Results 91 to 100 of about 487,200 (366)
Survey on Mobile Cloud Computing
The paper explores how cloud computing offers the capacity to improve computing features and application services while addressing its transformative impact on mobile device systems.
Jain R
semanticscholar +1 more source
Review in Cloud Computing Security
The cloud Computing provides an undemanding and Non ineffectual Solution for Daily Computing. The prevalent Problem Associated with Cloud Computing is the Cloud security and the appropriate Implementation of Cloud over the Network.
Anchal Pokharana, S. Meena
semanticscholar +1 more source
Advanced Time Series Data Processing Using Various Memristor‐Integrated Devices
Memristor‐based temporal kernels (TKs) offer compact, energy‐efficient solutions for real‐time time‐series processing in edge devices. This perspective outlines key TK architectures, compares them with conventional reservoir computing, and highlights their application in tasks such as health monitoring, authentication, and anomaly detection ...
Sung Keun Shim+9 more
wiley +1 more source
Network Security Threats and Countermeasures on Cloud Computing
Cloud computing is a new concept of providing virtualized resources to the consumers.Consumers can request a cloud for services,applications,solution and can store large amount of data in different locations.But with the growing popularity of cloud ...
Ping Yao, Hong Li
doaj +2 more sources
Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun+3 more
doaj +1 more source
Halogen Bonding‐Enabled Stabilization of Copper(I) Cluster Scintillators in Aqueous Environments
A new class of halogen bonding‐strengthened copper(I) cluster‐based X‐ray scintillators is developed, with higher lattice symmetry, reduced trap density, and enhanced stability in polar chemical environments surpassing the performance of halogen‐free counterparts and other conventional scintillators. Abstract Scintillators are essential in applications,
Chang Gu+3 more
wiley +1 more source
Vision‐Assisted Avocado Harvesting with Aerial Bimanual Manipulation
This work outlines the design and implementation of a bimanual aerial robot that employs visual perception and learning to detect, reach, and harvest avocados. A new gripper and fixer arm assembly is used to harvest avocados, while visual perception enables the detection of avocados and estimation of their position and orientation for determining ...
Zhichao Liu+3 more
wiley +1 more source
Proposal for a Security Management in Cloud Computing for Health Care
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in ...
Knut Haufe, Srdan Dzombeta, Knud Brandis
doaj +1 more source
Cloud computing and cloud security in China [PDF]
We live in the data age. It’s not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the “digital universe” at 0.18 zettabytes in 2006 and is forecasting a tenfold growth by 2011 to 1.8 zettabytes. A zettabyte is 1021 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion ...
Cuenyun Jiang, Shaohe Zhang, Ruxin Wang
openaire +2 more sources
In‐Hand Singulation, Scooping, and Cable Untangling with a 5‐Dof Tactile‐Reactive Gripper
This article presents a two‐fingered gripper with five degrees of freedom and a vision‐based tactile sensor for dexterous in‐hand manipulation. It performs complex tasks such as object singulation within granular media, scooping and precise card insertion, and cable untangling.
Yuhao Zhou+3 more
wiley +1 more source