Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
641
Integrating Human-Computer Interactions in Nigerian Energy System: A Skills Requirement Analysis
Published 2023-12-01“…This research explores the impact of HCI in the adoption of technologies of 4IR (Artificial Intelligence, the Internet of Things, Big Data, and Cloud Computing), in Nigeria's energy sector. The research assesses the current level of implementation of Industry 4.0, requirements for the implementation of Industry 4.0 technology, demand, and skills for HCI in the implementation of 4IR technology in Nigeria's energy generation sub-sector. …”
Get full text
Article -
642
Neural network inspired efficient scalable task scheduling for cloud infrastructure
Published 2024-01-01“…The rapid development of Cloud Computing in the 21st Century is landmark occasion, not only in the field of technology, but also in the field of engineering and services. …”
Get full text
Article -
643
New Benchmarking Methodology and Programming Model for Big Data Processing
Published 2015-08-01“…The integration of big data producing technologies, such as wireless sensor networks, Internet of Things, and cloud computing, into cyber-physical systems is reducing the available time to find the appropriate solutions. …”
Get full text
Article -
644
Downscaling of ERA5 reanalysis land surface temperature based on attention mechanism and Google Earth Engine
Published 2025-01-01“…Therefore, to improve the spatial resolution of ERA5-Land LST data, this study proposes an Attention Mechanism U-Net (AMUN) method, which combines data acquisition and preprocessing on the Google Earth Engine (GEE) cloud computing platform, to downscale the hourly monthly mean reanalysis LST data of ERA5-Land across China’s territory from 0.1° to 0.01°. …”
Get full text
Article -
645
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
Get full text
Article -
646
Abnormal Respiratory Sounds Classification Using Deep CNN Through Artificial Noise Addition
Published 2021-11-01Get full text
Article -
647
Space mission as a service (SMaaS): General-purpose computing on space
Published 2024-12-01“…Such strategies will include evaluating standard operating systems and embedded companion computers, such as the NVIDIA® Jetson Series, under space conditions, common AI frameworks, High-Performance Embedded Computing, and cloud computing as an integrator between space computing devices and earth ground stations. …”
Get full text
Article -
648
A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
Published 2025-01-01“…Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While robust access control (AC) is essential, it must be balanced with maintaining operational efficiency. …”
Get full text
Article -
649
Task-Driven Computing Offloading and Resource Allocation Scheme for Maritime Autonomous Surface Ships Under Cloud–Shore–Ship Collaboration Framework
Published 2024-12-01“…Based on the ship-to-shore and ship-to-ship communication network, they can exploit diversified and distributed resources such as shore-based facilities and cloud computing centers to execute a variety of ship applications. …”
Get full text
Article -
650
EMO-TS: An Enhanced Multi-Objective Optimization Algorithm for Energy-Efficient Task Scheduling in Cloud Data Centers
Published 2025-01-01“…These results underscore the algorithm’s potential to address cloud service providers’ economic and environmental concerns, offering a practical solution for green cloud computing initiatives. Furthermore, the integration of renewable energy sources within the EMO-TS framework shows potential for further reducing the carbon footprint of cloud operations, aligning with global sustainability goals.…”
Get full text
Article -
651
Nature-Inspired Metaheuristics for Two-Agent Scheduling with Due Date and Release Time
Published 2020-01-01“…The two agents’ scheduling problem, an NP-hard problem, has a wide variety of applications ranging from the manufacturing industry to the cloud computing service provider. Due to the wide applicability, each variation of the problem requires a different algorithm, adapted according to the user’s requirements. …”
Get full text
Article -
652
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01“…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
Get full text
Article -
653
Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures
Published 2025-02-01“…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
Get full text
Article -
654
Research progress and prospect of intelligent prediction and disaster risk assessment of open-pit mining surface deformation
Published 2024-12-01“…In recent years, the development of big data, cloud computing and artificial intelligence methods has provided technical support for the intelligent transformation of traditional mines. …”
Get full text
Article -
655
Rapid Flood Monitoring Using Sentinel-1 and Landsat-8 Images (Case study: Kashkan River, Poldakhter City)
Published 2023-09-01“…This advantage coupled with cloud computing platforms such as Google Earth Engine (GEE) provide a tremendous opportunity for the crisis response community for effective management plans. …”
Get full text
Article -
656
Challenges and Opportunities in Fog Computing Scheduling: A Literature Review
Published 2025-01-01“…Nonetheless, both IoT and Artificial Intelligence (AI)-based applications face obstacles concerning the availability of computing resources, security, and constraints on energy consumption. While cloud computing provides certain resolutions, it also poses additional challenges, including heightened communication expenses and security vulnerabilities due to its physical disconnection from endpoint devices. …”
Get full text
Article -
657
Evaluation of the Cost of Intelligent Upgrades of Transportation Infrastructure for Intelligent Connected Vehicles
Published 2022-01-01“…The results show that the intelligent transportation infrastructure for advanced ICVs mainly includes communication base stations, roadside units (RSUs), vision sensors, millimeter-wave radars, laser radars (LiDARs), meteorological sensors, intelligent signal machines, edge computing servers, and cloud computing centers. The route of deploying primary intelligent transportation infrastructure at first and then directly upgrading them to advanced level can well match the functional requirements of ICVs on the basis of lower costs. …”
Get full text
Article -
658
ESTABLISHING THE KEY ELEMENTS OF INCORPORATION AND OUTCOMES OF 4TH INDUSTRIAL REVOLUTION IN BUILT ENVIRONMENT EDUCATION: A MIXED BIBLIOGRAPHIC AND BIBLIOMETRIC ANALYSIS
Published 2020-09-01“…Digital technologies, Virtual reality and cloud computing are the most significant education tools and technology elements. …”
Get full text
Article -
659
Soil Conservation Benefits of Ecological Programs Promote Sustainable Restoration
Published 2025-01-01“…We introduce a framework that integrates the multi‐model approach and scenario analysis on cloud computing platforms to capture the significance of soil conservation benefits by assessing the world's largest restoration programs from China. …”
Get full text
Article -
660
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its consumers are well established. …”
Get full text
Article