Results 91 to 100 of about 2,486,163 (328)
Face image de‐identification by feature space adversarial perturbation
Summary Privacy leakage in images attracts increasing concerns these days, as photos uploaded to large social platforms are usually not processed by proper privacy protection mechanisms. Moreover, with advanced artificial intelligence (AI) tools such as deep neural network (DNN), an adversary can detect people's identities and collect other sensitive ...
Hanyu Xue+4 more
wiley +1 more source
Solution for smart government cloud based on cloud security technology
The national Twelfth Five-year Plan have proposed to strengthen information sharing and austerity,government cloud development are planning this plan.
Qianhua ZHANG, Jianwu ZHANG
doaj +2 more sources
Cloud data center is the representative of the new generation of information infrastructure, and its security has become the focus of attention in recent years, which is of great significance.Based on the analysis of the current cloud security situation,
Fan ZHANG+5 more
doaj +2 more sources
This study is based on measured current–voltage curves of a 23 module photovoltaic (PV) string. The results of the study show that, in practice, following the maximum power point (MPP) closest to the nominal MPP voltage instead of the global MPP has no major effect on sizing of energy storage systems for power smoothing of PV strings. Photovoltaic (PV)
Kari Lappalainen
wiley +1 more source
Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of its ...
Jian ZHANG+3 more
doaj +2 more sources
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud [PDF]
The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the cloud providers are responsible for the security of the cloud, there are still many security concerns due to inherently complex model the cloud providers operate on (e.g.,multi-tenancy).
arxiv
Hydrogen is an energy carrier, produced from renewable and nonrenewable resources. It can be stored in a variety of materials and transported to distant locations. This article reviews progress in hydrogen technology by looking at environmental and economic impact, cost analysis, and policy support at government level as way forward for bringing it to ...
Xuexue Pan+5 more
wiley +1 more source
A Survey on Cloud Computing Security [PDF]
Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products.
arxiv
Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun+3 more
doaj +1 more source
A series of stimuli‐responsive molecular photoswitches featuring near‐infrared second aggregation‐induced emission (AIE) and impressive acid/base‐driven switching are constructed and molecular logic gate applications are realized. ABSTRACT Information security protection has become a fundamental issue in the human life, national security, and social ...
Shijie Zhen+6 more
wiley +1 more source