Results 91 to 100 of about 2,486,163 (328)

Face image de‐identification by feature space adversarial perturbation

open access: yesConcurrency and Computation: Practice and Experience, Volume 35, Issue 5, 28 February 2023., 2023
Summary Privacy leakage in images attracts increasing concerns these days, as photos uploaded to large social platforms are usually not processed by proper privacy protection mechanisms. Moreover, with advanced artificial intelligence (AI) tools such as deep neural network (DNN), an adversary can detect people's identities and collect other sensitive ...
Hanyu Xue   +4 more
wiley   +1 more source

Solution for smart government cloud based on cloud security technology

open access: yesDianxin kexue, 2017
The national Twelfth Five-year Plan have proposed to strengthen information sharing and austerity,government cloud development are planning this plan.
Qianhua ZHANG, Jianwu ZHANG
doaj   +2 more sources

Key technologies and implementation methods of endogenous safety and security cloud data center based on mimic architecture

open access: yesDianxin kexue, 2021
Cloud data center is the representative of the new generation of information infrastructure, and its security has become the focus of attention in recent years, which is of great significance.Based on the analysis of the current cloud security situation,
Fan ZHANG   +5 more
doaj   +2 more sources

Effects of the Operating Point of Photovoltaic Strings on Sizing of DC‐ and AC‐Connected Energy Storage Systems for Power Smoothing

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
This study is based on measured current–voltage curves of a 23 module photovoltaic (PV) string. The results of the study show that, in practice, following the maximum power point (MPP) closest to the nominal MPP voltage instead of the global MPP has no major effect on sizing of energy storage systems for power smoothing of PV strings. Photovoltaic (PV)
Kari Lappalainen
wiley   +1 more source

Reference architecture of the telecom network security protection system for cloud network convergence

open access: yesDianxin kexue, 2020
Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of its ...
Jian ZHANG   +3 more
doaj   +2 more sources

Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud [PDF]

open access: yesarXiv, 2020
The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the cloud providers are responsible for the security of the cloud, there are still many security concerns due to inherently complex model the cloud providers operate on (e.g.,multi-tenancy).
arxiv  

Development Status and Future Prospects of Hydrogen Energy Technology: Production, Storage, and Cost Analysis

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
Hydrogen is an energy carrier, produced from renewable and nonrenewable resources. It can be stored in a variety of materials and transported to distant locations. This article reviews progress in hydrogen technology by looking at environmental and economic impact, cost analysis, and policy support at government level as way forward for bringing it to ...
Xuexue Pan   +5 more
wiley   +1 more source

A Survey on Cloud Computing Security [PDF]

open access: yesarXiv, 2012
Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products.
arxiv  

Data Security and Privacy in Cloud Computing

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun   +3 more
doaj   +1 more source

Visible‐Light‐Driven Multifunctional Luminogens With More Than 150 Nm Absorption Band Separation for Dynamic Information Encryption

open access: yesAggregate, EarlyView.
A series of stimuli‐responsive molecular photoswitches featuring near‐infrared second aggregation‐induced emission (AIE) and impressive acid/base‐driven switching are constructed and molecular logic gate applications are realized. ABSTRACT Information security protection has become a fundamental issue in the human life, national security, and social ...
Shijie Zhen   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy