Results 21 to 30 of about 533,071 (261)
Il progetto partecipativo #iziTRAVELSicilia è stato lanciato nel maggio 2016, con l'obiettivo principale di colmare il gap della comunicazione e valorizzazione digitale del patrimonio culturale della Sicilia. Questo progetto si è presto trasformato in un
Elisa Bonacini
doaj +1 more source
A Survey of Middleware for Sensor and Network Virtualization
Wireless Sensor Network (WSN) is leading to a new paradigm of Internet of Everything (IoE). WSNs have a wide range of applications but are usually deployed in a particular application. However, the future of WSNs lies in the aggregation and allocation of
Zubair Khalid +2 more
doaj +1 more source
Virtual Actuators with Virtual Sensors [PDF]
The virtual actuator approach to bond graph based control is extended to use virtual sensor inputs; this allows relative degree conditions on the controller to be relaxed. Furthermore, the effect of the transfer system can be eliminated from the closed-loop system. Illustrative examples are given.
openaire +1 more source
Classification of Existing Virtualization Methods Used in Telecommunication Networks
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro +3 more
core +1 more source
Toward the Detection of Flow Separation for Operating Airfoils Using Machine Learning
Turbulent flow separation over lifting surfaces impacts high-lift systems such as aircraft, wind turbines, and turbomachinery, and contributes to noise, lift loss, and vibrations.
Kathrin Stahl +6 more
doaj +1 more source
ABSTRAK Infrastruktur jaringan seperti router, secara tradisional menggunakan hardware yang bersifat proprietary. Teknologi virtualisasi pada fungsi jaringan atau NFV (Network Function Virtualization) membuat layanan ini dapat diimplementasikan sebagai ...
MANZILA IZNIARDI DJOMI +2 more
doaj +1 more source
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj +1 more source
Internet User Personality Virtualization Index: Psychometric Technique Approbation
Virtualization and digitalization affect such aspects of human personality as self-identification, self-actualization, and self-presentation. They also change the mechanisms of categorization and interpretation of individual experience while transforming
Evelina O. Rasina
doaj +1 more source
Power Consumption of Virtualization Technologies: an Empirical Investigation
Virtualization is growing rapidly as a result of the increasing number of alternative solutions in this area, and of the wide range of application field.
Morabito, Roberto
core +1 more source
Automated Network Service Scaling in NFV: Concepts, Mechanisms and Scaling Workflow [PDF]
Next-generation systems are anticipated to be digital platforms supporting innovative services with rapidly changing traffic patterns. To cope with this dynamicity in a cost-efficient manner, operators need advanced service management capabilities such ...
Adamuz-Hinojosa, Oscar +5 more
core +3 more sources

