Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
541
An Efficient Policy-Based Scheduling and Allocation of Virtual Machines in Cloud Computing Environment
Published 2022-01-01“…Cloud computing has become the most challenging research field in the current information technology scenario. …”
Get full text
Article -
542
Retracted: Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2024-01-01Get full text
Article -
543
Application Research for Data Acquisition and Summary Statistics System Based on Cloud Platform
Published 2013-12-01Subjects: “…cloud platform…”
Get full text
Article -
544
Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
Published 2018-04-01Subjects: “…cloud environment…”
Get full text
Article -
545
Some key technical issues in the evolution from cloud network to computing network
Published 2021-10-01Subjects: “…cloud-network integration…”
Get full text
Article -
546
Fuzzy Theory-Based Data Placement for Scientific Workflows in Hybrid Cloud Environments
Published 2020-01-01“…In hybrid cloud environments, reasonable data placement strategies are critical to the efficient execution of scientific workflows. …”
Get full text
Article -
547
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01Subjects: “…cloud storage…”
Get full text
Article -
548
Retracted: Cloud Network and Mathematical Model Calculation Scheme for Dynamic Big Data
Published 2020-01-01“…Cloud network oriented to dynamics big data is a popular way of big data operation at present. …”
Get full text
Article -
549
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Published 2021-10-01Subjects: Get full text
Article -
550
Case Study of Ground-Based Glaciogenic Seeding of Clouds over the Pyeongchang Region
Published 2018-01-01“…Ground-based glaciogenic seeding experiments were conducted at the Daegwallyeong Cloud Physics Observation Site (CPOS) from 2012 to 2015 for the target area Yongpyeong, which lies 9 km away. …”
Get full text
Article -
551
Micelle Mediated Trace Level Sulfide Quantification through Cloud Point Extraction
Published 2012-01-01“…A simple cloud point extraction protocol has been proposed for the quantification of sulfide at trace level. …”
Get full text
Article -
552
Research and design of distributed high-performance network reptiles based on cloud platform
Published 2017-08-01“…With the arrival of large data age,data has become the most valuable resource.And web crawler technology as an important means of external data collection,has become a standard tool for data analysis.A high-performance,convenient cloud-based crawler architecture design was introduced.The overall structure of the reptile to the distributed design and the design of the sub-module was described in detail.Each module of the crawler was encapsulated in Docker,and Kubernetes was used as the resource scheduling and management of the cluster.In the performance of optimization,the MD5 reset tree algorithm,DNS optimization and asynchronous I/O were adopted.Experimental results show that the performance of crawler has obvious advantages compared with the UN optimized scheme.…”
Get full text
Article -
553
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01Subjects: “…cloud platform…”
Get full text
Article -
554
Research and practice of centralized cloud-enabled service provisioning and activation system of PON
Published 2016-08-01Subjects: Get full text
Article -
555
Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Published 2021-01-01“…Therefore, this paper proposes a hierarchical simulation of the Internet of Things sharing structure framework that trusts the cloud to drive Internet information resource sharing. …”
Get full text
Article -
556
Residential Environment Pollution Monitoring System Based on Cloud Computing and Internet of Things
Published 2022-01-01“…In order to solve the problems of single monitoring factor, weak comprehensive analysis ability, and poor real time performance in traditional environmental monitoring systems, a research method of residential environment pollution monitoring system based on cloud computing and Internet of Things is proposed. …”
Get full text
Article -
557
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
558
Service Innovation of Insurance Data Based on Cloud Computing in the Era of Big Data
Published 2021-01-01“…To sum up, the insurance innovation service based on cloud computing insurance data can improve customer satisfaction, increase the number of policyholders, reduce the number of complaints, and achieve a more successful insurance service innovation. …”
Get full text
Article -
559
Fast and Deterministic Underwater Point Cloud Registration for Multibeam Echo Sounder Data
Published 2024-12-01Subjects: “…underwater point cloud registration…”
Get full text
Article -
560
Cloud Platform Selection Model in the Framework of Differential Quality Game With Fuzzy Information
Published 2025-01-01Subjects: Get full text
Article