Results 61 to 70 of about 51,827 (294)

Solution for smart government cloud based on cloud security technology

open access: yesDianxin kexue, 2017
The national Twelfth Five-year Plan have proposed to strengthen information sharing and austerity,government cloud development are planning this plan.
Qianhua ZHANG, Jianwu ZHANG
doaj   +2 more sources

Rapid Arbitrary‐Shape Microscopy of Unsectioned Tissues for Precise Intraoperative Tumor Margin Assessment

open access: yesAdvanced Science, EarlyView.
This study presents a novel microscopic imaging system capable of rapid, section‐free scanning of irregular tissue surfaces, delivering high sensitivity for detecting cancer cell clusters during intraoperative tumor margin assessment. Abstract Rapid and accurate intraoperative examination of tumor margins is crucial for precise surgical treatment, yet ...
Zhicheng Shao   +17 more
wiley   +1 more source

Analytical hierarchy process model for managing cloud security

open access: gold, 2023
Zainab Batool Rizvi   +2 more
openalex   +2 more sources

Comment on “De Novo Reconstruction of 3D Human Facial Images from DNA Sequence”

open access: yesAdvanced Science, EarlyView.
This comment examines AI‐driven DNA‐based facial reconstruction, focusing on the Difface model. While such technologies promise biomedical and forensic applications, they pose significant ethical, legal, and methodological challenges. We emphasize transparency, benchmarking, and rigorous validation to avoid misinterpretation and misuse.
Jennifer K. Wagner   +3 more
wiley   +1 more source

Reference architecture of the telecom network security protection system for cloud network convergence

open access: yesDianxin kexue, 2020
Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of its ...
Jian ZHANG   +3 more
doaj   +2 more sources

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns [PDF]

open access: bronze, 2013
Christos Kalloniatis   +3 more
openalex   +1 more source

ZIF‐67‐Confined Pd Single‐Atom Catalysts Implanted Into Polydopamine‐Modified Bamboo Microchannels for Robust Continuous‐Flow Hydrogenation

open access: yesAdvanced Science, EarlyView.
The report presents a facile room‐temperature method to stabilize Pd single‐atom catalysts within ZIF‐67 crystals during their formation. Despite an ultralow Pd loading (0.0014 wt%), the catalytic microreactor, featuring atomically dispersed Pd‐N4 sites in ZIF‐67, demonstrates superior robustness and maximized Pd utilization, significantly ...
Sisi Yao   +6 more
wiley   +1 more source

Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus

open access: yesЦифровая трансформация, 2021
The influence of cloud computing on the information security of information resources during their transfer or deployment on cloud platforms is considered. The relevance of the problem of protecting information resources on cloud platforms, including for
V. P. Kochyn, A. V. Shantsou
doaj   +2 more sources

Multilevel classification of security concerns in cloud computing

open access: yesApplied Computing and Informatics, 2017
Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers.
Syed Asad Hussain   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy