Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
1121
CYBER THREAT INTELLIGENCE AND INFORMATION SHARING IN CLOUD ECOSYSTEMS
Published 2025-03-01“…The fast growth of cloud computing technologies has made CTI and information sharing inevitable and imperative to the improvement of cloud ecosystems' cybersecurity. …”
Get full text
Article -
1122
Time-constrained strong multi-designated verifier signature suitable for Internet of things–based collaborative fog computing systems
Published 2021-03-01“…Fog computing is viewed as an extended technique of cloud computing. In Internet of things–based collaborative fog computing systems, a fog node aggregating lots of data from Internet of things devices has to transmit the information to distributed cloud servers that will collaboratively verify it based on some predefined auditing policy. …”
Get full text
Article -
1123
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring
Published 2023-09-01“… As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. …”
Get full text
Article -
1124
Current developments, applications, challenges and future trends in internet of things: A survey
Published 2025-01-01“…The paper also anticipates future trends in IoT, particularly the integration of 5G connectivity, cloud computing and AI, and identifies areas for future research to address current challenges and explore new applications.…”
Get full text
Article -
1125
Engineering The Future of Higher Education: A VOSviewer Analysis of Smart University Trends in The Digitalization and Industry 5.0 Era
Published 2025-03-01“…Significant issues include the use of IoT, AI, and cloud computing for enhancing processes, learning environments, and safety on campus. …”
Get full text
Article -
1126
Efficient Resources Provisioning Based on Load Forecasting in Cloud
Published 2014-01-01“…We propose a multi-step-ahead load forecasting method, KSwSVR, based on statistical learning theory which is suitable for the complex and dynamic characteristics of the cloud computing environment. It integrates an improved support vector regression algorithm and Kalman smoother. …”
Get full text
Article -
1127
A Framework for Automated Digital Media Asset Acquisition using Cloud
Published 2025-01-01“…These findings highlight the potential of automation and cloud computing to optimize media workflows, ultimately improving production speed and operational efficiency which can also lead to potential economic benefits.…”
Get full text
Article -
1128
NEW TECHNOLOGIES IN TRANSPORT IN THE FACE OF CHALLENGES OF ECONOMY 4.0
Published 2019-03-01“…Artificial Intelligence, the Internet of Things (IoT), the Internet of Everything (IoE), hyperconnectivity, cloud computing applications and services, Big Data Analytics (BDA), Big-Dataas-a-Service (BDaaS), automation and robotisation are just a few of the technologies that the authors found worth looking at in more detail with regard to transport. …”
Get full text
Article -
1129
An intelligent and simplified 5G wireless network technology
Published 2021-05-01“…5G is the current focus of the development of the information and communication industry, and is gradually being deployed and commercialized.The 5G network will cover toC to toB, aiming at the interconnection of everything, so the complexity and challenges are unprecedented.In order to meet the needs of multiple scenarios, 5G network technology is complex and flexible in design, and the traditional management and operation methods are difficult and costly.At the same time, industry application requirements are very different and demanding.All of these require integrated solutions such as cloud-network integration and network industry collaboration.In response to the above-mentioned problems and needs, an intelligent and simplified 5G wireless network technology framework was proposed.Through innovative thinking and technology development of wireless networks, 5G and artificial intelligence, cloud computing, big data, edge computing and other new technologies were integrated and innovated to continuously improve 5G capabilities and promote the deep convergence of 5G and DOICT.A detailed introduction to the entire framework, platforms and applications in the above technology system were given.Finally, a technical outlook was proposed for shaping a new 5G ecology that supported green, smart, efficient operation, and the internet of everything.…”
Get full text
Article -
1130
A Systemic Approach to Evaluating Fintech-Driven Competitiveness in Commercial Banks: Integrating Delphi and ANP Methods
Published 2025-05-01“…First, the Delphi method identifies five fintech subsystems: big data, artificial intelligence, cloud computing, the Internet of Things, and blockchain. …”
Get full text
Article -
1131
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article -
1132
An efficient deception architecture for cloud-based virtual networks
Published 2019-08-01“…A central challenge to the theory of misery digraphs is verifying their applicability in prominent cloud computing platforms as well as measuring the efficiency of networks that adapt them. …”
Get full text
Article -
1133
Integration Research of Pantograph-Catenary Detection System for Intelligent Operation and Maintenance of Heavy-haul Locomotive
Published 2021-07-01“…Through the integrated research of pantograph catenary detection system and the comprehensive application of vehicle network, internet of things, cloud computing, image recognition and machine vision algorithm, an on-board pantograph catenary detection system suitable for heavy-duty locomotive with the functions of catenary state inspection, pantograph dynamic operation parameter detection and pantograph catenary dynamic interaction relationship detection was proposed. …”
Get full text
Article -
1134
Navigating industry 4.0 and 5.0: the role of hybrid modelling in (bio)chemical engineering’s digital transition
Published 2024-12-01“…Although there have been many innovations in the field of machine learning, AI, and cloud computing, the industry is still some distance away from becoming truly digital; this is particularly true in the case of the biochemical industry, which in many ways still is in the industry 3.0 stages. …”
Get full text
Article -
1135
Research on Technical Framework of Intelligent Maintenance & Supportfor Heavy-haul Railway
Published 2021-01-01“…In recent years, with the emergence and popularization of a series of new intelligent technologies such as cloud computing, big data, IoT, mobile internet and artificial intelligence, how to use resources comprehensively and efficiently to realize comprehensive perception, ubiquitous interconnection, fusion processing, active learning and scientific decision-making of information among railway heavy-haul trains, mobile equipment, fixed infrastructure and internal and external environments, to provide guarantee for the safe and stable operation of heavy haul combined trains on the railway, becomes an important topic at present. …”
Get full text
Article -
1136
Cultivation Method Analysis for Teachers’ Teaching Ability Driven by Artificial Intelligence Technology
Published 2022-01-01“…Colleges and universities have reached a new stage in their evolution, one marked by intelligent use of technology, as represented by the fourth generation of information technology: cloud computing, big data, and artificial intelligence. …”
Get full text
Article -
1137
Adaptive user-oriented fuzzy-based service broker for cloud services
Published 2022-02-01“…The algorithm is implemented using an open-source cloud computing simulation tool. The algorithm results are tested against the results of other existing techniques within two types of cloud environments. …”
Get full text
Article -
1138
V2X offloading and resource allocation under SDN and MEC architecture
Published 2020-01-01“…To address the serious problem of delay and energy consumption increase and service quality degradation caused by complex network status and huge amounts of computing data in the scenario of vehicle-to-everything (V2X),a vehicular network architecture combining mobile edge computing (MEC) and software defined network (SDN) was constructed.MEC sinks cloud serviced to the edge of the wireless network to compensate for the delay fluctuation caused by remote cloud computing.The SDN controller could sense network information from a global perspective,flexibly schedule resources,and control offload traffic.To further reduce the system overhead,a joint task offloading and resource allocation scheme was proposed.By modeling the MEC-based V2X offloading and resource allocation,the optimal offloading decision,communication and computing resource allocation scheme were derived.Considering the NP-hard attribute of the problem,Agglomerative Clustering was used to select the initial offloading node,and Q-learning was used for resource allocation.The offloading decision was modeled as an exact potential game,and the existence of Nash equilibrium was proved by the potential function structure.The simulation results show that,as compared to other mechanisms,the proposed mechanism can effectively reduce the system overhead.…”
Get full text
Article -
1139
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01“…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
Get full text
Article -
1140
International Standards for Digital Twins
Published 2024-12-01“…Interest in digital twins has grown significantly due to the maturation of enabling technologies, including cloud computing, 5G, data storage, computing capabilities, the Internet of Things (IoT), Artificial Intelligence (AI), and machine learning. …”
Get full text
Article