Showing 481 - 500 results of 2,372 for search '"cloud"', query time: 0.09s Refine Results
  1. 481

    Automatic Scaling Mechanism of Intermodal EDI System under Green Cloud Computing by Qiang Huang, Lin Sun, Furong Jia, Jiaxin Yuan, Yao Wu, Jinshan Pan

    Published 2022-01-01
    “…Based on the resource scheduling characteristics of container cloud and considering the distribution and heterogeneity of intermodal cloud computing platform from the perspective of resource allocation, the automatic scaling mechanism of XEDI is established, the scaling model is established, and the automatic scaling algorithm is proposed. …”
    Get full text
    Article
  2. 482

    Jacques Maurice et l'École Normale Supérieure de Saint-Cloud by Augustin Redondo

    Published 2015-03-01
    Subjects: “…École Normale Supérieure de Saint-Cloud…”
    Get full text
    Article
  3. 483
  4. 484

    A Vehicular Cloud-Based Framework for the Intelligent Transport Management of Big Cities by Rodolfo I. Meneguette

    Published 2016-05-01
    “…With these challenges in mind, we propose a vehicular cloud architecture to assist in the management of large cities. …”
    Get full text
    Article
  5. 485

    Integration of Heterogeneous Devices and Communication Models via the Cloud in the Constrained Internet of Things by Floris Van den Abeele, Jeroen Hoebeke, Ingrid Moerman, Piet Demeester

    Published 2015-10-01
    “…In order to alleviate service developers from these concerns, this paper presents a cloud-based platform for integrating heterogeneous constrained IoT devices and communication models into services. …”
    Get full text
    Article
  6. 486

    Multidimensional Heterogeneous Medical Data Push in Intelligent Cloud Collaborative Management System by Gang Liu, Xiaofeng Li

    Published 2020-01-01
    “…The medical data in the intelligent cloud collaborative management system have multidimensional heterogeneous interference, and there are problems such as low data information update rate and poor push results in the push process. …”
    Get full text
    Article
  7. 487

    A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data by Zana Thalage Omar, Fadhil Salman Abed, Shaimaa Khamees Ahmed

    Published 2021-01-01
    Subjects: “…Fully Homomorphic Encryption, Cloud computing, Asymmetric Encryption, Large number, Banking security.…”
    Get full text
    Article
  8. 488

    Collapse risk assessment based on linear programming variable weight-cloud model. by Xiaoyi Zhou, Ke Hu, Tingqiang Zhou

    Published 2024-01-01
    “…Finally, a comprehensive evaluation model of cloud model is constructed to determine the risk level of collapse. …”
    Get full text
    Article
  9. 489

    Convergence of telco cloud and bearer network based computing power network orchestration by Chang CAO, Shuai ZHANG, Ying LIU, Xiongyan TANG

    Published 2020-07-01
    “…Facing the combination of computing and network connection in the future network,and the development trend of computing and network integration,a computing power network orchestration model based on centralized and distributed control schemes was proposed.From the perspective of solution analysis,the computing power network orchestration scheme based on the convergence of telco cloud and bearer network can meet the future business needs of mobile edge computing (MEC) site better.With scheduling capabilities coordinated for both computing and networking,the network’s perception of services can be optimized.The specific choice of centralized or distributed control scheme is closely related to the operator’s telco cloud capabilities and the evolution stage of the bearer network.…”
    Get full text
    Article
  10. 490
  11. 491
  12. 492

    Secure deduplication and integrity audit system based on convergent encryption for cloud storage by Xiao-yong GUO, An-min FU, Bo-yu KUANG, Wei-jia DING

    Published 2017-11-01
    “…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
    Get full text
    Article
  13. 493
  14. 494
  15. 495

    Cancellation of cloud shadow effects in the absorbing aerosol index retrieval algorithm of TROPOMI by V. J. H. Trees, V. J. H. Trees, P. Wang, P. Stammes, L. G. Tilstra, D. P. Donovan, D. P. Donovan, A. P. Siebesma

    Published 2025-01-01
    “…The cloud-shadow-induced signatures are, however, not always apparent and may depend on various cloud and scene parameters. …”
    Get full text
    Article
  16. 496

    Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls by Syed Imran Akhtar, Abdul Rauf, Muhammad Faisal Amjad, Ifra Batool

    Published 2024-01-01
    “…The future of cloud is the “cloud of clouds,” where cloud service providers (CSPs) collaborate with each other to provide ever-scalable solutions to their customers. …”
    Get full text
    Article
  17. 497

    From Data to Decisions: A Smart IoT and Cloud Approach to Environmental Monitoring by Guerbaoui Mohammed, El Faiz Samira, Ed-Dahhak Abdelali, Lachhab Abdeslam, Benhala Bachir, Bakziz Zakaria, Ichou Ismail, Selmani Abdelouahed

    Published 2025-01-01
    “…The sensor nodes transmit data using the MQTT (Message Queuing Telemetry Transport) protocol to a cloud-based MQTT Broker hosted on HiveMQ Cloud. Data processing and visualization are handled by Node-RED, which subscribes to MQTT topics, processes incoming data streams, and stores them in a time-series database, InfluxDB Cloud. …”
    Get full text
    Article
  18. 498

    Application protection in 5G cloud network using zero trust architecture by Guofeng HE

    Published 2020-12-01
    “…Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.…”
    Get full text
    Article
  19. 499
  20. 500