Showing 441 - 460 results of 965 for search 'Hot Haus~', query time: 1.09s Refine Results
  1. 441

    基于层次分析—模糊评价的云计算安全评估与对策 by Ai-min YANG, Fang GAO, Min-hua BIAN, Shu-lei YANG

    Published 2016-10-01
    “…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
    Get full text
    Article
  2. 442

    Activity-Dependent NPAS4 Expression and the Regulation of Gene Programs Underlying Plasticity in the Central Nervous System by José Fernando Maya-Vetencourt

    Published 2013-01-01
    “…The capability of the brain to change functionally in response to sensory experience is most active during early stages of development but it decreases later in life when major alterations of neuronal network structures no longer take place in response to experience. This view has been recently challenged by experimental strategies based on the enhancement of environmental stimulation levels, genetic manipulations, and pharmacological treatments, which all have demonstrated that the adult brain retains a degree of plasticity that allows for a rewiring of neuronal circuitries over the entire life course. …”
    Get full text
    Article
  3. 443

    Kernel of Internet of Things:Internet of Data by Qi ZHANG, Hao YANG, Q.S.Quek Tony, Shi JIN, Hong-bo ZHU

    Published 2017-12-01
    “…The Internet of Things (IoT) is a collection of devices,sensors and computing capabilities that enable intelligent command and control across vast regions in an automated manner,where data is generated by large-scaled devices and often sent to a centralized system for processing.Therefore,for IoT scenarios,it is important to have an efficient way to collect data at low power,transmit them in very short time,process them in close to real time,and send back the results of this processing.The main data problems in IoT are investigated,and the data entities are organized to form a network,coined as the Internet of Data (IoD),which has huge potential in data-intensive applications.To better understand IoD,the basic concept and main challenges of IoD are also stated.Meanwhile,to provide more detailed understanding,some feasible techniques that can be used in IoD are also explored,like big data,data mining and artificial intelligence,which are all hot research areas and have been studied extensively in recent years.…”
    Get full text
    Article
  4. 444

    Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM by Shuangxi CHEN, Ruoyan ZHAO, Hui LIU, Chunming WU, Wei RUAN

    Published 2021-07-01
    “…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
    Get full text
    Article
  5. 445

    Simulation of Octopus Arm Based on Coupled CPGs by Juan Tian, Qiang Lu

    Published 2015-01-01
    “…The octopus arm has attracted many researchers’ interests and became a research hot spot because of its amazing features. …”
    Get full text
    Article
  6. 446

    CaCO3–Polymer Nanocomposite Prepared with Supercritical CO2 by Hiroaki Wakayama

    Published 2018-01-01
    “…The above-described process has potential utility for fixation of CO2.…”
    Get full text
    Article
  7. 447

    Application of artificial intelligence technology in the field of security vulnerability by Hongyu SUN, Yuan HE, Jice WANG, Ying DONG, Lipeng ZHU, He WANG, Yuqing ZHANG

    Published 2018-08-01
    “…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
    Get full text
    Article
  8. 448

    Numerical investigation on stress corrosion cracking behavior of dissimilar weld joints in pressurized water reactor plants by Lingyan Zhao, He Xue, Fuqiang Yang, Yaohong Suo

    Published 2014-07-01
    “…There have been incidents recently where stress corrosion cracking (SCC) observed in the dissimilar metal weld (DMW) joints connecting the reactor pressure vessel (RPV) nozzle with the hot leg pipe. …”
    Get full text
    Article
  9. 449

    Measurement of Total Flow Rates in Horizontal Well Oil-Water Two-Phase Flows by the Application of BP Neural Network Algorithm to Production Array Logs by Xin Zhang, Hongwei Song, Haimin Guo, Xinlei Shi

    Published 2022-01-01
    “…Among them, the total flow rate of mixture fluid in a horizontal well is difficult to obtain due to the phase segregation caused by gravity. Therefore, it is a difficult and hot issue. …”
    Get full text
    Article
  10. 450

    Initial orientation of the fretting fatigue cracks in shrink-fit connection specimens by Ciro Santus

    Published 2019-03-01
    “…The bending configuration of shrink-fitted connection fretting fatigue tests causes a fluctuation of the contact pressure and in turn a more favourable condition for shear, rather than tensile, crack initiation. …”
    Get full text
    Article
  11. 451

    Initial orientation of the fretting fatigue cracks in shrink-fit connection specimens by Ciro Santus

    Published 2019-04-01
    “…The bending configuration of shrink-fitted connection fretting fatigue tests causes a fluctuation in the contact pressure and in turn a more favourable condition for shear, rather than tensile, crack initiation. …”
    Get full text
    Article
  12. 452
  13. 453

    Multiobjective Particle Swarm Optimization Based on Ideal Distance by Shihua Wang, Yanmin Liu, Kangge Zou, Nana Li, Yaowei Wu

    Published 2022-01-01
    “…Recently, multiobjective particle swarm optimization (MOPSO) has been widely used in science and engineering, however how to effectively improve the convergence and distribution of the algorithm has always been a hot research topic on multiobjective optimization problems (MOPs). …”
    Get full text
    Article
  14. 454

    Research on the Effect of DPSO in Team Selection Optimization under the Background of Big Data by Qian Zhao, Lian-ying Zhang

    Published 2018-01-01
    “…Team selection optimization is the foundation of enterprise strategy realization; it is of great significance for maximizing the effectiveness of organizational decision-making. Thus, the study of team selection/team foundation has been a hot topic for a long time. …”
    Get full text
    Article
  15. 455

    Evidence for AGN Feedback in Galaxy Clusters and Groups by Myriam Gitti, Fabrizio Brighenti, Brian R. McNamara

    Published 2012-01-01
    “…It has thus become clear that the feedback from the central black hole must be taken into account in any model of galaxy evolution. …”
    Get full text
    Article
  16. 456

    Simultaneous perturbation stochastic approximation–based radio occultation data assimilation for sensing atmospheric parameters by Huazheng Du, Guoye Chen, Xuegang Hu, Na Xia, Biaodian Xu

    Published 2018-12-01
    “…Global positioning system–based meteorological parameters sensing has become a hot topic in the field of satellite navigation application. …”
    Get full text
    Article
  17. 457

    Global Warming Amplifies Outdoor Extreme Moist Heat During the Indian Summer Monsoon by Anukesh Krishnankutty Ambika, Akshay Rajeev, Matthew Huber

    Published 2024-07-01
    “…While research has demonstrated the importance of summer monsoon to moist heat in India, impact of monsoon‐break and warm spells in modulating extreme moist heat regionally has not been fully investigated. …”
    Get full text
    Article
  18. 458

    Wireless Coexistence between IEEE 802.11- and IEEE 802.15.4-Based Networks: A Survey by Dong Yang, Youzhi Xu, Mikael Gidlund

    Published 2011-07-01
    “…This problem has been further promoted by two new industry wireless standards, WirelessHART and ISA100, to meet special industry requirements. …”
    Get full text
    Article
  19. 459

    NPQ-RRT∗: An Improved RRT∗ Approach to Hybrid Path Planning by Zihan Yu, Linying Xiang

    Published 2021-01-01
    “…In recent years, the path planning of robot has been a hot research direction, and multirobot formation has practical application prospect in our life. …”
    Get full text
    Article
  20. 460

    Bibliometric Review on Corporate Social Responsibility of the Food Industry by Mingli He, Weiping Yu, Xiaoyun Han

    Published 2022-01-01
    “…The analysis of the three fields that constitute the knowledge structure. (2) Research in this field has become a hot spot, but the research is rather scattered, and the scholars and experts do not have a special research core. (3) The keywords’ cluster results in 9 clustering tags, which are further grouped into 7 groups. …”
    Get full text
    Article