-
181
ICFF: a cloud forensics framework under the IaaS model
Published 2013-05-01“…Technical challenges of cloud forensics was summarized and a forensics framework under an infrastructure as a service(IaaS) cloud model called ICFF was proposed.Then,this framework on the open source IaaS cloud platform Eucalyptus was implemented.Finally,a test case to demonstrate the effectiveness of ICFF was designed.Experiments show that the framework can obtain evidence data in cloud platform effectively and efficiently.…”
Get full text
Article -
182
Future network experiment platform based on SDN/NFV
Published 2017-04-01“…According to the characteristics of SDN/NFV,the future network experiment platform based on SDN/NFV was proposed.The open source architecture of OpenStack and OpenDaylight was used,and the SDN cross-domain communication system,virtual network element management and network service orchestration were researched.Real-time dynamic management and effective sharing of the underlying heterogeneous resources were achieved.At the same time,according to the needs of the experimental users of the network resources,various network resources and SFC service was flexibly orchestrated and end-to-end network experimental verification services were provided to users.…”
Get full text
Article -
183
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01“…A safety test using open source tools was put forward to construct four layer network scan architecture pattern for monitoring server safety,it also can get an automatic analysis report of threaten for the administrators.Through the timing detection mechanism based on process from hardware to software,from the operating system to the service application even to the dynamic page script to build a full range,customizable,flexible combination of multi-level security…”
Get full text
Article -
184
Research on WebRTC Technology and Application
Published 2013-09-01“…WebRTC technology enables audio, video communication and file sharing services over web browsers without installing add-ons, which improves the convenience of such applications greatly. Its openness and open source policy will simplify and facilitate the development of applications. …”
Get full text
Article -
185
Key technologies of heterogeneous compatibility in overlay SDN
Published 2016-11-01“…Cloud computing scale development provides a new chanllenge to data center network.Data center network is required virtulizing by SDN in order to meet flexible dynamic network requireement under multi-rent environment.SDN is the core technology to realize data center virtulization.The key technology of overlay SDN network virtualization was studied,the compatibility problems remained in commercial overlay SDN products was discussed,the main methods to solve this problem was analyzed,and finally an new overlay SDN architecture based on open source software and white-box switch that could work in heterogeneous hypervisors environment was proposed.…”
Get full text
Article -
186
Echo: A crowd-sourced Romanian speech dataset.
Published 2024-11-01“…We publicly release both the dataset and the Whisper-based baseline model as open-source.…”
Get full text
Article -
187
Design of video recommender system based on cloud computing
Published 2013-09-01“…Through the survey and research of the existing video sites,some video sites face the problem of information overload.So it is necessary for the video sites to have a recommender system.Through the study of the existing video recommender system,using open source cloud computing technologies—Hadoop,and some of its related components such as Hive and Hbase,a personalized video recommendation system based on cloud platform was designed.The system is only applicable to professional video-based website.…”
Get full text
Article -
188
Cypress Copilot: Development of an AI Assistant for Boosting Productivity and Transforming Web Application Testing
Published 2025-01-01“…More importantly, we are releasing this tool to the open-source community, as it has the potential to be a promising partner in enhancing productivity in web application automation testing.…”
Get full text
Article -
189
An Improvement of Static Subtree Partitioning in Metadata Server Cluster
Published 2012-09-01“…Finally we implement it in the open source pNFS file system and demonstrate its high performance and availability.…”
Get full text
Article -
190
Comparative analysis of smart home management systems
Published 2024-06-01“…The choice was between the open source locally running Home Assistant system and the cloud-based Google Home solution. …”
Get full text
Article -
191
Application of artificial intelligence in network orchestration system
Published 2019-05-01“…Based on software defined networking and network virtualization,network orchestration can deploy differentiated services quickly and efficiently.With the wide application of artificial intelligence technology,the combination of network orchestration system and artificial intelligence has become the research focus of major operators and manufacturers.Firstly,the concept of network orchestration system and the development status of major open source organizations were introduced.Then,based on the design time and the run time,the network orchestration architecture using artificial intelligence was introduced to realize the transformation from “automation” to “intelligence”.Finally,the application of artificial intelligence in SDN,NFV and operation and maintenance in the orchestration system was summarized,and the future development direction was proposed.…”
Get full text
Article -
192
Design and implementation of an intrusion-tolerant application server middleware
Published 2009-01-01“…An intrusion-tolerance middleware model based on the interceptor was proposed, with a component named intrusion-tolerance framework which logically divided the intrusion-tolerance functions into service providers and service management.The system analyses were designed by adapting intrusion tolerance security model and element technology, the theory of intrusion tolerance mechanism and the strategy of implementation were described, and the intrusion tolerance technology and implementation method was extracted.Finally, an intrusion-tolerance J2EE middleware was realized, built on JBoss-an open source J2EE application server platform, and was implemented through Java class load mechanism with the dynamic load of the intrusion-tolerance class.…”
Get full text
Article -
193
Advances in generative adversarial network
Published 2018-02-01“…Generative adversarial network (GAN) have swiftly become the focus of considerable research in generative models soon after its emergence,whose academic research and industry applications have yielded a stream of further progress along with the remarkable achievements of deep learning.A broad survey of the recent advances in generative adversarial network was provided.Firstly,the research background and motivation of GAN was introduced.Then the recent theoretical advances of GAN on modeling,architectures,training and evaluation metrics were reviewed.Its state-of-the-art applications and the extensively used open source tools for GAN were introduced.Finally,issues that require urgent solutions and works that deserve further investigation were discussed.…”
Get full text
Article -
194
Research of cloud disk system construction in campus network
Published 2013-09-01“…According to the significance and demand of cloud disk system in campus network,a solution of combining the miniyun open source project,LVS(Linux virtual server) load balancing,Moosefs distribute file system and MySQL master-slaver replication read/write splitting was proposed to construct high availability cloud disk system.A cloud disk system was built and put into practice based on this solution in China agricultural vnirersity.The application results shows that it meets the demand for cloud disk in campus network with characteristics of low cost,dynamic scalable and high availability.…”
Get full text
Article -
195
Building and Maintaining the TEI LingSIG Bibliography
Published 2012-10-01“…We describe a combination of open-source tools and an open-access approach to creating knowledge repositories that have been employed in building a bibliographic reference library for the “TEI for Linguists” special interest group (LingSIG). …”
Get full text
Article -
196
AMIDE: A Free Software Tool for Multimodality Medical Image Analysis
Published 2003-07-01“…Amide's a Medical Image Data Examiner (AMIDE) has been developed as a user-friendly, open-source software tool for displaying and analyzing multimodality volumetric medical images. …”
Get full text
Article -
197
Architecture of SDN Applications Based on Software Defined Price
Published 2015-08-01“…Firstly,the concept of SDN applications was proposed from the perspective of users payment for allocating network resources.Secondly,with the comparison between traditional desktop application programming and network programming,the advantage of SDN programming was described.Thirdly,the concept of software defined price (SDP)was introduced.Based on the characteristics of SDN applications,the framework of SDP-based SDN application so as to apply to the OpenDaylight open source project was designed.Finally,an implementation of creating a virtual tenant network based on SDP was showed.The results of experiment present that the users can choose their desired virtual tenant according to the mechanism of SDP.…”
Get full text
Article -
198
Depth first traversal algorithm for the back-off tree of distributed queuing
Published 2021-02-01“…An analytic model was provided for the conventional distributed queueing (DQ) and its back-off tree operations, followed by a design of improving algorithm based on depth first traversal.Combing the specific analysis of complete binary tree with generalized extension by random tree reconstruction, the performance of proposed algorithm was evaluated on the throughput in both theory and simulation experiment.A theoretic optimal solution of contention slots of DQ frame and a brief description of simulation extension based on the open source NS-3 were presented.The simulation results show that the maximum stationary throughput by the proposed algorithm reaches 70% of the physical capacity of channel.…”
Get full text
Article -
199
Research of Fragment Mechanism Security in IPv6 Network Protocol
Published 2013-10-01“…Based on open source Snort platform,the packet block mechanism in IPv6 network was discussed.The behavior using IPv6 packet fragment to attack network was studied.Against to the problems,such as too little for IPv6 packet segment,overlapping section and so on,it put forward the corresponding countermeasures.The intrusion detection system were designed and implemented for piecewise leak testing.The experiments show that the design of intrusion detection system can detect the abnormal IPv6 packet,and Snort to support for IPv6 function was improved and optimized.…”
Get full text
Article -
200
Rapid Prototyping in Orthopaedic Surgery: A User's Guide
Published 2012-01-01“…Here we outline the history of rapid prototyping and furthermore a process using open-source software to produce a high fidelity physical model from CT data. …”
Get full text
Article