Results 101 to 110 of about 487,200 (366)
Security research of Internet of Things based on cloud computing
The paper introduced concepts of cloud computing and Internet of Things, analyzed inevitability and combination mode of the cloud computing and the Internet of Things.
NIE Xiao
doaj
Overview and Features of Generic Security Protocols for Cloud Computing Environment [PDF]
- In this research paper we are describing the several generic protocols use in Cloud computing environment. Now-a-days Cloud Computing has become very important in large and small enterprise so security has also become very important for Cloud Computing.
Husain, R. (Rashid)
core
Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang+5 more
wiley +1 more source
Improve Cloud Computing Security Using RSA Encryption WithFermat's Little Theorem
Cloud computing (CC) is new technology for hosting and delivering services over the Internet. It moves computing and data away from desktop and portable PCs into large data centers.CC is a Internet based computing, the entire data reside over a set of ...
Balkees Mohamed Shereek
semanticscholar +1 more source
Gut microbiota and biomarkers are linked to diseases like neurological disorders and metabolic syndromes. Ingestible capsule robots enable minimally invasive gut health assessment. This article proposes a promising direction for the advancement of capsule robots, integrating in situ sampling, real‐time diagnostics, and personalized therapy.
Xizong Chen+3 more
wiley +1 more source
De Novo Reconstruction of 3D Human Facial Images from DNA Sequence
This study introduces Difface, a novel deep‐learning model for reconstructing 3D facial images only from DNA data. By integrating transformer networks, spiral convolutions, and a diffusion model, Difface directly aligns high‐dimensional SNP data with 3D facial structures.
Mingqi Jiao+11 more
wiley +1 more source
This study uses single‐nucleus RNA sequencing and spatial transcriptomics to investigate penile squamous cell carcinoma (PSCC). It reveals that PSCC tumor cells mimic normal penile epithelium differentiation, independent of HPV status. The Tum_1 subtype shows basal stem‐like characteristics and promotes invasiveness. HPV‐positive basal stem‐like tumors
Hongjian Song+37 more
wiley +1 more source
SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj
This study develops a strategy to screen the active compounds from bio‐mixtures via combining transcriptomic profiling and molecular docking. The proposed method demonstrates 100% correction in three different biobased mixtures and is 3–20 times faster than traditional approaches.
Yongdong Xu+8 more
wiley +1 more source
An insider user authentication method based on improved temporal convolutional network
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao+4 more
doaj