Results 51 to 60 of about 10,178 (188)
Research on Resource Scheduling Strategy of Medical Cloud Platform [PDF]
The resource scheduling policies for the cloud platform are too simple to meet the needs of the medical service effectively.Aiming at this problem,this paper analyzes different demands of different medical systems on resources and proposes the IB-Choose ...
SHI Baopeng,DUAN Xun,KONG Guangqian,WU Yun
doaj +1 more source
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary +3 more
wiley +1 more source
Method of KVM virtual machine live migration in cross-platform based on Cloudstack and OpenStack
To make KVM virtual machine which have been created in CloudStack platform identified and taken over correctly in CloudStack and OpenStack concomitant environment,propose a method for live migration of KVM virtual machine from CloudStack to OpenStack.By ...
Nan ZHENG +3 more
doaj +2 more sources
Self-adaptive authorisation in OpenStack cloud platform
Although major advances have been made in protection of cloud platforms against malicious attacks, little has been done regarding the protection of these platforms against insider threats.
Carlos Eduardo Da Silva +3 more
doaj +1 more source
Virtualization enables multiple applications to share the same wireless sensor and actuator network (WSAN). However, in heterogeneous environments, virtualized wireless sensor and actuator networks (VWSAN) raise new challenges, such as the need for on ...
Abu-Lebdeh, Mohammad +6 more
core +1 more source
Autonomous Attack Mitigation Through Firewall Reconfiguration
This graphical abstract shows the workflow of the proposed approach for autonomous attack mitigation through firewall reconfiguration. ABSTRACT Packet filtering firewalls represent a main defense line against cyber attacks that target computer networks daily. However, the traditional manual approaches for their configuration are no longer applicable to
Daniele Bringhenti +3 more
wiley +1 more source
Construction of Private Cloud Computing Platform Based on Open Source Software
This paper introduced the application range of the private cloud, discussed the characteristics of the self-developed and business and open source solutions, and analyzed the main advantage of the open source solution, then compared the mainstream ...
Yi Jiang +4 more
doaj +2 more sources
WEB PORTALS FOR MANAGEMENT OF CLOUD SERVICES WITHIN DATA CENTRES [PDF]
Subject of Research. The paper analyzes design and development issues of web portals for cloud services of data centres. We consider a web portal for administrators and users and a portal for service configuration.
Dmitry V. Khan +2 more
doaj +1 more source
A Study to Optimize Heterogeneous Resources for Open IoT
Recently, IoT technologies have been progressed, and many sensors and actuators are connected to networks. Previously, IoT services were developed by vertical integration style. But now Open IoT concept has attracted attentions which achieves various IoT
Demizu, Tatsuya +4 more
core +1 more source
Mutation‐Guided Metamorphic Testing of Optimality in AI Planning
Based on mutation adequacy test suite selection, this article proposes a novel metamorphic testing framework for detecting the lack of optimality in AI plannersg. ABSTRACT Autonomous systems such as space‐ or underwater‐exploration robots or elderly people assistance robots often include an artificial intelligence (AI) planner as a component.
Quentin Mazouni +4 more
wiley +1 more source

