Showing 1,041 - 1,060 results of 1,622 for search '"cloud computing"', query time: 0.11s Refine Results
  1. 1041

    Research on ciphertext search for the cloud environment by Fei XIANG, Chuan-yi LIU, Bin-xing FANG, Chun-lu WANG, HONGRui-ming Z

    Published 2013-07-01
    “…On the basis of analyzing the ciphertext search technologies in cloud computing environment, a ciphertext search system architecture based on cloud c g environment was proposed and the key technologies of ciphertext search were studied. …”
    Get full text
    Article
  2. 1042

    Spatial Archaeology: Remote Sensing for the Study and Preservation of Cultural Heritage through Open Data and FLOSS Tools by Giuseppe Guarino, Alessia Brucato

    Published 2024-03-01
    “…All images were processed with filters, algorithms, and routines in free Open-Source software such as QGIS 3.34.0 and cloud computing platforms like Google Earth Engine. The results of the classification were validated with statistical accuracy techniques.…”
    Get full text
    Article
  3. 1043

    Realization of vOLT and development trend by Fengchao FU, Peng WANG, Yu MAO, Yongmei HUANG, Xiaobing GAO, Aihua ZHANG, Guoqiang LIN

    Published 2018-07-01
    “…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
    Get full text
    Article
  4. 1044

    Survey on edge computing technology for autonomous driving by Pin LYU, Jia XU, Taoshen LI, Wenbiao XU

    Published 2021-03-01
    “…Edge computing plays an extremely important role in the environment perception and data processing of autonomous driving.Autonomous driving vehicles can expand their perception scope by obtaining environmental information from edge nodes, and can also deal with the problem of insufficient computing resources by offloading tasks to edge nodes.Compared with cloud computing, edge computing avoids high latency caused by long-distance data transmission, and provides autonomous driving vehicles with faster responses, and relieves the traffic load of the backbone network.Firstly, the edge computing-based cooperative perception and task offloading technologies for autonomous vehicles were introduced firstly, and related challenging issues were also proposed.Then the state-of-the-art of cooperative perception and task offloading technologies were analyzed and summarized.Finally, the problems need to be further studied in this field were discussed.…”
    Get full text
    Article
  5. 1045

    Research on mobile stroke unit based on 5G network technology by Yu SHENG, Zhiheng LIU, Liya SHAN, Yi FENG

    Published 2020-01-01
    “…The 5G mobile stroke unit uses advanced next-generation information and communication technologies such as the Internet of things,mobile Internet,cloud computing,5G,etc.,to connect and achieve healthy interaction with people,equipment,and resources related to health care,which can guarantee people's timely access to preven-tive and therapeutic medical services.The composition design,functional modules,implementation architecture,and innovative service models of 5G mobile stroke units were discussed.The combination of 5G network technology and mobile stroke units were analyzed,and the network requirements of 5G mobile stroke units was analyzed with spe-cific cases.…”
    Get full text
    Article
  6. 1046

    التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة by د. ممدوح علی محمود

    Published 2016-10-01
    “…Cloud storing is a basic factor in cloud computing that reducescosts for individuals and institutions, saves time and effort in seeking data fromany place in the world. …”
    Get full text
    Article
  7. 1047

    Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space by Jian-hua LI

    Published 2016-02-01
    “…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
    Get full text
    Article
  8. 1048

    Information Technologies for Development of Specific Regions of Poland in Assessment of the Analytic Hierarchy Process Method by Stanisław Ceran

    Published 2015-10-01
    “…The state and the dynamics of the process of information technologies, in relation with the digitization, mobility and cloud computing processing trends in the areas of public administration and economics as well as functioning of individual households show vast diversification in those areas. …”
    Get full text
    Article
  9. 1049

    Apply PSO into cloud storage task scheduling with QoS preference awareness by Juan WANG, Fei LI, Lu-qiao ZHANG

    Published 2014-03-01
    “…The task scheduling algorithm in cloud storage area with QoS preference awareness was studied.Firstly,the differences between cloud storage and cloud computing were pointed,and exist matrix was used to avoid the creation of useless solutions.Secondly,QoS factors were summarized into three classes:time,cost and quality classes.Based on the three classes,the fitness function of the PSO was improved by using weighted factors to adjust the QoS preference.The simulation results release that PSO is not fit for the overall scheduling when the task distributions of different degrees are unevenness because the QoS demand of wide distribution tasks may cover the QoS demand of other tasks.So a hierarchical scheduling based on degree is necessary.The simulation results show that the improved hierarchical PSO scheduling algorithm can aware the QoS preference relevantly.…”
    Get full text
    Article
  10. 1050

    Server consolidation: A technique to enhance cloud data center power efficiency and overall cost of ownership by Mueen Uddin, Mohammed Hamdi, Abdullah Alghamdi, Mesfer Alrizq, Mohammad Sulleman Memon, Maha Abdelhaq, Raed Alsaqour

    Published 2021-03-01
    “…Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective information technology solutions for multinationals to offer improved and enhanced quality of business services to end-users. …”
    Get full text
    Article
  11. 1051

    Using malware for software-defined networking–based smart home security management through a taint checking approach by Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Hsiao-Chung Lin, Wun-Jie Chao

    Published 2016-08-01
    “…For solving the dynamic taint propagation analysis problem, most approaches focus on cloud computing applications (apps) with malware threat analysis that involves program vulnerability analyses, rather than on the risk posed by suspicious apps connected to the cloud computing server. …”
    Get full text
    Article
  12. 1052

    EcoTaskSched: a hybrid machine learning approach for energy-efficient task scheduling in IoT-based fog-cloud environments by Asfandyar Khan, Faizan Ullah, Dilawar Shah, Muhammad Haris Khan, Shujaat Ali, Muhammad Tahir

    Published 2025-04-01
    “…Integrating cloud and fog resources can help address these challenges by improving fog-cloud computing environments. Nevertheless, the search for optimal task allocation and energy management in such environments continues. …”
    Get full text
    Article
  13. 1053

    Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges by Sobia Mehrban, Muhammad Waqas Nadeem, Muzammil Hussain, Mohammad Masroor Ahmed, Owais Hakeem, Shazia Saqib, M. L. Mat Kiah, Fakhar Abbas, Mujtaba Hassan, Muhammad Adnan Khan

    Published 2020-01-01
    “…This is important to note that the development of FinTech is indebted to the mutual integration of different state of the art technologies, for example, technologies related to a mobile embedded system, mobile networks, mobile cloud computing, big data, data analytics techniques, and cloud computing etc. …”
    Get full text
    Article
  14. 1054

    Handling Complexity in Modern Software Engineering: Editorial Introduction to Issue 32 of CSIMQ by Alfred Zimmermann, Bartosz Marcinkowski

    Published 2022-10-01
    “…The potential of the Internet and related digital technologies, such as the Internet of Things (IoT), cognition and artificial intelligence, data analytics, services computing, cloud computing, mobile systems, collaboration networks, and cyber-physical systems, are both strategic drivers and enablers of modern digital platforms with fast-evolving ecosystems of intelligent services for digital products. …”
    Get full text
    Article
  15. 1055

    SQUiD: ultra-secure storage and analysis of genetic data for the advancement of precision medicine by Jacob Blindenbach, Jiayi Kang, Seungwan Hong, Caline Karam, Thomas Lehner, Gamze Gürsoy

    Published 2024-12-01
    “…Abstract Cloud computing allows storing the ever-growing genotype-phenotype datasets crucial for precision medicine. …”
    Get full text
    Article
  16. 1056

    Virtualization security:the good,the bad and the ugly by Yu-tao LIU, Hai-bo CHEN

    Published 2016-10-01
    “…The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.…”
    Get full text
    Article
  17. 1057

    The Integrated Processing Method of Educational Information Resources Based on Edge Computing by Zhimei Lv

    Published 2022-01-01
    “…With the help of edge computing and cloud computing platform and network, the teaching, scientific research, office services, and many other applications of big data integration mining analysis build intelligent management, teaching, scientific research, and life mode, to improve the utilization of education information resources. …”
    Get full text
    Article
  18. 1058

    Advancements in Coded Computation: Integrating Encoding Matrices with Data Shuffling for Enhanced Data Transmission Efficiency by Yuan Shijie

    Published 2025-01-01
    “…In the interconnected age of big data, cloud computing, and the Internet of Things, the demand for robust data processing and transmission systems is critical. …”
    Get full text
    Article
  19. 1059

    Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO

    Published 2017-05-01
    “…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
    Get full text
    Article
  20. 1060

    Digital Evidence gathering from service providers: a worrying paradigm shift in international cooperation by Marcello Daniele

    Published 2019-10-01
    “…It is becoming increasingly common that digital evidence relevant to criminal proceedings is not located in the State in which the crime was committed, but it is spread in the cloud computing, and it can be accessed only thanks to the intervention of the service providers that hold it. …”
    Get full text
    Article