-
141
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
Published 2023-09-01“…Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. …”
Get full text
Article -
142
Spectral Expansion Method for Cloud Reliability Analysis
Published 2019-01-01“…Cloud computing is a computing hypothesis, where a huge group of systems is linked together in private, public, or hybrid network, to offer dynamically amendable infrastructure for data storage, file storage, and application. …”
Get full text
Article -
143
-
144
Multidomain Hierarchical Resource Allocation for Grid Applications
Published 2012-01-01“…Many applications require the collaboration between different domains, may be independently administrated domains, to exchange data and share computing and storage resources. This collaboration should be done in a way that maintains the privacy of each participant domain. …”
Get full text
Article -
145
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01Get full text
Article -
146
From FPGA to Support Cloud to Cloud of FPGA: State of the Art
Published 2019-01-01“…It provides “unlimited” storage capacities and a large number of data and applications that make collaboration easier between multiple (not domain specific) designers. …”
Get full text
Article -
147
Algorithm and Architecture Optimization for 2D Discrete Fourier Transforms with Simultaneous Edge Artifact Removal
Published 2018-01-01“…We also used our high-performance 2D FFT implementation to accelerate filtered back-projection for reconstructing tomographic data.…”
Get full text
Article -
148
-
149
-
150
Cost-Effective Resource Provisioning for Real-Time Workflow in Cloud
Published 2020-01-01“…Meanwhile, cloud environment provides sufficient computing and storage resources for big data management and analytics. …”
Get full text
Article -
151
Analyzing Interdisciplinary Research Using Co-Authorship Networks
Published 2022-01-01“…It was found that “Artificial Intelligence” and “Information Storage and Retrieval”, “Natural Language Processing and Information Storage and Retrieval”, and “Human-Computer Interface” and “Database Applications” were found the most overlapping areas by acquiring an IDR score of 0.879, 0.711, and 0.663, respectively.…”
Get full text
Article -
152
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…A cloud service provider is utilized to provide secure data storage services. Data integrity is a critical issue in cloud computing. …”
Get full text
Article -
153
-
154
Hadoop in Banking: Event-Driven Performance Evaluation
Published 2025-01-01“…This is supported by the Hadoop ecosystem, which provides distribution of the processing and storage, making it fit for handling large datasets with high fault tolerance and parallel computation levels. …”
Get full text
Article -
155
Application of Machine Learning in Multi-Directional Model to Follow Solar Energy Using Photo Sensor Matrix
Published 2022-01-01Get full text
Article -
156
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
Published 2011-01-01“…In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. …”
Get full text
Article -
157
-
158
Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital.
Published 2024“…The data was collected, analyzed, and computed to determine the challenges records departments meet in their daily activities resulting from their storage types of equipment usage. …”
Get full text
Thesis -
159
Fast and accurate near-duplicate image elimination for visual sensor networks
Published 2017-02-01“…Among the visual data, there are a lot of near-duplicate images, which cause a serious waste of limited storage, computing, and transmission resources of visual sensor networks and a negative impact on users’ experience. …”
Get full text
Article -
160