Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
1081
Open Reading Frame Phylogenetic Analysis on the Cloud
Published 2013-01-01“…Viral evolutionary relationships are identified from open reading frames rather than from complete sequences. Recently, cloud computing has become popular for developing internet-based bioinformatics tools. …”
Get full text
Article -
1082
Blockchain empowered 6G
Published 2020-03-01“…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
Get full text
Article -
1083
Blockchain empowered 6G
Published 2020-03-01“…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
Get full text
Article -
1084
Building accurate numerical models
Published 2024-01-01“…The integration of emerging technologies like machine learning, artificial intelligence, and quantum computing holds significant promise for advancing numerical modeling capabilities. Additionally, cloud computing offers scalable and flexible resources, making high-performance computing more accessible. …”
Get full text
Article -
1085
Managerial Styles and Digital Innovation for Sustainable Business Growth
Published 2025-02-01“…The integration of contemporary information technologies, such as big data analytics, cloud computing, and artificial intelligence, allows organizations to streamline processes, reduce costs, and enhance competitiveness. …”
Get full text
Article -
1086
Smart Manufacturing through Machine Learning: A Review, Perspective, and Future Directions to the Machining Industry
Published 2022-01-01“…Nowadays, to reach progressive growth although being competitive in the market, the manufacturing industries are using advanced technologies such as cloud computing, the Internet of things (IoT), artificial intelligence, 3D printer, nanotechnology, cryogenics, robotics, and automation in smart manufacturing sectors. …”
Get full text
Article -
1087
Biometric cryptosystem to secure smart object communications in the internet of things
Published 2022-03-01“…We have therefore tried in this paper to propose a secure IoT framework based on cloud computing. In this study, we focused on the security aspect of a person’s connection to their objects using biometric cryptosystems. …”
Get full text
Article -
1088
Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud
Published 2015-10-01“…With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. …”
Get full text
Article -
1089
VMI-based virtual machine remote attestation scheme
Published 2018-12-01“…The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.…”
Get full text
Article -
1090
New provable data transfer from provable data possession and deletion for secure cloud storage
Published 2019-04-01“…With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. …”
Get full text
Article -
1091
Privacy cloud storage scheme based on fog computing
Published 2019-03-01“…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
Get full text
Article -
1092
Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption
Published 2024-12-01“…In this paper, the Paillier HE algorithm was used to study the power grid data, and the encrypted data was numerically calculated under different encryption states. It used the cloud computing center in the blockchain to directly aggregate the ciphertext data generated by users, and used the hash function to set the secret key to prevent the ciphertext data from being tampered with, and obtained the aggregate result of the original data after decryption by the power grid management center. …”
Get full text
Article -
1093
The environmental impact of the digital universe and the role of education
Published 2025-08-01“…Rooted in a philosophy of education articulated in the final section, this discipline is proposed as a central tool for dissemination and knowledge production within the context of cloud computing. The paper concludes with reflections on the limitations of this contribution and suggests a trajectory toward a new paideia, aiming to regenerate thought and redefine our relationship with the digital realm. …”
Get full text
Article -
1094
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
1095
PCEP application in cloud-network convergence and end to end traffic assurance scheme
Published 2021-08-01“…With the booming development of new technologies such as cloud computing, big data and the continuous upgrading of communication infrastructure, the major domestic ISPs have proposed the development strategy of building a centralized control and flexible cloud network infrastructure under the trend of intelligent-traction network transformation.As a path calculation protocol widely used in the existing SDN architecture, PCEP protocol was often used to solve the problem of cross-layer and cross-domain path computing under complex network environment.The application of PCEP protocol in cloud-network convergence scenario was discussed and an end-to-end traffic guarantee scheme was introduced based on PCEP protocol which could ensure the connection-oriented network communication and make end-to-end service guarantee in native IP environment.It helps to improve the operators' ability of real-time perception, agile response and intelligent analysis of the network and meets the operation and maintenance management requirements such as global scheduling of communication resources, comprehensive opening of capabilities and flexible architecture.…”
Get full text
Article -
1096
An Optimized Replica Distribution Method in Cloud Storage System
Published 2017-01-01“…Aiming at establishing a shared storage environment, cloud storage systems are typical applications of cloud computing. Therefore, data replication technology has become a key research issue in storage systems. …”
Get full text
Article -
1097
Exploration and Research on Smart Sports Classrooms in Colleges in the Information Age
Published 2022-01-01“…The smart classroom is an intelligent and efficient classroom created by the “Internet +” way of thinking and the new generation of information technologies such as big data and cloud computing. This article puts forward the exploratory research methods of smart sports classrooms in colleges and universities in the IA, methods, such as document retrieval, expert interviews, questionnaire surveys, and practical research, and field investigation method, which are used in the exploration and research of college smart sports classrooms in the IA experiment. …”
Get full text
Article -
1098
The Deepfake Technology: Threats or Opportunities for Customs
Published 2023-05-01“…The development of science and technology contributes to the expansion of opportunities for using new ways in various fields of activity — such as remote work, cloud computing, and so on, which makes any activity more convenient and efficient. …”
Get full text
Article -
1099
A dynamic service migration strategy based on mobility prediction in edge computing
Published 2021-02-01“…Mobile edge computing is a new computing paradigm, which pushes cloud computing capabilities away from the centralized cloud to the network edge to satisfy the increasing amounts of low-latency tasks. …”
Get full text
Article -
1100
Research on enterprise digital transformation: A case study of Alibaba
Published 2024-01-01“…This study uses Alibaba as a case and employs case analysis to explore its specific initiatives in areas such as e-commerce platform digitization, cloud computing, and big data applications. The research finds that Alibaba’s digital transformation has significantly enhanced its innovation capabilities, expanded new markets, and optimized operational efficiency, although there are still some issues and areas for improvement. …”
Get full text
Article