Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
1041
Research on ciphertext search for the cloud environment
Published 2013-07-01“…On the basis of analyzing the ciphertext search technologies in cloud computing environment, a ciphertext search system architecture based on cloud c g environment was proposed and the key technologies of ciphertext search were studied. …”
Get full text
Article -
1042
Spatial Archaeology: Remote Sensing for the Study and Preservation of Cultural Heritage through Open Data and FLOSS Tools
Published 2024-03-01“…All images were processed with filters, algorithms, and routines in free Open-Source software such as QGIS 3.34.0 and cloud computing platforms like Google Earth Engine. The results of the classification were validated with statistical accuracy techniques.…”
Get full text
Article -
1043
Realization of vOLT and development trend
Published 2018-07-01“…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
Get full text
Article -
1044
Survey on edge computing technology for autonomous driving
Published 2021-03-01“…Edge computing plays an extremely important role in the environment perception and data processing of autonomous driving.Autonomous driving vehicles can expand their perception scope by obtaining environmental information from edge nodes, and can also deal with the problem of insufficient computing resources by offloading tasks to edge nodes.Compared with cloud computing, edge computing avoids high latency caused by long-distance data transmission, and provides autonomous driving vehicles with faster responses, and relieves the traffic load of the backbone network.Firstly, the edge computing-based cooperative perception and task offloading technologies for autonomous vehicles were introduced firstly, and related challenging issues were also proposed.Then the state-of-the-art of cooperative perception and task offloading technologies were analyzed and summarized.Finally, the problems need to be further studied in this field were discussed.…”
Get full text
Article -
1045
Research on mobile stroke unit based on 5G network technology
Published 2020-01-01“…The 5G mobile stroke unit uses advanced next-generation information and communication technologies such as the Internet of things,mobile Internet,cloud computing,5G,etc.,to connect and achieve healthy interaction with people,equipment,and resources related to health care,which can guarantee people's timely access to preven-tive and therapeutic medical services.The composition design,functional modules,implementation architecture,and innovative service models of 5G mobile stroke units were discussed.The combination of 5G network technology and mobile stroke units were analyzed,and the network requirements of 5G mobile stroke units was analyzed with spe-cific cases.…”
Get full text
Article -
1046
التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة
Published 2016-10-01“…Cloud storing is a basic factor in cloud computing that reducescosts for individuals and institutions, saves time and effort in seeking data fromany place in the world. …”
Get full text
Article -
1047
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
Get full text
Article -
1048
Information Technologies for Development of Specific Regions of Poland in Assessment of the Analytic Hierarchy Process Method
Published 2015-10-01“…The state and the dynamics of the process of information technologies, in relation with the digitization, mobility and cloud computing processing trends in the areas of public administration and economics as well as functioning of individual households show vast diversification in those areas. …”
Get full text
Article -
1049
Apply PSO into cloud storage task scheduling with QoS preference awareness
Published 2014-03-01“…The task scheduling algorithm in cloud storage area with QoS preference awareness was studied.Firstly,the differences between cloud storage and cloud computing were pointed,and exist matrix was used to avoid the creation of useless solutions.Secondly,QoS factors were summarized into three classes:time,cost and quality classes.Based on the three classes,the fitness function of the PSO was improved by using weighted factors to adjust the QoS preference.The simulation results release that PSO is not fit for the overall scheduling when the task distributions of different degrees are unevenness because the QoS demand of wide distribution tasks may cover the QoS demand of other tasks.So a hierarchical scheduling based on degree is necessary.The simulation results show that the improved hierarchical PSO scheduling algorithm can aware the QoS preference relevantly.…”
Get full text
Article -
1050
Server consolidation: A technique to enhance cloud data center power efficiency and overall cost of ownership
Published 2021-03-01“…Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective information technology solutions for multinationals to offer improved and enhanced quality of business services to end-users. …”
Get full text
Article -
1051
Using malware for software-defined networking–based smart home security management through a taint checking approach
Published 2016-08-01“…For solving the dynamic taint propagation analysis problem, most approaches focus on cloud computing applications (apps) with malware threat analysis that involves program vulnerability analyses, rather than on the risk posed by suspicious apps connected to the cloud computing server. …”
Get full text
Article -
1052
EcoTaskSched: a hybrid machine learning approach for energy-efficient task scheduling in IoT-based fog-cloud environments
Published 2025-04-01“…Integrating cloud and fog resources can help address these challenges by improving fog-cloud computing environments. Nevertheless, the search for optimal task allocation and energy management in such environments continues. …”
Get full text
Article -
1053
Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
Published 2020-01-01“…This is important to note that the development of FinTech is indebted to the mutual integration of different state of the art technologies, for example, technologies related to a mobile embedded system, mobile networks, mobile cloud computing, big data, data analytics techniques, and cloud computing etc. …”
Get full text
Article -
1054
Handling Complexity in Modern Software Engineering: Editorial Introduction to Issue 32 of CSIMQ
Published 2022-10-01“…The potential of the Internet and related digital technologies, such as the Internet of Things (IoT), cognition and artificial intelligence, data analytics, services computing, cloud computing, mobile systems, collaboration networks, and cyber-physical systems, are both strategic drivers and enablers of modern digital platforms with fast-evolving ecosystems of intelligent services for digital products. …”
Get full text
Article -
1055
SQUiD: ultra-secure storage and analysis of genetic data for the advancement of precision medicine
Published 2024-12-01“…Abstract Cloud computing allows storing the ever-growing genotype-phenotype datasets crucial for precision medicine. …”
Get full text
Article -
1056
Virtualization security:the good,the bad and the ugly
Published 2016-10-01“…The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.…”
Get full text
Article -
1057
The Integrated Processing Method of Educational Information Resources Based on Edge Computing
Published 2022-01-01“…With the help of edge computing and cloud computing platform and network, the teaching, scientific research, office services, and many other applications of big data integration mining analysis build intelligent management, teaching, scientific research, and life mode, to improve the utilization of education information resources. …”
Get full text
Article -
1058
Advancements in Coded Computation: Integrating Encoding Matrices with Data Shuffling for Enhanced Data Transmission Efficiency
Published 2025-01-01“…In the interconnected age of big data, cloud computing, and the Internet of Things, the demand for robust data processing and transmission systems is critical. …”
Get full text
Article -
1059
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01“…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
Get full text
Article -
1060
Digital Evidence gathering from service providers: a worrying paradigm shift in international cooperation
Published 2019-10-01“…It is becoming increasingly common that digital evidence relevant to criminal proceedings is not located in the State in which the crime was committed, but it is spread in the cloud computing, and it can be accessed only thanks to the intervention of the service providers that hold it. …”
Get full text
Article