Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
661
Fueling the development of elderly care services in China with digital technology: A provincial panel data analysis
Published 2025-02-01“…Objective: This study aims to investigate the transformative potential of digital technology, which includes innovations such as e-commerce, cloud computing, and artificial intelligence, on elderly care cervices in China. …”
Get full text
Article -
662
Data-Driven Technologies for Energy Optimization in Smart Buildings: A Scoping Review
Published 2025-01-01“…The key technologies identified included big data analytics, Artificial Intelligence, Machine Learning, the Internet of Things, Wireless Sensor Networks, Edge and Cloud Computing, Blockchain, Digital Twins, and Geographic Information Systems. …”
Get full text
Article -
663
Developing an On-Demand Cloud-Based Sensing-as-a-Service System for Internet of Things
Published 2016-01-01“…The increasing number of Internet of Things (IoT) devices with various sensors has resulted in a focus on Cloud-based sensing-as-a-service (CSaaS) as a new value-added service, for example, providing temperature-sensing data via a cloud computing system. However, the industry encounters various challenges in the dynamic provisioning of on-demand CSaaS on diverse sensor networks. …”
Get full text
Article -
664
A study on the carbon emission reduction pathways of China’s digital economy from multiple perspectives
Published 2025-01-01“…As the share of the digital economy’s output continues to rise each year, the emergence of new industries such as e-commerce, mobile payments, and cloud computing has opened new avenues for carbon emission reduction (CER). …”
Get full text
Article -
665
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
666
Intelligent information systems for power grid fault analysis by computer communication technology
Published 2025-01-01“…The system incorporates a novel fault diagnosis model, combining advanced communication technologies such as distributed computing, real-time data transmission, cloud computing, and big data analytics, to establish a multi-layered information processing architecture for grid fault analysis. …”
Get full text
Article -
667
Cost Analysis of Running Web Application in Cloud Monolith, Microservice and Serverless Architecture
Published 2024-12-01“…Cloud computing has become a popular choice for deploying web applications, but the selection of the appropriate architecture for different application types remains a challenge for businesses. …”
Get full text
Article -
668
A P2P Framework for Developing Bioinformatics Applications in Dynamic Cloud Environments
Published 2013-01-01“…Bioinformatics is advanced from in-house computing infrastructure to cloud computing for tackling the vast quantity of biological data. …”
Get full text
Article -
669
A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression—An Azure Machine Learning Perspective
Published 2025-01-01“…The experiment is performed and implemented in Microsoft’s Azure cloud, using Azure Machine Learning service, that leverages the advantages of cloud computing with respect to scalability, security and its potential integration possibilities into IoT-based smart healthcare systems.This aspect highlights its versatility and impact with respect to remote monitoring of patients as well. …”
Get full text
Article -
670
A Dynamic Interval Auto-Scaling Optimization Method Based on Informer Time Series Prediction
Published 2025-01-01“…With the rapid development and application of container cloud computing-related technologies, more and more applications are being deployed to container cloud clusters. …”
Get full text
Article -
671
Multitenancy in Single Instance of Data Persistence Service for Supporting Low-Code Platforms
Published 2025-01-01“…This approach, however, implies a mode of operation that is not the most mature among cloud computing providers, implying for each model a service instance running on the provider side. …”
Get full text
Article -
672
RETRACTED: Assisting Smart Construction With Reliable Edge Computing Technology
Published 2022-05-01“…However, as the amount of big data generated grows, processing and analytical issues arise. Cloud computing technologies are now being used to solve processing and analytical challenges. …”
Get full text
Article -
673
-
674
Automatic priority analysis of emergency response systems using internet of things (IoT) and machine learning (ML)
Published 2025-03-01“…The system provides dynamic visualisation and real-time tracking of emergency scenarios through the integration of geographical information systems (GIS) and the utilisation of cloud computing resources. This framework not only improves immediate response capabilities but also aids in strategic planning by providing actionable insights into potential future events. …”
Get full text
Article -
675
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
Published 2022-01-01“…We highlight the significance of CAMs in different computing paradigms, such as social networks, the internet of things, cloud computing, AI, and location-based systems with regard to privacy preservation. …”
Get full text
Article -
676
Aplicación de la Metodología OOWS y el Marco Ágil Scrum en el Diseño del “Chat Corporativo”
Published 2025-02-01“…Como trabajo futuro, se propuso migrar el chat a una plataforma Cloud Computing para aprovechar las ventajas como la escalabilidad, alta disponibilidad y seguridad que estas tecnologías ofrecen. …”
Get full text
Article -
677
A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions
Published 2024-06-01“…., ResNet-50, YOLOv4, LSTM) are deployed on devices, distributed edge, and distributed cloud computing. Moreover, we analyzed 1000 recent publications on “ML in IoT” from IEEE Xplore using support vector machine, random forest, and decision tree classifiers to identify emerging topics and application domains. …”
Get full text
Article -
678
AI augmented edge and fog computing for Internet of Health Things (IoHT)
Published 2025-01-01“…Patients today seek a more advanced and personalized health-care system that keeps up with the pace of modern living. Cloud computing delivers resources over the Internet and enables the deployment of an infinite number of applications to provide services to many sectors. …”
Get full text
Article -
679
Rapid Detection of Hybrid Maize Parental Lines Using Stacking Ensemble Machine Learning
Published 2022-01-01“…Tenfold cross-validation was used to evaluate the model performance. Cloud computing was also investigated using EfficientNet to compare the predictive performance of the models. …”
Get full text
Article -
680
Digital-based emergency prevention and control system: enhancing infection control in psychiatric hospitals
Published 2025-01-01“…Methods The system incorporates modern technologies such as cloud computing, big data, streaming media, and knowledge graphs. …”
Get full text
Article