Future network experiment platform based on SDN/NFV by Liang WEI, Rong LI, Zhengdong WU, Yuliang ZHANG, Zhiwei CHENG, Tao HUANG

    Published 2017-04-01
    “…According to the characteristics of SDN/NFV,the future network experiment platform based on SDN/NFV was proposed.The open source architecture of OpenStack and OpenDaylight was used,and the SDN cross-domain communication system,virtual network element management and network service orchestration were researched.Real-time dynamic management and effective sharing of the underlying heterogeneous resources were achieved.At the same time,according to the needs of the experimental users of the network resources,various network resources and SFC service was flexibly orchestrated and end-to-end network experimental verification services were provided to users.…”
    Get full text
    Article
  3. 183

    Design and implementation ofserver security alarm system in campus network by Bin PANG, Hua LI, You-yi WANG, Shuai YAN, Zhi-he YANG

    Published 2014-10-01
    “…A safety test using open source tools was put forward to construct four layer network scan architecture pattern for monitoring server safety,it also can get an automatic analysis report of threaten for the administrators.Through the timing detection mechanism based on process from hardware to software,from the operating system to the service application even to the dynamic page script to build a full range,customizable,flexible combination of multi-level security…”
    Get full text
    Article
  4. 184

    Research on WebRTC Technology and Application by Bin Fu, Xin Yang, Song Wang, Hong Lin

    Published 2013-09-01
    “…WebRTC technology enables audio, video communication and file sharing services over web browsers without installing add-ons, which improves the convenience of such applications greatly. Its openness and open source policy will simplify and facilitate the development of applications. …”
    Get full text
    Article
  5. 185

    Key technologies of heterogeneous compatibility in overlay SDN by Zhilan HUANG, Yongbing FAN, Nan CHEN, Xiaowu HE

    Published 2016-11-01
    “…Cloud computing scale development provides a new chanllenge to data center network.Data center network is required virtulizing by SDN in order to meet flexible dynamic network requireement under multi-rent environment.SDN is the core technology to realize data center virtulization.The key technology of overlay SDN network virtualization was studied,the compatibility problems remained in commercial overlay SDN products was discussed,the main methods to solve this problem was analyzed,and finally an new overlay SDN architecture based on open source software and white-box switch that could work in heterogeneous hypervisors environment was proposed.…”
    Get full text
    Article
  6. 186

    Echo: A crowd-sourced Romanian speech dataset. by Remus-Dan Ungureanu, Mihai Dascalu

    Published 2024-11-01
    “…We publicly release both the dataset and the Whisper-based baseline model as open-source.…”
    Get full text
    Article
  7. 187

    Design of video recommender system based on cloud computing by Ying-zhuang LI, Tuo GAO, Xian-yi LI

    Published 2013-09-01
    “…Through the survey and research of the existing video sites,some video sites face the problem of information overload.So it is necessary for the video sites to have a recommender system.Through the study of the existing video recommender system,using open source cloud computing technologies—Hadoop,and some of its related components such as Hive and Hbase,a personalized video recommendation system based on cloud platform was designed.The system is only applicable to professional video-based website.…”
    Get full text
    Article
  8. 188

    Cypress Copilot: Development of an AI Assistant for Boosting Productivity and Transforming Web Application Testing by Suresh Babu Nettur, Shanthi Karpurapu, Unnati Nettur, Likhit Sagar Gajja

    Published 2025-01-01
    “…More importantly, we are releasing this tool to the open-source community, as it has the potential to be a promising partner in enhancing productivity in web application automation testing.…”
    Get full text
    Article
  9. 189

    An Improvement of Static Subtree Partitioning in Metadata Server Cluster by Tan Zhipeng, Zhou Wei, Sun Jianliang, Zhan Tian, Cui Jie

    Published 2012-09-01
    “…Finally we implement it in the open source pNFS file system and demonstrate its high performance and availability.…”
    Get full text
    Article
  10. 190

    Comparative analysis of smart home management systems by Patryk Bąk, Grzegorz Kozieł

    Published 2024-06-01
    “…The choice was between the open source locally running Home Assistant system and the cloud-based Google Home solution. …”
    Get full text
    Article
  11. 191

    Application of artificial intelligence in network orchestration system by Tianjiao CHEN, Jiang LIU, Tao HUANG

    Published 2019-05-01
    “…Based on software defined networking and network virtualization,network orchestration can deploy differentiated services quickly and efficiently.With the wide application of artificial intelligence technology,the combination of network orchestration system and artificial intelligence has become the research focus of major operators and manufacturers.Firstly,the concept of network orchestration system and the development status of major open source organizations were introduced.Then,based on the design time and the run time,the network orchestration architecture using artificial intelligence was introduced to realize the transformation from “automation” to “intelligence”.Finally,the application of artificial intelligence in SDN,NFV and operation and maintenance in the orchestration system was summarized,and the future development direction was proposed.…”
    Get full text
    Article
  12. 192

    Design and implementation of an intrusion-tolerant application server middleware by GUO Yuan-bo, LIU Wei, YUAN Shun, ZHOU Rui-peng

    Published 2009-01-01
    “…An intrusion-tolerance middleware model based on the interceptor was proposed, with a component named intrusion-tolerance framework which logically divided the intrusion-tolerance functions into service providers and service management.The system analyses were designed by adapting intrusion tolerance security model and element technology, the theory of intrusion tolerance mechanism and the strategy of implementation were described, and the intrusion tolerance technology and implementation method was extracted.Finally, an intrusion-tolerance J2EE middleware was realized, built on JBoss-an open source J2EE application server platform, and was implemented through Java class load mechanism with the dynamic load of the intrusion-tolerance class.…”
    Get full text
    Article
  13. 193

    Advances in generative adversarial network by Wanliang WANG, Zhuorong LI

    Published 2018-02-01
    “…Generative adversarial network (GAN) have swiftly become the focus of considerable research in generative models soon after its emergence,whose academic research and industry applications have yielded a stream of further progress along with the remarkable achievements of deep learning.A broad survey of the recent advances in generative adversarial network was provided.Firstly,the research background and motivation of GAN was introduced.Then the recent theoretical advances of GAN on modeling,architectures,training and evaluation metrics were reviewed.Its state-of-the-art applications and the extensively used open source tools for GAN were introduced.Finally,issues that require urgent solutions and works that deserve further investigation were discussed.…”
    Get full text
    Article
  14. 194

    Research of cloud disk system construction in campus network by Jun LI, Feng-dan LAO, Ren-ming ZOU

    Published 2013-09-01
    “…According to the significance and demand of cloud disk system in campus network,a solution of combining the miniyun open source project,LVS(Linux virtual server) load balancing,Moosefs distribute file system and MySQL master-slaver replication read/write splitting was proposed to construct high availability cloud disk system.A cloud disk system was built and put into practice based on this solution in China agricultural vnirersity.The application results shows that it meets the demand for cloud disk in campus network with characteristics of low cost,dynamic scalable and high availability.…”
    Get full text
    Article
  15. 195

    Building and Maintaining the TEI LingSIG Bibliography by Piotr Bański, Stefan Majewski, Maik Stührenberg, Antonina Werthmann

    Published 2012-10-01
    “…We describe a combination of open-source tools and an open-access approach to creating knowledge repositories that have been employed in building a bibliographic reference library for the “TEI for Linguists” special interest group (LingSIG). …”
    Get full text
    Article
  16. 196

    AMIDE: A Free Software Tool for Multimodality Medical Image Analysis by Andreas Markus Loening, Sanjiv Sam Gambhir

    Published 2003-07-01
    “…Amide's a Medical Image Data Examiner (AMIDE) has been developed as a user-friendly, open-source software tool for displaying and analyzing multimodality volumetric medical images. …”
    Get full text
    Article
  17. 197

    Architecture of SDN Applications Based on Software Defined Price by Bin Zhuge, Baoxia Wang, Yining Wang, Chunming Wu, Minhui Yao

    Published 2015-08-01
    “…Firstly,the concept of SDN applications was proposed from the perspective of users payment for allocating network resources.Secondly,with the comparison between traditional desktop application programming and network programming,the advantage of SDN programming was described.Thirdly,the concept of software defined price (SDP)was introduced.Based on the characteristics of SDN applications,the framework of SDP-based SDN application so as to apply to the OpenDaylight open source project was designed.Finally,an implementation of creating a virtual tenant network based on SDP was showed.The results of experiment present that the users can choose their desired virtual tenant according to the mechanism of SDP.…”
    Get full text
    Article
  18. 198

    Depth first traversal algorithm for the back-off tree of distributed queuing by Wennai WANG, Yanhe ZHANG, Wei WU, Chen BAI, Bin WANG

    Published 2021-02-01
    “…An analytic model was provided for the conventional distributed queueing (DQ) and its back-off tree operations, followed by a design of improving algorithm based on depth first traversal.Combing the specific analysis of complete binary tree with generalized extension by random tree reconstruction, the performance of proposed algorithm was evaluated on the throughput in both theory and simulation experiment.A theoretic optimal solution of contention slots of DQ frame and a brief description of simulation extension based on the open source NS-3 were presented.The simulation results show that the maximum stationary throughput by the proposed algorithm reaches 70% of the physical capacity of channel.…”
    Get full text
    Article
  19. 199

    Research of Fragment Mechanism Security in IPv6 Network Protocol by Xianglin Wang, Chen Zhu, Dongmei Sun, Mingyue Li, Qingzi Shen

    Published 2013-10-01
    “…Based on open source Snort platform,the packet block mechanism in IPv6 network was discussed.The behavior using IPv6 packet fragment to attack network was studied.Against to the problems,such as too little for IPv6 packet segment,overlapping section and so on,it put forward the corresponding countermeasures.The intrusion detection system were designed and implemented for piecewise leak testing.The experiments show that the design of intrusion detection system can detect the abnormal IPv6 packet,and Snort to support for IPv6 function was improved and optimized.…”
    Get full text
    Article
  20. 200

    Rapid Prototyping in Orthopaedic Surgery: A User's Guide by Mark Frame, James S. Huntley

    Published 2012-01-01
    “…Here we outline the history of rapid prototyping and furthermore a process using open-source software to produce a high fidelity physical model from CT data. …”
    Get full text
    Article