Traditional design of shaped small household product, mold design and its processing was accomplished according to the drawing data, therefore it always takes more time to modify the mould and costs a lot. The softwar...
详细信息
ISBN:
(纸本)9783642330292
Traditional design of shaped small household product, mold design and its processing was accomplished according to the drawing data, therefore it always takes more time to modify the mould and costs a lot. The software of Pro/Engineer was adopted for 3D design of the household electrical appliances' shell, which can shorten the period of product development, mould design and manufacture, and lower the product cost. The characteristics of Pro/E were described;the design method of mobile phone shell, injection mould design and making with CAD/CAM system was introduced.
In recent years, the technology of Cloud Computing has been developed rapidly. It makes IT infrastructure available as a service through the network. Using Cloud Computing, users can find a new effective solution for ...
详细信息
ISBN:
(纸本)9781479905614
In recent years, the technology of Cloud Computing has been developed rapidly. It makes IT infrastructure available as a service through the network. Using Cloud Computing, users can find a new effective solution for building systems and applications according to their demands. How to make the existing services reliably run on the cloud platform, and satisfy the high scalability and availability requirements becomes a hot topic. In this paper, we propose a Cloud Computing service Platform based on OpenStack which supports service management, auto-scaling, security control and high availability, etc. To achieve the effective management of resources and ensure the quality of service, we implement the resource monitoring subsystem. It can monitor performance metrics CPU Utilization, Memory Usage and Network I/O of physical and virtual resource like. The persistent data can be used by the resource management subsystem and alarm subsystem.
Managing trust in cloud environments is emerging as an important issue in recent years. The highly dynamic, distributed, and non-transparent nature of cloud services makes the trust management of these services diffic...
详细信息
The development of digital content industry needs the support of the online 3D model library. The construction of efficient interaction, stable and reliable model library is the trend of industry. In this paper, we de...
详细信息
The human sensory test is often used to obtain the sensory quantities of odors, however, the fluctuation of results due to the experts condition can cause discrepancies among panelists. We have developed an artificial...
详细信息
Based on Lyapunov stability theorem, a MRAC system was researched to solve that differential value of plant output is unknown. Meanwhile an improved design for MRAC system aimed on the factor of restricting convergenc...
详细信息
In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of ...
详细信息
ISBN:
(纸本)9781479930678
In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.
Online business processes are faced with varying workloads that require agile deployment of computing resources. Elastic processes leverage the on-demand provisioning ability of Cloud Computing to allocate and de-allo...
详细信息
This article analyses the current situation and existing problems of China's public information servicesystem, and conclude that regardless of the public's needs is the problem needs to be solved. Then this p...
详细信息
ISBN:
(纸本)9783642320545
This article analyses the current situation and existing problems of China's public information servicesystem, and conclude that regardless of the public's needs is the problem needs to be solved. Then this paper puts forward to use the Maslow's hierarchy of need to divide the public demand into different levels. At last, according to the personalized demand of the public, it builds a new public information system.
Advances in operating system and storage-level virtualization technologies have enabled the effective consolidation of heterogeneous applications in a shared cloud infrastructure. Novel research challenges arising fro...
详细信息
Advances in operating system and storage-level virtualization technologies have enabled the effective consolidation of heterogeneous applications in a shared cloud infrastructure. Novel research challenges arising from this new shared environment include load balancing, workload estimation, resource isolation, machine replication, live migration, and an emergent need of automation to handle large scale operations with minimal manual intervention. Given that databases are at the core of most applications that are deployed in the cloud, database management systems (DBMSs) represent a very important technology component that needs to be virtualized in order to realize the benefits of virtualization from autonomic management of data-intensive applications in large scale data-centers. The goal of this tutorial is to survey the techniques used in providing elasticity in virtual machine systems, shared storage systems, and survey database research on multitenant architectures and elasticity primitives. This foundation of core Database as a service advances, together with a primer of important related topics in OS and storage-level virtualization, are central for anyone that wants to operate in this area of research.
暂无评论