Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
1401
Approach for energy efficient building design during early phase of design process
Published 2024-11-01“…This paper presents an innovative approach that utilizes user input parameters, processes them through cloud computing, and outputs easily understandable strategies for energy-efficient building design. …”
Get full text
Article -
1402
Downscaling of ERA5 reanalysis land surface temperature based on attention mechanism and Google Earth Engine
Published 2025-01-01“…Therefore, to improve the spatial resolution of ERA5-Land LST data, this study proposes an Attention Mechanism U-Net (AMUN) method, which combines data acquisition and preprocessing on the Google Earth Engine (GEE) cloud computing platform, to downscale the hourly monthly mean reanalysis LST data of ERA5-Land across China’s territory from 0.1° to 0.01°. …”
Get full text
Article -
1403
Efficient productivity prediction model based on edge data compression in smart farms
Published 2025-12-01“…However, existing smart farms often face challenges, such as inefficiencies and performance bottlenecks, due to the limitations of traditional cloud computing architectures. For providing solutions to the problems existing in current smart farms, such as excessive energy consumption, and redundant data transmission, this paper proposes an adaptive optimization strategy based on priority scheduling and multi-source information fusion. …”
Get full text
Article -
1404
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
Published 2025-01-01“…It also determines the performance of IBPS to address security requirements for delegation within resource-limited environments such as IoT devices and cloud computing. The evaluation determines performance bottlenecks while optimizing the computational complexity and communication overhead to support the practical and real-world implementation of IBPS. …”
Get full text
Article -
1405
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest service provider and also ensure the availability of the data owners’ data, the design of secure and efficient data availability and recoverability auditing scheme has both theoretical and practical importance in solving the concern of users and ensuring the security of cloud data.However, most of the existing studies were designed for the security and efficiency of data integrity or recoverability schemes, without considering the fast identification and reliable recovery of damaged data under dynamic group users.Thus, to quickly identify and recover damaged data, a publicly verifiable proof of storage scheme was proposed for dynamic group cloud users.The designed scheme enabled a trusted third-party auditor to efficiently identify the damaged files through a challenge-response protocol and allowed the cloud storage server to effectively recover them when the degree of data damage is less than an error correction ability threshold.The scheme combined association calculation and accumulation calculation, which effectively reduced the number of calculations for the identification of damaged data.By combining erasure coding and shared coding technology, the scheme achieved effective recovery of damaged data of dynamic group users.At the same time, the scheme also supported dynamic user revocation, which ensured the integrity audit and reliable recovery of the collective data after user revocation.The network model and threat model of the designed scheme were defined and the security of the scheme under the corresponding security model was proved.Through the prototype implementation of the scheme in the real environment and the modular performance analysis, it is proved that the proposed scheme can effectively identify the damaged data and reliably recover the cloud data when the data is damaged.Besides, compared with other schemes, it is also proved that the proposed scheme has less computational overhead in identifying and recovering damaged data.…”
Get full text
Article -
1406
Inteligencia Artificial Generativa integrada al ecosistema digital
Published 2025-02-01“…El objetivo del artículo es realizar un mapeo de los principales desarrollos de LLMs en Occidente y sus asociaciones estratégicas, de hardware supply o financieras con plataformas, productores de hardware y servidores de cloud computing. En tal sentido, se parte del lanzamiento masivo de Chat GPT como momento fundacional de esta nueva etapa y se recorren los principales usos y aplicaciones de transformers en los entornos platafórmicos. …”
Get full text
Article -
1407
Guiding IT Growth and Sustaining Performance in SMEs Through Enterprise Architecture and Information Management: A Systematic Review
Published 2025-04-01“…Emerging technologies like Artificial Intelligence (AI) and cloud computing are highlighted for their transformative impact, enabling real-time data analysis, improved scalability, and enhanced agility. …”
Get full text
Article -
1408
Container scheduling techniques: A Survey and assessment
Published 2022-07-01“…Despite the immense traction of containers in cloud computing, there is no comprehensive survey that covers container scheduling techniques. …”
Get full text
Article -
1409
Industrial IoT-Based Energy Monitoring System: Using Data Processing at Edge
Published 2024-09-01“…Edge-assisted IoT technologies combined with conventional industrial processes help evolve diverse applications under the Industrial IoT (IIoT) and Industry 4.0 era by bringing cloud computing technologies near the hardware. The resulting innovations offer intelligent management of the industrial ecosystems, focusing on increasing productivity and reducing running costs by processing massive data locally. …”
Get full text
Article -
1410
Assessing Lean 4.0 critical success factors (CSFs) for implementing in small and medium-sized enterprises (SMEs)
Published 2025-05-01“…L4.0 integrates Lean principles with Industry 4.0 (I4.0) technologies, for instance wireless networks, Internet of things (IoT), big data, cloud computing (CC), etc., offering significant opportunities to enhance operational efficiency by reducing non-value-adding activities. …”
Get full text
Article -
1411
Development of a Wireless Sensor Network and IoT-based Smart Irrigation System
Published 2022-01-01“…This study proposes a smart irrigation system (SIS) using the drip method, which was designed and implemented using wireless sensor networks and an open-source Internet of Things (IoT) cloud computing platform (“Thingspeak.com”) for data collection, storing, data analytics, and visualization. …”
Get full text
Article -
1412
Risk Management in the IT Sector Under the Conditions of Digitalization of Economic Systems
Published 2025-03-01“…The use of tools such as artificial intelligence, cloud computing, and data analytics allows for the optimization of operations, risk reduction, and increased project productivity. …”
Get full text
Article -
1413
Real-Time Acoustic Scene Recognition for Elderly Daily Routines Using Edge-Based Deep Learning
Published 2025-03-01“…Traditional acoustic scene monitoring systems that rely on cloud computing are limited by data transmission delays and privacy concerns. …”
Get full text
Article -
1414
Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization
Published 2025-01-01“…Cloud computing is susceptible to a wide range of security issues since it is decentralized. …”
Get full text
Article -
1415
Smart tourism and poverty reduction
Published 2019-06-01“…Smart tourism is a new model of tourism informationization based on cloud computing, the mobile terminal application as the core and characterized by interactive and other efficient information services. …”
Get full text
Article -
1416
Advancing Built-Up Area Monitoring Through Multi-Temporal Satellite Data Fusion and Machine Learning-Based Geospatial Analysis
Published 2025-05-01“…This study presents an innovative geospatial methodology integrating multi-temporal satellite data fusion, transfer learning, machine learning classification, and open-access cloud computing to systematically identify, quantify, and map the spatiotemporal evolution of built-up areas. …”
Get full text
Article -
1417
Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures
Published 2025-02-01“…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
Get full text
Article -
1418
A digital twin framework for real-time healthcare monitoring: leveraging AI and secure systems for enhanced patient outcomes
Published 2025-04-01“…In this study, an architecture has been introduced that utilises cloud computing to create a DT ecosystem. A group of 20 participants has been monitored continuously using high-speed technology to track key physiological parameters, i.e., diabetes risk factors, heart rate (HR), oxygen saturation (SpO2) levels, and body temperature (BT). …”
Get full text
Article -
1419
Mitigating cloud vulnerabilities using a blockchain platform
Published 2025-04-01“…With the rapid advancements in deep learning and cloud computing, there is a growing need to enhance CBIR performance for real-world applications. …”
Get full text
Article -
1420
Digital twin for personalized medicine development
Published 2025-08-01“…The paper concludes by highlighting future directions, where AI, cloud computing, and blockchain are expected to play a pivotal role in overcoming these limitations and advancing precision medicine.…”
Get full text
Article