ArtifactOps and ArtifactDL: a methodology and a language for conceptualizing and operationalising different types of pipelines [0.03%]
ArtifactOps和ArtifactDL:用于概念化和操作不同类型流水线的方法学和语言
Raúl Miñón,Josu Diaz-de-Arcaya,Ana I Torre-Bastida et al.
Raúl Miñón et al.
Machine learning is already integrated in diverse domains enhancing their performance and decision support. For laboratories, this approach is normally sufficient. However, in real environments, these models can not be generally deployed is...
Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment [0.03%]
基于动态贝叶斯网络的云环境动态风险评估(CEDRA)方法研究
Dawood Behbehani,Nikos Komninos,Khalid Al-Begain et al.
Dawood Behbehani et al.
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or mone...
Criminal law regulation of cyber fraud crimes-from the perspective of citizens' personal information protection in the era of edge computing [0.03%]
论边缘计算时代的个人信息保护与刑事法治——以电信网络诈骗犯罪的刑法规制为视角
Yu Zhang,Haoyun Dong
Yu Zhang
Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data center design by designing and build...
Data transmission reduction formalization for cloud offloading-based IoT systems [0.03%]
基于云计算卸载的物联网系统中的数据传输缩减形式化方法研究
Aya Elouali,Higinio Mora Mora,Francisco José Mora-Gimeno
Aya Elouali
Computation offloading is the solution for IoT devices of limited resources and high-cost processing requirements. However, the network related issues such as latency and bandwidth consumption need to be considered. Data transmission reduct...
A convolutional neural network based online teaching method using edge-cloud computing platform [0.03%]
基于边缘云计算平台的卷积神经网络在线教学方法
Liu Zhong
Liu Zhong
Teaching has become a complex essential tool for students' abilities, due to their different levels of learning and understanding. In the traditional offline teaching methods, dance teachers lack a target for students 'classroom teaching. F...
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems [0.03%]
一种针对工业物联网系统的安全和隐私的轻量级区块链安全模型
Shitharth Selvarajan,Gautam Srivastava,Alaa O Khadidos et al.
Shitharth Selvarajan et al.
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market pe...
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing [0.03%]
高效的抗解密密钥泄露的撤销属性基加密云文件共享方案
Boxue Huang,Juntao Gao,Xuelian Li
Boxue Huang
Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their competitiveness. Due to the untrustworthy cloud service provider, access control and security issues for s...
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings [0.03%]
基于云计算的智能建筑检测中的一种快速传感器布放方法
Min Yang,Chengmin Ge,Xiaoran Zhao et al.
Min Yang et al.
With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Building Information Modeling) makes ...
Efficiency and optimization of government service resource allocation in a cloud computing environment [0.03%]
云计算环境下政府服务资源分配的效率及优化研究
Ya-Guang Guo,Qian Yin,Yixiong Wang et al.
Ya-Guang Guo et al.
According to the connotation and structure of government service resources, data of government service resources in L city from 2019 to 2021 are used to calculate the efficiency of government service resource allocation in each county and r...
Deep learning approach to security enforcement in cloud workflow orchestration [0.03%]
云工作流编排中安全强制的深度学习方法
Hadeel T El-Kassabi,Mohamed Adel Serhani,Mohammad M Masud et al.
Hadeel T El-Kassabi et al.
Supporting security and data privacy in cloud workflows has attracted significant research attention. For example, private patients' data managed by a workflow deployed on the cloud need to be protected, and communication of such data acros...