Showing 641 - 660 results of 691 for search '"cloud computing"', query time: 0.08s Refine Results
  1. 641

    Integrating Human-Computer Interactions in Nigerian Energy System: A Skills Requirement Analysis by Omoseni Adepoju, Oluwarotimi Akinyomi, Oluwadamilola Esan

    Published 2023-12-01
    “…This research explores the impact of HCI in the adoption of technologies of 4IR (Artificial Intelligence, the Internet of Things, Big Data, and Cloud Computing), in Nigeria's energy sector. The research assesses the current level of implementation of Industry 4.0, requirements for the implementation of Industry 4.0 technology, demand, and skills for HCI in the implementation of 4IR technology in Nigeria's energy generation sub-sector. …”
    Get full text
    Article
  2. 642

    Neural network inspired efficient scalable task scheduling for cloud infrastructure by Punit Gupta, Arnaav Anand, Pratyush Agarwal, Gavin McArdle

    Published 2024-01-01
    “…The rapid development of Cloud Computing in the 21st Century is landmark occasion, not only in the field of technology, but also in the field of engineering and services. …”
    Get full text
    Article
  3. 643

    New Benchmarking Methodology and Programming Model for Big Data Processing by Anton Kos, Sašo Tomažič, Jakob Salom, Nemanja Trifunovic, Mateo Valero, Veljko Milutinovic

    Published 2015-08-01
    “…The integration of big data producing technologies, such as wireless sensor networks, Internet of Things, and cloud computing, into cyber-physical systems is reducing the available time to find the appropriate solutions. …”
    Get full text
    Article
  4. 644

    Downscaling of ERA5 reanalysis land surface temperature based on attention mechanism and Google Earth Engine by Shiyu Li, Hong Wan, Qun Yu, Xinyuan Wang

    Published 2025-01-01
    “…Therefore, to improve the spatial resolution of ERA5-Land LST data, this study proposes an Attention Mechanism U-Net (AMUN) method, which combines data acquisition and preprocessing on the Google Earth Engine (GEE) cloud computing platform, to downscale the hourly monthly mean reanalysis LST data of ERA5-Land across China’s territory from 0.1° to 0.01°. …”
    Get full text
    Article
  5. 645

    Proof of storage with corruption identification and recovery for dynamic group users by Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA

    Published 2022-10-01
    “…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
    Get full text
    Article
  6. 646
  7. 647

    Space mission as a service (SMaaS): General-purpose computing on space by Leonardo Camargo-Forero, Julián G. Rodríguez-Ferreira, Carlos J. Barrios-Hernández

    Published 2024-12-01
    “…Such strategies will include evaluating standard operating systems and embedded companion computers, such as the NVIDIA® Jetson Series, under space conditions, common AI frameworks, High-Performance Embedded Computing, and cloud computing as an integrator between space computing devices and earth ground stations. …”
    Get full text
    Article
  8. 648

    A Systematic Review of Access Control Models: Background, Existing Research, and Challenges by Nastaran Farhadighalati, Luis A. Estrada-Jimenez, Sanaz Nikghadam-Hojjati, Jose Barata

    Published 2025-01-01
    “…Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While robust access control (AC) is essential, it must be balanced with maintaining operational efficiency. …”
    Get full text
    Article
  9. 649

    Task-Driven Computing Offloading and Resource Allocation Scheme for Maritime Autonomous Surface Ships Under Cloud–Shore–Ship Collaboration Framework by Supu Xiu, Ying Zhang, Hualong Chen, Yuanqiao Wen, Changshi Xiao

    Published 2024-12-01
    “…Based on the ship-to-shore and ship-to-ship communication network, they can exploit diversified and distributed resources such as shore-based facilities and cloud computing centers to execute a variety of ship applications. …”
    Get full text
    Article
  10. 650

    EMO-TS: An Enhanced Multi-Objective Optimization Algorithm for Energy-Efficient Task Scheduling in Cloud Data Centers by S. Nambi, P. Thanapal

    Published 2025-01-01
    “…These results underscore the algorithm’s potential to address cloud service providers’ economic and environmental concerns, offering a practical solution for green cloud computing initiatives. Furthermore, the integration of renewable energy sources within the EMO-TS framework shows potential for further reducing the carbon footprint of cloud operations, aligning with global sustainability goals.…”
    Get full text
    Article
  11. 651

    Nature-Inspired Metaheuristics for Two-Agent Scheduling with Due Date and Release Time by Hongwei Li, Yuvraj Gajpal, Chirag Surti, Dongliang Cai, Amit Kumar Bhardwaj

    Published 2020-01-01
    “…The two agents’ scheduling problem, an NP-hard problem, has a wide variety of applications ranging from the manufacturing industry to the cloud computing service provider. Due to the wide applicability, each variation of the problem requires a different algorithm, adapted according to the user’s requirements. …”
    Get full text
    Article
  12. 652

    Blockchain-based cross-data center anonymous and verifiable identity authentication scheme by XU Shujiang, ZHANG Chaoyang, WANG Lianhai, ZHANG Shuhui, SHAO Wei

    Published 2024-04-01
    “…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
    Get full text
    Article
  13. 653

    Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures by Navod Neranjan Thilakarathne, Muhammad Saifullah Abu Bakar, Pg Emeroylariffion Abas, Hayati Yassin

    Published 2025-02-01
    “…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
    Get full text
    Article
  14. 654

    Research progress and prospect of intelligent prediction and disaster risk assessment of open-pit mining surface deformation by LI Hui, ZHU Wancheng, XU Xiaodong, SONG Qingwei, HAN Xiaofei, GENG Huikai

    Published 2024-12-01
    “…In recent years, the development of big data, cloud computing and artificial intelligence methods has provided technical support for the intelligent transformation of traditional mines. …”
    Get full text
    Article
  15. 655

    Rapid Flood Monitoring Using Sentinel-1 and Landsat-8 Images (Case study: Kashkan River, Poldakhter City) by Peyman Peymankhah, Sara Attarchi, Meysam Moharrami

    Published 2023-09-01
    “…This advantage coupled with cloud computing platforms such as Google Earth Engine (GEE) provide a tremendous opportunity for the crisis response community for effective management plans. …”
    Get full text
    Article
  16. 656

    Challenges and Opportunities in Fog Computing Scheduling: A Literature Review by Wu Chia Chuan, Shams Ul Arfeen Laghari, Selvakumar Manickam, Erum Ashraf, Shankar Karuppayah

    Published 2025-01-01
    “…Nonetheless, both IoT and Artificial Intelligence (AI)-based applications face obstacles concerning the availability of computing resources, security, and constraints on energy consumption. While cloud computing provides certain resolutions, it also poses additional challenges, including heightened communication expenses and security vulnerabilities due to its physical disconnection from endpoint devices. …”
    Get full text
    Article
  17. 657

    Evaluation of the Cost of Intelligent Upgrades of Transportation Infrastructure for Intelligent Connected Vehicles by Zongwei Liu, Haokun Song, Hong Tan, Han Hao, Fuquan Zhao

    Published 2022-01-01
    “…The results show that the intelligent transportation infrastructure for advanced ICVs mainly includes communication base stations, roadside units (RSUs), vision sensors, millimeter-wave radars, laser radars (LiDARs), meteorological sensors, intelligent signal machines, edge computing servers, and cloud computing centers. The route of deploying primary intelligent transportation infrastructure at first and then directly upgrading them to advanced level can well match the functional requirements of ICVs on the basis of lower costs. …”
    Get full text
    Article
  18. 658

    ESTABLISHING THE KEY ELEMENTS OF INCORPORATION AND OUTCOMES OF 4TH INDUSTRIAL REVOLUTION IN BUILT ENVIRONMENT EDUCATION: A MIXED BIBLIOGRAPHIC AND BIBLIOMETRIC ANALYSIS by Alireza MOGHAYEDI, Karen Le Jeune, Mark Massyn, Christiana Ekpo

    Published 2020-09-01
    “…Digital technologies, Virtual reality and cloud computing are the most significant education tools and technology elements. …”
    Get full text
    Article
  19. 659

    Soil Conservation Benefits of Ecological Programs Promote Sustainable Restoration by Renjie Zong, Nufang Fang, Yi Zeng, Xixi Lu, Zhen Wang, Wei Dai, Zhihua Shi

    Published 2025-01-01
    “…We introduce a framework that integrates the multi‐model approach and scenario analysis on cloud computing platforms to capture the significance of soil conservation benefits by assessing the world's largest restoration programs from China. …”
    Get full text
    Article
  20. 660

    Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls by Syed Imran Akhtar, Abdul Rauf, Muhammad Faisal Amjad, Ifra Batool

    Published 2024-01-01
    “…Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its consumers are well established. …”
    Get full text
    Article