A secured remote patient monitoring framework for IoMT ecosystems. [PDF]
Bhattacharya P+5 more
europepmc +1 more source
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing
Doudou Fall+4 more
openalex +1 more source
Associating cognitive abilities with naturalistic search behavior
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong+2 more
wiley +1 more source
A unified model integrating UTAUT-Behavioural intension and Object-Oriented approaches for sustainable adoption of Cloud-Based collaborative platforms in higher education. [PDF]
Feng K, Haridas D.
europepmc +1 more source
Essential work, invisible workers: The role of digital curation in COVID‐19 Open Science
Abstract In this paper, we examine the role digital curation practices and practitioners played in facilitating open science (OS) initiatives amid the COVID‐19 pandemic. In Summer 2023, we conducted a content analysis of available information regarding 50 OS initiatives that emerged—or substantially shifted their focus—between 2020 and 2022 to address ...
Irene V. Pasquetto+2 more
wiley +1 more source
A machine learning based authentication and intrusion detection scheme for IoT users anonymity preservation in fog environment. [PDF]
Oliullah K+4 more
europepmc +1 more source
A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing
N. Hemalatha+3 more
openalex +1 more source
Abstract Provenance is the story of how something has come to be. In this paper, we provide a systematic literature review to categorize the various notions of provenance in Information Sciences. The goal of this review is to paint a broader picture of the multiple uses of provenance at play and to enhance our understanding of the importance of ...
Rhiannon Bettivia+2 more
wiley +1 more source
Evaluation in Food Security Supervision System Based on Cloud Computing [PDF]
Xuemin Zhang, Wang Gang-Wei, Conghuan Ye
openalex +1 more source
Monocular visual servo control of a quadcopter for crossing windows, doors, and corridors
Abstract This paper proposes a sequential visual servo control scheme for quadcopters, where the main goal is to drive a quadcopter to a desired pose while crossing windows, doors, or corridors using only visual feedback. This control scheme is composed of two stages that act in sequence: the approaching and pose regulation phases.
Carlos A. Toro‐Arcila+2 more
wiley +1 more source