Results 1 to 10 of about 241,235 (288)

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

Introducing a Fair Tax Method to Harden Industrial Blockchain Applications against Network Attacks: A Game Theory Approach

open access: yesComputers, 2023
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare.
Fatemeh Stodt, Christoph Reich
doaj   +1 more source

Demystifying MLOps and Presenting a Recipe for the Selection of Open-Source Tools

open access: yesApplied Sciences, 2021
Nowadays, machine learning projects have become more and more relevant to various real-world use cases. The success of complex Neural Network models depends upon many factors, as the requirement for structured and machine learning-centric project ...
Philipp Ruf   +3 more
doaj   +1 more source

Cyber resilience and cyber security issues of intelligent cloud computing systems

open access: yesResults in Control and Optimization, 2023
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj   +1 more source

On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj   +1 more source

Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination

open access: yesIEEE Photonics Journal, 2020
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang   +3 more
doaj   +1 more source

DEVELOPMENT OF SMART CITIES IN TAIWAN FROM THE PERSPECTIVE OF CLOUD COMPUTING SECURITY [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2019
Cloud computing is an important part of the development of smart cities and also the focus of the information and communication technology (ICT) industry.
S. M. Wu, Y. C. Wu
doaj   +1 more source

Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments [PDF]

open access: yesEngineering and Technology Journal, 2021
The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased.
Turkan A. Khaleel
doaj   +1 more source

On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems

open access: yesIEEE Access, 2019
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan   +4 more
doaj   +1 more source

Study of Efficient Cloud Storage Architectures for the Security Environment

open access: yesJournal of Kufa for Mathematics and Computer, 2023
Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term "cloud data storage" describes the process of transferring data to an external, up-to-date storage system.
Ayad Hasan Adhab, Naseer Ali Hussien
doaj   +1 more source

Home - About - Disclaimer - Privacy