Results 91 to 100 of about 429,644 (328)

Lewis Acid–Base Synergistically Enhancing Practical Composite Electrolyte for Fluoride‐ion Batteries at Room Temperature

open access: yesAdvanced Science, EarlyView.
A quasi‐solid‐state fluoride ion battery with various practical qualities is implemented by a salt‐polymer‐ceramic composite electrolyte. β‐PbSnF4, as an active filler, can greatly improve the electrochemical stability and conductivity of the electrolyte, opening up new possibilities for cutting‐edge electrolyte design for fluoride ion batteries ...
Hong Cui   +5 more
wiley   +1 more source

Data Security and Privacy in Cloud Computing

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun   +3 more
doaj   +1 more source

Ensuring data storage security in Cloud Computing [PDF]

open access: green, 2009
Cong Wang   +3 more
openalex   +1 more source

Survey on security issues in file management in cloud computing environment

open access: yes, 2015
Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks.
Gupta, Udit
core  

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, EarlyView.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage

open access: yesCybernetics and Information Technologies, 2019
Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage.
Jegadeeswari S.   +2 more
doaj   +1 more source

A Security Perspective on Adoption and Migration to Mobile Cloud Technology

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification ...
Mohammad Bin Ghudayyer   +2 more
doaj   +1 more source

Artificial Intelligent‐Enhanced Metabolite Profiling for Intraoperative IDH1 Genotyping in Glioma Using an Orthogonally Responsive SERS Probe

open access: yesAdvanced Science, EarlyView.
This study presents a novel approach for intraoperative identification of the IDH1 genotype in glioma patients using a surface‐enhanced Raman scattering (SERS) probe to measure glutathione and hydrogen peroxide. By integrating AI‐driven deep learning algorithms, the method achieves rapid and accurate genotype differentiation, offering the potential to ...
Hang Yin   +14 more
wiley   +1 more source

Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus

open access: yesЦифровая трансформация, 2021
The influence of cloud computing on the information security of information resources during their transfer or deployment on cloud platforms is considered. The relevance of the problem of protecting information resources on cloud platforms, including for
V. P. Kochyn, A. V. Shantsou
doaj   +2 more sources

Multilevel classification of security concerns in cloud computing

open access: yesApplied Computing and Informatics, 2017
Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers.
Syed Asad Hussain   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy