Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1401
Performance Evaluation of NewSQL Databases in a Distributed Architecture
Published 2025-01-01“…In the last decade, application architectures have evolved drastically, moving from monolithic architectures to distributed architectures where deployment has shifted from dedicated on-premises servers to the cloud. Distributed architectures and cloud computing has enabled businesses to scale their application components across different geographical locations. …”
Get full text
Article -
1402
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…The emergence of cloud computing enables users to upload data to remote clouds and compute them. …”
Get full text
Article -
1403
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
Published 2024-12-01“…Typically, blockchain technology and cloud storage provide effective solutions. Nevertheless, the centralized storage architecture of traditional cloud servers is susceptible to single points of failure, potentially leading to system outages. …”
Get full text
Article -
1404
Measurement report: The ice-nucleating activity of lichen sampled in a northern European boreal forest
Published 2025-01-01“…<p>Ice-nucleating particles (INPs) facilitate the heterogeneous freezing of cloud droplets and thus modify cloud properties. …”
Get full text
Article -
1405
Differential Grey Wolf Load-Balanced Stochastic Bellman Deep Reinforced Resource Allocation in Fog Environment
Published 2022-01-01“…It works in conjunction with the cloud computing environment. Load balancing, which is employed by IoT applications when deciding, which fog or cloud computing nodes to use, is one of the most critical components for enhancing resource efficiency and avoiding problems like overloading or underloading. …”
Get full text
Article -
1406
An Authentication Approach in a Distributed System Through Synergetic Computing
Published 2025-01-01“…The transaction processing speed on low-risk events may reach 25,000 TPS based on the assumption of certain member classes given that all of ANOD, and Asteroid_Node_of_Backup (ANB), Edge Cloud, and Core Cloud function normally.…”
Get full text
Article -
1407
Digital Modeling of Cone-generated Enveloping Torus Worm
Published 2020-10-01“…The solving algorithm for the complex nonlinear mathematical models is also designed based on the forming principle of the envelope surface, the instantaneous contact line and all meshing point cloud for the tooth profile are calculated, the distribution of contact line of worm tooth profile is also given. …”
Get full text
Article -
1408
Diagnosis of the Relationship between Dust Storms over the Sahara Desert and Dust Deposit or Coloured Rain in the South Balkans
Published 2010-01-01“…If the atmospheric conditions over Greece favour rain then this rain contains a part of the dust cloud while the rest is drawn away downstream adopting a light yellow colour. …”
Get full text
Article -
1409
Digital HR tools and their role in improving the competitiveness of companies
Published 2021-07-01“…The multi-functionality of the system ensures the management of human resources through the use of cloud technologies at all stages: from recruitment to the implementation of the company’s personnel policy. …”
Get full text
Article -
1410
Emerging Technologies Driving Zero Trust Maturity Across Industries
Published 2025-01-01“…The research investigates how artificial intelligence, machine learning, blockchain, quantum computing, and cloud/edge technologies are reshaping the implementation and efficacy of Zero Trust architectures. …”
Get full text
Article -
1411
A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks
Published 2024-01-01“…Our protocol utilizes the benefits of cloud computing, cloud storage, and the fast communication capabilities of IPv6. …”
Get full text
Article -
1412
Decoupling and Collaboration: An Intelligent Gateway-Based Internet of Things System Architecture for Meat Processing
Published 2025-01-01“…This architecture is centered around an intelligently decoupled gateway design and edge-cloud collaborative intelligent meat inspection. …”
Get full text
Article -
1413
Task Balanced Workflow Scheduling Technique considering Task Processing Rate in Spot Market
Published 2014-01-01“…Recently, the cloud computing is a computing paradigm that constitutes an advanced computing environment that evolved from the distributed computing. …”
Get full text
Article -
1414
Accurate LAI estimation of soybean plants in the field using deep learning and clustering algorithms
Published 2025-01-01“…The 3D point cloud data is obtained from a UAV equipped with a LiDAR camera. …”
Get full text
Article -
1415
IoT-based home control system using NodeMCU and Firebase
Published 2024-11-01“…This IoT-based home control system shows the potential of integrating microcontrollers with cloud services to create a smart, responsive and user-friendly home control platform. …”
Get full text
Article -
1416
Cross-Modal Collaboration and Robust Feature Classifier for Open-Vocabulary 3D Object Detection
Published 2025-01-01“…In this approach, 2D images provide preliminary regions of interest for novel objects in the 3D point cloud, while the 3D point cloud offers more precise positional information to the 2D images. …”
Get full text
Article -
1417
Autonomous Real-Time Speed-Limit Violation Detection and Reporting Systems Based on the Internet of Vehicles (IoV)
Published 2021-01-01“…A second alternative system design is to use Cloud Servers (CSs) and the IoV beacons that are sent from the vehicles. …”
Get full text
Article -
1418
SmartProvenance: User‐friendly provenance system for internet of things applications based on event flow graphs
Published 2022-12-01“…Abstract Internet of things (IoT) applications called SmartApps are event‐driven programs running on the SmartThings cloud. To understand the behaviour of SmartApps, users may have questions regarding which execution flows follow particular events or why specific actions occur. …”
Get full text
Article -
1419
A Comparison Study of Edge Line Estimation Algorithms for Dimensional Quality Assessment of Precast Concrete Slabs
Published 2024-01-01“…Point cloud data-based edge line extraction is an important task for accurate geometrical inspection of precast concrete (PC) elements in the construction industry. …”
Get full text
Article -
1420
Toward an Understanding of the Madden-Julian Oscillation: With a Mesoscale-Convection-Resolving Model of 0.2 Degree Grid
Published 2011-01-01“…It is also shown that cloud clusters, which constitute the SCS (such as super cloud cluster SCC), consist of a few MCS, and a new MCS forms to the west of the existing MCS. …”
Get full text
Article