Results 61 to 70 of about 241,235 (288)
Overview and Features of Generic Security Protocols for Cloud Computing Environment [PDF]
- In this research paper we are describing the several generic protocols use in Cloud computing environment. Now-a-days Cloud Computing has become very important in large and small enterprise so security has also become very important for Cloud Computing.
Husain, R. (Rashid)
core
Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang +5 more
wiley +1 more source
A cloud computing separation model based on information flow
Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users.
Ma Wei, Li Huanqin, Witarsyah Deden
doaj +1 more source
Stenographic Approaches for Enhancing Data Security in Cloud Computing [PDF]
Steganography has become a well-known method for concealing data so that unauthorized users cannot identify it among other data. With the growing popularity of cloud computing, security of cloud databases has become a major problem, and the necessity to ...
Rajguru Sankalp Sudarsan +3 more
doaj +1 more source
Encryption Based Access Control Model in Cloud: a Survey [PDF]
Cloud computing is known as “Utility”. Cloud Computing enabling users to remotely store their data in a server and provide services on-demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have
Aluvalu, R. (Rajanikanth) +1 more
core
Gut microbiota and biomarkers are linked to diseases like neurological disorders and metabolic syndromes. Ingestible capsule robots enable minimally invasive gut health assessment. This article proposes a promising direction for the advancement of capsule robots, integrating in situ sampling, real‐time diagnostics, and personalized therapy.
Xizong Chen +3 more
wiley +1 more source
Security and Privacy in Fog Computing: Challenges
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of
Mithun Mukherjee +6 more
doaj +1 more source
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
Network Security Threats and Countermeasures on Cloud Computing
Cloud computing is a new concept of providing virtualized resources to the consumers.Consumers can request a cloud for services,applications,solution and can store large amount of data in different locations.But with the growing popularity of cloud ...
Ping Yao, Hong Li
doaj +2 more sources
Proposal for a Security Management in Cloud Computing for Health Care
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in ...
Knut Haufe, Srdan Dzombeta, Knud Brandis
doaj +1 more source

