Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
441
Uplink scheduling scheme for cloud service based on software-defined wireless network
Published 2016-12-01Subjects: Get full text
Article -
442
Algorithm for Cloud Particle Phase Identification Based on Bayesian Random Forest Method
Published 2025-01-01Subjects: “…cloud phase identification…”
Get full text
Article -
443
Theoretical framework for measuring cloud effective supersaturation fluctuations with an advanced optical system
Published 2025-01-01“…<p>Supersaturation is crucial in cloud physics, determining aerosol activation and influencing cloud droplet size distributions, yet its measurement remains challenging and poorly constrained. …”
Get full text
Article -
444
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
445
Retracted: Optimization of the Marketing Management System Based on Cloud Computing and Big Data
Published 2024-01-01Get full text
Article -
446
Energy-Efficient Virtual Machine Migration and Consolidation Algorithm in Cloud Data Center
Published 2015-01-01Subjects: “…cloud data center…”
Get full text
Article -
447
Research on cloud manufacturing service architecture and consensus algorithm based on blockchain technology
Published 2023-03-01Subjects: Get full text
Article -
448
Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
Published 2024-12-01Subjects: “…cloud forensics…”
Get full text
Article -
449
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01Subjects: “…mobile cloud…”
Get full text
Article -
450
PCEP application in cloud-network convergence and end to end traffic assurance scheme
Published 2021-08-01“…With the booming development of new technologies such as cloud computing, big data and the continuous upgrading of communication infrastructure, the major domestic ISPs have proposed the development strategy of building a centralized control and flexible cloud network infrastructure under the trend of intelligent-traction network transformation.As a path calculation protocol widely used in the existing SDN architecture, PCEP protocol was often used to solve the problem of cross-layer and cross-domain path computing under complex network environment.The application of PCEP protocol in cloud-network convergence scenario was discussed and an end-to-end traffic guarantee scheme was introduced based on PCEP protocol which could ensure the connection-oriented network communication and make end-to-end service guarantee in native IP environment.It helps to improve the operators' ability of real-time perception, agile response and intelligent analysis of the network and meets the operation and maintenance management requirements such as global scheduling of communication resources, comprehensive opening of capabilities and flexible architecture.…”
Get full text
Article -
451
A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient
Published 2015-03-01“…This paper presents a new hybrid framework based on mobile multimedia cloud that is scalable and efficient and provides cost-effective monitoring solution for noncommunicable disease patient. …”
Get full text
Article -
452
Retracted: Deep-Learning-Guided Point Cloud Modeling with Applications in Intelligent Manufacturing
Published 2023-01-01Get full text
Article -
453
Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud
Published 2021-06-01Subjects: “…cloud security…”
Get full text
Article -
454
A Fast Optimization Method for Reliability and Performance of Cloud Services Composition Application
Published 2013-01-01“…At present the cloud computing is one of the newest trends of distributed computation, which is propelling another important revolution of software industry. …”
Get full text
Article -
455
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
Published 2014-11-01Subjects: “…cloud storage…”
Get full text
Article -
456
Evaluation of Comprehensive Ability of Accounting Applied Talents Based on GFAHP-Cloud Model
Published 2021-01-01“…Finally, a fuzzy comprehensive evaluation model based on the cloud model is constructed and tested in practice. …”
Get full text
Article -
457
An edge cloud–based body data sensing architecture for artificial intelligence computation
Published 2019-04-01“…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
Get full text
Article -
458
Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Published 2014-09-01“…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
Get full text
Article -
459
TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
Published 2025-01-01Subjects: Get full text
Article -
460
Investigation of the Influence of Atmospheric Scattering on Photolysis Rates Using the Cloud-J Module
Published 2025-01-01Subjects: Get full text
Article