Results 41 to 50 of about 7,587 (272)
A Review on Secure Data Deduplication: Cloud Storage Security Issue
Cloud storage service providers caters to the need of organizations and individuals by allowing them to store, transfer and backup their ever-increasing amount of data at low cost along with providing access to the other resources of cloud. For providing
Priteshkumar Prajapati, Parth Shah
doaj +1 more source
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.
C Wang +11 more
core +1 more source
3D Printing of Soft Robotic Systems: Advances in Fabrication Strategies and Future Trends
Collectively, this review systematically examines 3D‐printed soft robotics, encompassing material selections, function integration, and manufacturing methodologies. Meanwhile, fabrication strategies are analyzed in order of increasing complexity, highlighting persistent challenges with proposed solutions.
Changjiang Liu +5 more
wiley +1 more source
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG +3 more
doaj +2 more sources
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their sensing capabilities.
De Cristofaro, Emiliano +1 more
core +1 more source
ABSTRACT Blood‐based liquid biopsies hold transformative potential for non‐invasive cancer management, but current approaches relying on rare circulating tumor components limit their broad clinical utility. Platelets, abundant in blood and mediating diverse cancer‐associated responses, represent a compelling yet largely unexplored alternative.
Yan Ma +28 more
wiley +1 more source
Abstract Nucleus outgrower schemes are contractual arrangements where well‐resourced large‐scale farmers (nucleus farmers) are empowered by development support agencies to take charge of smallholder farmers, by providing them with market access and the necessary training on agronomic practices and farm inputs for production.
Dominic Tasila Konja, Awudu Abdulai
wiley +1 more source
This study applies QSAR‐based new approach methodologies to 90 synthetic tattoo and permanent makeup pigments, revealing systemic links between their physicochemical properties and absorption, distribution, metabolism, and elimination profiles. The correlation‐driven analysis using SwissADME, ChemBCPP, and principal component analysis uncovers insights
Girija Bansod +10 more
wiley +1 more source
Multi-replica provable data possession scheme supporting data dynamic updating
Considering the application demand of multiple replicas data security and data dynamic update,a multi-replica provable data possession scheme was proposed to supporting data dynamic updating.The original data file can be dynamically updated using dynamic
Long CHEN, Yu-zhu LUO
doaj +2 more sources
Efficient and Reliable Hybrid Cloud Architechture for Big Data
The objective of our paper is to propose a Cloud computing framework which is feasible and necessary for handling huge data. In our prototype system we considered national ID database structure of Bangladesh which is prepared by election commission of ...
Ahmed, Nova, Tarannum, Narzu
core +1 more source

