scholarly journals Estimation of Node Cache Occupancy in Satellite Storage Network

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Erbao Wang ◽  
Qunfeng Dong ◽  
Yongan Li ◽  
Yuye Zhang
Keyword(s):  
2018 ◽  
Vol 6 (12) ◽  
pp. 980-983
Author(s):  
Ankita Sharma ◽  
Rishabh Bansal ◽  
Nimish Niret Soren

2013 ◽  
Vol 52 (22) ◽  
pp. 7116-7126 ◽  
Author(s):  
Gyeongbeom Yi ◽  
Bomsock Lee ◽  
Euy Soo Lee

2021 ◽  
Author(s):  
Peter Adam

Abstract Hydrogen holds enormous potential in helping the world achieve its decarbonization goals and is set to play a key role in the Energy Transition. However, two central building blocks are needed to make the hydrogen economy a reality: 1) a sufficient source of emissions-free (i.e., blue or green) hydrogen production and 2) a needs-based transportation and storage network that can reliably and cost-effectively supply hydrogen to end-users. Given the high costs associated with developing new transportation infrastructure, many governments, pipeline operators, and regulatory bodies have begun exploring if it is both possible and economical to convert existing natural gas (i.e., methane) infrastructure for hydrogen operation. This paper outlines opportunities and technical challenges associated with such an endeavor – with a particular focus on adaptation requirements for rotating equipment/compressor drive trains and metallurgical and integrity considerations for pipelines.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


Author(s):  
Jean Jacques KUBWIMANA

Due to the perishable nature and biological nature of the production process there is difficulty in scheduling the supply of vegetables to market demand. The vegetables are subjected to higher prices and quantity risks with changing consumers’ demand and production conditions. The core focus of this study was to reach, measure, and analyzing the marketing risk level of vegetables produced in Rubavu District, Rwanda. The study based on a survey of 90 vegetable sellers. At least 30 couple of wholesalers and middlemen visited Rubavu District to trade the vegetables for various retails. Primary data collected through structured questionnaires and secondary data sources used. A Five-point Likert associated with the bivariate analysis was used to rank the risk level while the full model of Linear Regression Analysis and factor analysis were used to identifier the majors’ factors associated with the risk in vegetable marketing in Rwanda. The mean score results derived based on Likert-Scales, indicated that “low seasonal product prices, weak market channels, poor logistics, and market communications, poor product handling and packaging, lack of storage and higher perishability’ identified to be the most important sources of risk. Therefore, the use of forwards’ contracts; getting market information, sell at crude prices due to perishability, contractual arrangements, maintaining good relationships and restoring the storage network system were of significant concerns for overcoming the recognized risks.   Keywords: Risk, Risk analysis, Likert Scale, Marketing risk, Vegetable Marketing risk, and Risk Management.


Sign in / Sign up

Export Citation Format

Share Document