Results 101 to 110 of about 487,200 (366)

Security research of Internet of Things based on cloud computing

open access: yesGong-kuang zidonghua, 2013
The paper introduced concepts of cloud computing and Internet of Things, analyzed inevitability and combination mode of the cloud computing and the Internet of Things.
NIE Xiao
doaj  

Overview and Features of Generic Security Protocols for Cloud Computing Environment [PDF]

open access: yes, 2016
- In this research paper we are describing the several generic protocols use in Cloud computing environment. Now-a-days Cloud Computing has become very important in large and small enterprise so security has also become very important for Cloud Computing.
Husain, R. (Rashid)
core  

Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics

open access: yesAdvanced Robotics Research, EarlyView.
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang   +5 more
wiley   +1 more source

Improve Cloud Computing Security Using RSA Encryption WithFermat's Little Theorem

open access: yes, 2014
Cloud computing (CC) is new technology for hosting and delivering services over the Internet. It moves computing and data away from desktop and portable PCs into large data centers.CC is a Internet based computing, the entire data reside over a set of ...
Balkees Mohamed Shereek
semanticscholar   +1 more source

Multitasking Smart Intestinal Capsule Robot: A Cutting‐Edge Platform for Sampling, Diagnosis, and Therapy

open access: yesAdvanced Robotics Research, EarlyView.
Gut microbiota and biomarkers are linked to diseases like neurological disorders and metabolic syndromes. Ingestible capsule robots enable minimally invasive gut health assessment. This article proposes a promising direction for the advancement of capsule robots, integrating in situ sampling, real‐time diagnostics, and personalized therapy.
Xizong Chen   +3 more
wiley   +1 more source

De Novo Reconstruction of 3D Human Facial Images from DNA Sequence

open access: yesAdvanced Science, EarlyView.
This study introduces Difface, a novel deep‐learning model for reconstructing 3D facial images only from DNA data. By integrating transformer networks, spiral convolutions, and a diffusion model, Difface directly aligns high‐dimensional SNP data with 3D facial structures.
Mingqi Jiao   +11 more
wiley   +1 more source

Single‐Cell and Spatial Transcriptomic Profiling of Penile Squamous Cell Carcinoma Reveals Dynamics of Tumor Differentiation and Immune Microenvironment

open access: yesAdvanced Science, EarlyView.
This study uses single‐nucleus RNA sequencing and spatial transcriptomics to investigate penile squamous cell carcinoma (PSCC). It reveals that PSCC tumor cells mimic normal penile epithelium differentiation, independent of HPV status. The Tum_1 subtype shows basal stem‐like characteristics and promotes invasiveness. HPV‐positive basal stem‐like tumors
Hongjian Song   +37 more
wiley   +1 more source

SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH

open access: yesTASK Quarterly, 2013
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj  

TCMD: A High‐Throughput and Rapid Method for Screening Antimicrobial Ingredients from Renewable Bio‐Based Resources

open access: yesAdvanced Science, EarlyView.
This study develops a strategy to screen the active compounds from bio‐mixtures via combining transcriptomic profiling and molecular docking. The proposed method demonstrates 100% correction in three different biobased mixtures and is 3–20 times faster than traditional approaches.
Yongdong Xu   +8 more
wiley   +1 more source

An insider user authentication method based on improved temporal convolutional network

open access: yesHigh-Confidence Computing, 2023
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao   +4 more
doaj  

Home - About - Disclaimer - Privacy