Showing 1,081 - 1,100 results of 1,622 for search '"cloud computing"', query time: 0.08s Refine Results
  1. 1081

    Open Reading Frame Phylogenetic Analysis on the Cloud by Che-Lun Hung, Chun-Yuan Lin

    Published 2013-01-01
    “…Viral evolutionary relationships are identified from open reading frames rather than from complete sequences. Recently, cloud computing has become popular for developing internet-based bioinformatics tools. …”
    Get full text
    Article
  2. 1082

    Blockchain empowered 6G by Yueyue DAI, Ke ZHANG, Yan ZHANG

    Published 2020-03-01
    “…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
    Get full text
    Article
  3. 1083

    Blockchain empowered 6G by Yueyue DAI, Ke ZHANG, Yan ZHANG

    Published 2020-03-01
    “…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
    Get full text
    Article
  4. 1084

    Building accurate numerical models by Sharapov Dmitry

    Published 2024-01-01
    “…The integration of emerging technologies like machine learning, artificial intelligence, and quantum computing holds significant promise for advancing numerical modeling capabilities. Additionally, cloud computing offers scalable and flexible resources, making high-performance computing more accessible. …”
    Get full text
    Article
  5. 1085

    Managerial Styles and Digital Innovation for Sustainable Business Growth by Dušanka Paspalj

    Published 2025-02-01
    “…The integration of contemporary information technologies, such as big data analytics, cloud computing, and artificial intelligence, allows organizations to streamline processes, reduce costs, and enhance competitiveness. …”
    Get full text
    Article
  6. 1086

    Smart Manufacturing through Machine Learning: A Review, Perspective, and Future Directions to the Machining Industry by A. S. Rajesh, M. S. Prabhuswamy, Srinivasan Krishnasamy

    Published 2022-01-01
    “…Nowadays, to reach progressive growth although being competitive in the market, the manufacturing industries are using advanced technologies such as cloud computing, the Internet of things (IoT), artificial intelligence, 3D printer, nanotechnology, cryogenics, robotics, and automation in smart manufacturing sectors. …”
    Get full text
    Article
  7. 1087

    Biometric cryptosystem to secure smart object communications in the internet of things by Abdallah Meraoumia, Mohamed Amroune, Lakhadr Laimeche, Hakiml Bendjenna

    Published 2022-03-01
    “…We have therefore tried in this paper to propose a secure IoT framework based on cloud computing. In this study, we focused on the security aspect of a person’s connection to their objects using biometric cryptosystems. …”
    Get full text
    Article
  8. 1088

    Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud by Qingkuan Dong, Jiaqing Tong, Yuan Chen

    Published 2015-10-01
    “…With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. …”
    Get full text
    Article
  9. 1089

    VMI-based virtual machine remote attestation scheme by Wei WANG, Xingshu CHEN, Xiao LAN, Xin JIN

    Published 2018-12-01
    “…The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.…”
    Get full text
    Article
  10. 1090

    New provable data transfer from provable data possession and deletion for secure cloud storage by Yudong Liu, Shuai Xiao, Han Wang, Xu An Wang

    Published 2019-04-01
    “…With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. …”
    Get full text
    Article
  11. 1091

    Privacy cloud storage scheme based on fog computing by Jiyuan ZHOU, Hao LUO, Lei QIU, Tian WANG

    Published 2019-03-01
    “…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
    Get full text
    Article
  12. 1092

    Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption by Shaodong Zhao

    Published 2024-12-01
    “…In this paper, the Paillier HE algorithm was used to study the power grid data, and the encrypted data was numerically calculated under different encryption states. It used the cloud computing center in the blockchain to directly aggregate the ciphertext data generated by users, and used the hash function to set the secret key to prevent the ciphertext data from being tampered with, and obtained the aggregate result of the original data after decryption by the power grid management center. …”
    Get full text
    Article
  13. 1093

    The environmental impact of the digital universe and the role of education by Enrico Orsenigo, Michela Bongiorno, Maria Valentini, Cecilia Pellizzari, Lino Rossi

    Published 2025-08-01
    “…Rooted in a philosophy of education articulated in the final section, this discipline is proposed as a central tool for dissemination and knowledge production within the context of cloud computing. The paper concludes with reflections on the limitations of this contribution and suggests a trajectory toward a new paideia, aiming to regenerate thought and redefine our relationship with the digital realm. …”
    Get full text
    Article
  14. 1094

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  15. 1095

    PCEP application in cloud-network convergence and end to end traffic assurance scheme by Yue WANG, Aijun WANG, Honglei XU

    Published 2021-08-01
    “…With the booming development of new technologies such as cloud computing, big data and the continuous upgrading of communication infrastructure, the major domestic ISPs have proposed the development strategy of building a centralized control and flexible cloud network infrastructure under the trend of intelligent-traction network transformation.As a path calculation protocol widely used in the existing SDN architecture, PCEP protocol was often used to solve the problem of cross-layer and cross-domain path computing under complex network environment.The application of PCEP protocol in cloud-network convergence scenario was discussed and an end-to-end traffic guarantee scheme was introduced based on PCEP protocol which could ensure the connection-oriented network communication and make end-to-end service guarantee in native IP environment.It helps to improve the operators' ability of real-time perception, agile response and intelligent analysis of the network and meets the operation and maintenance management requirements such as global scheduling of communication resources, comprehensive opening of capabilities and flexible architecture.…”
    Get full text
    Article
  16. 1096

    An Optimized Replica Distribution Method in Cloud Storage System by Yan Wang, Jinkuan Wang

    Published 2017-01-01
    “…Aiming at establishing a shared storage environment, cloud storage systems are typical applications of cloud computing. Therefore, data replication technology has become a key research issue in storage systems. …”
    Get full text
    Article
  17. 1097

    Exploration and Research on Smart Sports Classrooms in Colleges in the Information Age by Yongmao Zhang, Hua Zhao, Dan Peng

    Published 2022-01-01
    “…The smart classroom is an intelligent and efficient classroom created by the “Internet +” way of thinking and the new generation of information technologies such as big data and cloud computing. This article puts forward the exploratory research methods of smart sports classrooms in colleges and universities in the IA, methods, such as document retrieval, expert interviews, questionnaire surveys, and practical research, and field investigation method, which are used in the exploration and research of college smart sports classrooms in the IA experiment. …”
    Get full text
    Article
  18. 1098

    The Deepfake Technology: Threats or Opportunities for Customs by A. A. Getman, Yilan Ling

    Published 2023-05-01
    “…The development of science and technology contributes to the expansion of opportunities for using new ways in various fields of activity — such as remote work, cloud computing, and so on, which makes any activity more convenient and efficient. …”
    Get full text
    Article
  19. 1099

    A dynamic service migration strategy based on mobility prediction in edge computing by Lanlan Rui, Shuyun Wang, Zhili Wang, Ao Xiong, Huiyong Liu

    Published 2021-02-01
    “…Mobile edge computing is a new computing paradigm, which pushes cloud computing capabilities away from the centralized cloud to the network edge to satisfy the increasing amounts of low-latency tasks. …”
    Get full text
    Article
  20. 1100

    Research on enterprise digital transformation: A case study of Alibaba by Zhang Ao

    Published 2024-01-01
    “…This study uses Alibaba as a case and employs case analysis to explore its specific initiatives in areas such as e-commerce platform digitization, cloud computing, and big data applications. The research finds that Alibaba’s digital transformation has significantly enhanced its innovation capabilities, expanded new markets, and optimized operational efficiency, although there are still some issues and areas for improvement. …”
    Get full text
    Article