-
441
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01“…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
Get full text
Article -
442
Activity-Dependent NPAS4 Expression and the Regulation of Gene Programs Underlying Plasticity in the Central Nervous System
Published 2013-01-01“…The capability of the brain to change functionally in response to sensory experience is most active during early stages of development but it decreases later in life when major alterations of neuronal network structures no longer take place in response to experience. This view has been recently challenged by experimental strategies based on the enhancement of environmental stimulation levels, genetic manipulations, and pharmacological treatments, which all have demonstrated that the adult brain retains a degree of plasticity that allows for a rewiring of neuronal circuitries over the entire life course. …”
Get full text
Article -
443
Kernel of Internet of Things:Internet of Data
Published 2017-12-01“…The Internet of Things (IoT) is a collection of devices,sensors and computing capabilities that enable intelligent command and control across vast regions in an automated manner,where data is generated by large-scaled devices and often sent to a centralized system for processing.Therefore,for IoT scenarios,it is important to have an efficient way to collect data at low power,transmit them in very short time,process them in close to real time,and send back the results of this processing.The main data problems in IoT are investigated,and the data entities are organized to form a network,coined as the Internet of Data (IoD),which has huge potential in data-intensive applications.To better understand IoD,the basic concept and main challenges of IoD are also stated.Meanwhile,to provide more detailed understanding,some feasible techniques that can be used in IoD are also explored,like big data,data mining and artificial intelligence,which are all hot research areas and have been studied extensively in recent years.…”
Get full text
Article -
444
Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM
Published 2021-07-01“…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
Get full text
Article -
445
Simulation of Octopus Arm Based on Coupled CPGs
Published 2015-01-01“…The octopus arm has attracted many researchers’ interests and became a research hot spot because of its amazing features. …”
Get full text
Article -
446
CaCO3–Polymer Nanocomposite Prepared with Supercritical CO2
Published 2018-01-01“…The above-described process has potential utility for fixation of CO2.…”
Get full text
Article -
447
Application of artificial intelligence technology in the field of security vulnerability
Published 2018-08-01“…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
Get full text
Article -
448
Numerical investigation on stress corrosion cracking behavior of dissimilar weld joints in pressurized water reactor plants
Published 2014-07-01“…There have been incidents recently where stress corrosion cracking (SCC) observed in the dissimilar metal weld (DMW) joints connecting the reactor pressure vessel (RPV) nozzle with the hot leg pipe. …”
Get full text
Article -
449
Measurement of Total Flow Rates in Horizontal Well Oil-Water Two-Phase Flows by the Application of BP Neural Network Algorithm to Production Array Logs
Published 2022-01-01“…Among them, the total flow rate of mixture fluid in a horizontal well is difficult to obtain due to the phase segregation caused by gravity. Therefore, it is a difficult and hot issue. …”
Get full text
Article -
450
Initial orientation of the fretting fatigue cracks in shrink-fit connection specimens
Published 2019-03-01“…The bending configuration of shrink-fitted connection fretting fatigue tests causes a fluctuation of the contact pressure and in turn a more favourable condition for shear, rather than tensile, crack initiation. …”
Get full text
Article -
451
Initial orientation of the fretting fatigue cracks in shrink-fit connection specimens
Published 2019-04-01“…The bending configuration of shrink-fitted connection fretting fatigue tests causes a fluctuation in the contact pressure and in turn a more favourable condition for shear, rather than tensile, crack initiation. …”
Get full text
Article -
452
The heart failure specialists of tomorrow: a network for young cardiovascular scientists and clinicians
Published 2020-06-01“…After its foundation in 2014, it has quickly grown to a large group of currently 925 members. …”
Get full text
Article -
453
Multiobjective Particle Swarm Optimization Based on Ideal Distance
Published 2022-01-01“…Recently, multiobjective particle swarm optimization (MOPSO) has been widely used in science and engineering, however how to effectively improve the convergence and distribution of the algorithm has always been a hot research topic on multiobjective optimization problems (MOPs). …”
Get full text
Article -
454
Research on the Effect of DPSO in Team Selection Optimization under the Background of Big Data
Published 2018-01-01“…Team selection optimization is the foundation of enterprise strategy realization; it is of great significance for maximizing the effectiveness of organizational decision-making. Thus, the study of team selection/team foundation has been a hot topic for a long time. …”
Get full text
Article -
455
Evidence for AGN Feedback in Galaxy Clusters and Groups
Published 2012-01-01“…It has thus become clear that the feedback from the central black hole must be taken into account in any model of galaxy evolution. …”
Get full text
Article -
456
Simultaneous perturbation stochastic approximation–based radio occultation data assimilation for sensing atmospheric parameters
Published 2018-12-01“…Global positioning system–based meteorological parameters sensing has become a hot topic in the field of satellite navigation application. …”
Get full text
Article -
457
Global Warming Amplifies Outdoor Extreme Moist Heat During the Indian Summer Monsoon
Published 2024-07-01“…While research has demonstrated the importance of summer monsoon to moist heat in India, impact of monsoon‐break and warm spells in modulating extreme moist heat regionally has not been fully investigated. …”
Get full text
Article -
458
Wireless Coexistence between IEEE 802.11- and IEEE 802.15.4-Based Networks: A Survey
Published 2011-07-01“…This problem has been further promoted by two new industry wireless standards, WirelessHART and ISA100, to meet special industry requirements. …”
Get full text
Article -
459
NPQ-RRT∗: An Improved RRT∗ Approach to Hybrid Path Planning
Published 2021-01-01“…In recent years, the path planning of robot has been a hot research direction, and multirobot formation has practical application prospect in our life. …”
Get full text
Article -
460
Bibliometric Review on Corporate Social Responsibility of the Food Industry
Published 2022-01-01“…The analysis of the three fields that constitute the knowledge structure. (2) Research in this field has become a hot spot, but the research is rather scattered, and the scholars and experts do not have a special research core. (3) The keywords’ cluster results in 9 clustering tags, which are further grouped into 7 groups. …”
Get full text
Article