Results 121 to 130 of about 24,383,852 (329)

Efficient data possession–checking protocol with deduplication in cloud

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data.
Jinxia Wei   +4 more
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Hybrid deduplication system with content-based cache for cloud environment

open access: yesJournal of King Saud University: Computer and Information Sciences
Primary storage deduplication systems are performance sensitive. Their performance depends upon two factors — metadata access for duplicate detection and strategy for elimination of duplicate data.
Amdewar Godavari   +2 more
doaj   +1 more source

Preserving evidence integrity in full file system extractions: Assessing hash inconsistencies and potential solutions

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley   +1 more source

Refining the Vertebrate Mitochondrial 12S rRNA Secondary Structure by Comparative Analysis

open access: yesIntegrative Zoology, EarlyView.
This flowchart outlines the comprehensive workflow of the study, integrating diverse bioinformatics tools (e.g., NCBI2GO, SSU‐align, bpRNA) and their sequential interactions. Key steps, such as data preprocessing, structural prediction, and evolutionary analysis, are depicted with their respective outputs (e.g., standardized records, consensus ...
Fengxia Li   +6 more
wiley   +1 more source

Deduplication-Aware Healthcare Data Distribution in IoMT

open access: yesMathematics
As medical sensors undergo expeditious advancements, there is rising interest in the realm of healthcare applications within the Internet of Medical Things (IoMT) because of its broad applicability in monitoring the health of patients.
Saleh M. Altowaijri
doaj   +1 more source

Cannabis dispensary exposure and smoked, vaped and edible cannabis use among young adults: Comparison of web‐scraped and government‐maintained registries

open access: yesAddiction, EarlyView.
Abstract Background and aims The impact of exposure to cannabis dispensaries on young adult cannabis use may depend on how exposures and outcomes are defined. We estimated associations of dispensary exposure with young adult cannabis use across: (a) a government‐maintained licensed dispensaries registry versus a web‐scraped list of licensed and ...
Alyssa F. Harlow   +9 more
wiley   +1 more source

Can universal cervical length screening with vaginal progesterone for a short cervix reduce preterm birth? A systematic review and meta‐analyses

open access: yesActa Obstetricia et Gynecologica Scandinavica, EarlyView.
Preterm birth is associated with substantial neonatal morbidity and mortality. We evaluated whether universal cervical length screening with ultrasound, followed by progesterone therapy for women with a short cervix, has the potential to reduce the incidence of preterm birth.
Mira Zethelius   +11 more
wiley   +1 more source

Data access control policy of encrypted deduplication system

open access: yesTongxin xuebao, 2020
To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was ...
Chunfu JIA, Guanxiong HA, Ruiqi LI
doaj   +2 more sources

Home - About - Disclaimer - Privacy