Results 71 to 80 of about 241,235 (288)
Security Enhancement and PaaS platform Authentication in Cloud Computing based On SBA [PDF]
Ramdas Vankdothu, Mohd Abdul Hameed
openalex +1 more source
Embedded flexible sensing technologies advance underwater soft robotics, yet most systems still suffer from hysteresis and limited perceptiveness. Instead, vision‐based tactile sensors provide reliable and rapid feedback essential for complex underwater tasks.
Qiyi Zhang +5 more
wiley +1 more source
Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun +3 more
doaj +1 more source
Chinese Wall Security Policy [PDF]
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core +1 more source
A miniaturized soft optical sensor that uses thin film color tuning enables real‐time 3D shape‐sensing from a single red–green–blue (RGB) signal. When integrated into a soft robot, it enables closed‐loop control and autonomous navigation in a phantom lung environment without the need for onboard electronics, achieving sub‐millimeter accuracy through ...
Frank Juliá Wise +6 more
wiley +1 more source
Pak Biawak, a necrobot, embodies an unusual fusion of biology and robotics. Designed to repurpose natural structures after death, it challenges conventional boundaries between nature and engineering. Its movements are precise yet unsettling, raising questions about sustainability, ethics, and the untapped potential of biointegrated machines.
Leo Foulds +2 more
wiley +1 more source
Security research of Internet of Things based on cloud computing
The paper introduced concepts of cloud computing and Internet of Things, analyzed inevitability and combination mode of the cloud computing and the Internet of Things.
NIE Xiao
doaj
Icebergs in the Clouds: the Other Risks of Cloud Computing [PDF]
Cloud computing is appealing from management and efficiency perspectives, but brings risks both known and unknown. Well-known and hotly-debated information security risks, due to software vulnerabilities, insider attacks, and side-channels for example ...
Ford, Bryan
core +1 more source
Hyperelastic Starch Hydrogel Configures Edible and Biodegradable All‐Components for Soft Robots
Hyperelastic starch hydrogel is tailored via a phase separation strategy of solvent‐antisolvent co‐modulation. The mechanical performance of starch hydrogel is widely tuned with maximum strains: 194.4–361.4%; maximum tensile stresses: 34–192 kPa; and Young's moduli: 36.0–205.8 kPa. Notably, the hydrogel achieves complete soil degradation within 24 days
Siyu Yao +7 more
wiley +1 more source
Analysis of Cloud Computing Information Security Strategy in Biznet Networks [PDF]
Information security on cloud computing requires goodplanning and understanding of the risks, threats and vulnerabilities ofdata or information that is managed in a cloud computing environment.Measurement of information security in cloud computing is no ...
Sutrisno, H. (Heri)
core

