Research on cloud procurement cost structure advantage based on cloud computing Lin Huang Ding Yiu Jinyuan applies cloud computing to procurement, builds cloud sourcing platforms, and compares cloud purchases with traditional procurement patterns. Through the establishment and analysis of the purchasing cost model, it is concluded that the cloud procurement model has a great advantage in cost. Relying on cloud security technology, cloud procurement has an absolute advantage in information transmission accuracy and time, and the intelligent allocation of virtual resources by cloud procurement platform can make the purchaser delete a large number of worthless procurement links. Finally, the example of the ...
A grid scheduling method based on hierarchical scheduling strategy and Dynamic Data replication Rai Jinhui Liangsong, the Task scheduling algorithm (YPP) and the Dynamic Data replication algorithm (E1/ZF) are proposed to solve the problem of how to efficiently perform task scheduling and data replication in grid, so as to reduce task execution time. and construct a scheme to combine the two algorithms effectively. The scheme uses YPP algorithm to comprehensively consider the number of task waiting queue, the location of task demand data and the calculation capacity of the site, and adopt the hierarchical scheduling method of network structure, with the appropriate weight coefficient calculation ...
Analysis and estimation of cloud computing construction scale based on system Dynamics LI Yujian Kozun to set up the scheduling model of virtual machine in cloud computing virtual environment by using System Dynamics analysis method the system Dynamics model and method of computer system simulation are used to study the business requirement and construction scale of cloud computing virtual machine from the system point of view. Find out the key factors that affect the number of virtual machines in cloud computing further to the decisive factor of the scale construction of the resource pool, using the mathematical Statistics theory and method, this paper puts forward the basis and the concrete realization of the optimization estimate construction scale, gives the regression equation, and verifies the prediction regression ...
Research on user behavior habit verification model in cloud computing Guo Fuliang Zhou Gang Chi Liang based on the analysis of cloud computing security status, this paper establishes a user behavior verification model based on stochastic network model to introduce the behavior habit of user accessing resource or invoking service mainly includes the choice probability deviation degree and the service occupation time two Measure this model to use user access habits for authentication in order to access user resources and invoke service behavior is an effective cloud computing user behavior Verification technology and case analysis shows that it has good practicability. Cloud meter ...
Study on data access control strategy of meteorological cloud based on attribute encryption Fangzhong Xiazhihua Zhou Shu with the increasing of meteorological service level, the problem of cloud storage and instant sharing of meteorological data is becoming more and more prominent. Aiming at the problem of identity authentication and access control for meteorological data storage and sharing in cloud computing environment, an access control model of attribute encryption based on multiple authorization is proposed. This model adopts a kind of attribute encryption scheme which is suitable for large data in cloud environment, solves the problem of fine-grained access control of data in meteorological department, and introduces the concept of global ID and multiple authorization mechanism to solve ...
Editor's note: Clothing industry and fashion linked together, this is the most innovative industry, but the beginning of the 2012 has been caught in a dilemma, the reason is very simple-hoarding goods: from Li Ning to the United States, those who have walked in the forefront of the industry suddenly seems to be a negative example. The reason for the emergence of "hoarding goods" lies in the mass production of apparel enterprises, and then forced to "sell" the logic to consumers. The serious lag of garment enterprises production and marketing mechanism, as well as the uncontrolled expansion of brand manufacturers, resulting in a large backlog of products. In the era of scale expansion, the streets are filled with a variety of brand stores, staged a costume ...
Research on the strategy of public opinion guidance in the large data age Chongqing Chite in the clear big data age the abrupt event discourse system development tendency and the reason behind, how to respond to become the focus of this article, the author separately from the response thinking, information management mechanism of the construction, the implementation of specific strategies three aspects of detailed elaboration. First of all, the emergency response thinking in large data age should conform to the characteristics of large data scale, high speed and relativity, and should be fully adapted to the requirement of social media to open information. Secondly, the public opinion of the sudden events in the Big Data era cannot be separated from the letter ...
A review of green database for energy-aware Kim Pek Baoping Kim Yu Lihua with the global low carbonization trend and the data-centric computing trend, it has become a common concern of government, enterprises and academia to study the green Database system of energy saving. However, the existing database systems and algorithms are mostly targeted to target and design, lack of energy consumption awareness and processing, including energy efficiency and energy consumption, such as year-on-year considerations. Around the development demand of green database system, the key problems in green database technology are discussed, and the emphases are expounded ...
Cloud computing scheduling algorithm in meteorological environment Wang Junsong Sheng for the characteristics of meteorological calculation, a cloud model of meteorological calculation is proposed, and a heuristic scheduling algorithm for meteorological cloud Computing (Weather Cloud) is proposed on this model. The scheduling algorithm classifies the meteorological operation according to the time pressing type, the CPU pressing type, the memory pressing type and the hard disk space pressing type, calculates the resource synthesis urgent index, and assigns different scheduling priority rights accordingly. With CMMs (Cloud min scheduling), Afcfs (Adap ...
Apduino CUBE-0 is an experimental project designed to try the sustainable development of small agriculture that can be implemented in the backyard so that anyone can feed themselves. We want to try to get plants to grow in a small, self-contained space for a year or so. At present, we are building a passive solar greenhouse in a closed IBC container and creating a small fish-vegetable symbiotic system. Although at this stage, our "Rubik's Cube" (IBC Container) can only operate under the condition of power, but in the future we hope that with the help of everyone ...
Research on the marketing strategy of Changzhou Telecom cloud computing business Nanjing University of Science and Technology Huangyu in the wave of cloud computing and Changzhou Telecom is committed to the dual background of enterprise transformation, the author based on their actual work experience, combined with strategic management and marketing theory, the development strategy of Changzhou Telecom cloud computing Business Research and analysis. Firstly, this paper introduces the knowledge of cloud computing and the development of cloud computing at home and abroad, and then analyzes the strategic environment of Changzhou Telecom cloud computing business by means of pest analysis method, five-forces model and SWOT analysis,...
Design and implementation of information push system based on Azure platform Dalian Tao own Human, that is, the problem of "information overload", human beings for the correctness and accuracy of information selection suffered a lot of redundant information interference. At present, information push is one of the methods to effectively solve the information redundancy problem by automatically filtering or filtering, fast, continuous, automatic and accurate transmission of information to target users. Therefore, it is necessary to design a kind of information push system which enables users to get information automatically. This article sets ...
The design of distributed campus video monitoring system based on cloud computing Peng the problem of the lack of bandwidth resources in the traditional campus video surveillance system due to the large amount of data transmission, a distributed campus video monitoring system based on cloud computing is proposed The application of distributed computing to the processing of massive video data by using virtualized resources instead of limited physical resources to achieve full virtualization of storage provides stronger storage and share functions and the campus monitoring system of the wired Network and wireless network integration of the most rationalization of the use of system resources experiments to prove the application of cloud ...
A study of geological informatization based on IoT and cloud computing in large data age Jilin University He Wenna This article from the geological Information work is about to enter the era of large data, with large data, IoT (Internet of Things), cloud computing (Cloud Computing) and other frontier technology in the field of Geological Survey of the application of information work as the object of study, in-depth study of various technologies to promote the impact of geological information and application programs, including geological network, geology ...
User anonymity method for large-data-oriented personalized retrieval Kanghaiyan Xiong Li, a method of anonymous user's interest model based on the combination of difference privacy and p-link technology, is proposed to solve the contradiction between the potential privacy security of personalized retrieval technology in large data and enhance the performance of personalized information retrieval. First, the user's quasi-identifier generalization and add noise to meet the difference privacy protection requirements, maximize the accuracy of the query in the statistical database, while minimizing the probability of identifying individuals and attributes, second, based on the similarity between users ' interests to the micro-poly to the full ...
China Unicom Smart city development Strategy Qi Li Jiangong morninghill Yang Besh China Unicom Research Institute Beijing 100,032 First, the concept, status quo and problems of intelligent City are expounded, then the development of intelligent city in China Unicom is reviewed, and based on this, the suggestion of Intelligent city development suitable for China Unicom is put forward. Keywords intelligent city; development strategy; Information island; large data; China Unicom Intelligent City Development Strategy
An efficient malicious code detection mechanism for virtual desktop Guo Yu Yong compared with traditional malicious code detection methods, the malicious code detection method facing virtual desktop faces the challenge of performance. Multiple virtual desktops on the same physical server simultaneously carry out malicious code detection, making hardware such as disk a serious IO performance bottleneck. This paper presents an efficient virtual desktop malicious code detection scheme, based on the female parent cloning technology of virtual desktop malicious code detection Mechanism (mcids), mcids according to the characteristics of virtual desktop system, through the system image network storage cloning ...
Every year we ask what it experts like, and this year, a number of cloud-related product projects are among those favorites. Spending on cloud services has so far accounted for only a fraction of total IT spending-粗估 about 3%, but the market continues to grow. Global spending on public cloud computing services has grown 18.5% in 2013, from $111 billion trillion last year to $131 billion trillion, according to Gartner, the Research institute. It is not so easy for IT experts to impress new technologies, and they say they are their favorite cloud product and service ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.