Results 121 to 130 of about 24,383,852 (329)
Efficient data possession–checking protocol with deduplication in cloud
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data.
Jinxia Wei +4 more
doaj +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Hybrid deduplication system with content-based cache for cloud environment
Primary storage deduplication systems are performance sensitive. Their performance depends upon two factors — metadata access for duplicate detection and strategy for elimination of duplicate data.
Amdewar Godavari +2 more
doaj +1 more source
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley +1 more source
Refining the Vertebrate Mitochondrial 12S rRNA Secondary Structure by Comparative Analysis
This flowchart outlines the comprehensive workflow of the study, integrating diverse bioinformatics tools (e.g., NCBI2GO, SSU‐align, bpRNA) and their sequential interactions. Key steps, such as data preprocessing, structural prediction, and evolutionary analysis, are depicted with their respective outputs (e.g., standardized records, consensus ...
Fengxia Li +6 more
wiley +1 more source
Deduplication-Aware Healthcare Data Distribution in IoMT
As medical sensors undergo expeditious advancements, there is rising interest in the realm of healthcare applications within the Internet of Medical Things (IoMT) because of its broad applicability in monitoring the health of patients.
Saleh M. Altowaijri
doaj +1 more source
Abstract Background and aims The impact of exposure to cannabis dispensaries on young adult cannabis use may depend on how exposures and outcomes are defined. We estimated associations of dispensary exposure with young adult cannabis use across: (a) a government‐maintained licensed dispensaries registry versus a web‐scraped list of licensed and ...
Alyssa F. Harlow +9 more
wiley +1 more source
Preterm birth is associated with substantial neonatal morbidity and mortality. We evaluated whether universal cervical length screening with ultrasound, followed by progesterone therapy for women with a short cervix, has the potential to reduce the incidence of preterm birth.
Mira Zethelius +11 more
wiley +1 more source
Data access control policy of encrypted deduplication system
To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was ...
Chunfu JIA, Guanxiong HA, Ruiqi LI
doaj +2 more sources

