![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
770 Result(s)
-
Article
Open AccessMultiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system
Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient informa...
-
Article
Open AccessFrom data to insights: the application and challenges of knowledge graphs in intelligent audit
In recent years, knowledge graph technology has been widely applied in various fields such as intelligent auditing, urban transportation planning, legal research, and financial analysis. In traditional auditin...
-
Article
Open AccessMTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices
The rapid advancement of microservice architecture in the cloud has led to the necessity of effectively detecting, classifying, and diagnosing run failures in microservice applications. Due to the high dynamic...
-
Article
Open AccessAnalysis and prediction of virtual machine boot time on virtualized computing environments
Starting a virtual machine (VM) is a common operation in cloud computing platforms. In order to achieve better management of resource provisioning, a cloud platform needs to accurately estimate the VM boot tim...
-
Article
Open AccessAccurate and fast congestion feedback in MEC-enabled RDMA datacenters
Mobile edge computing (MEC) is a novel computing paradigm that pushes computation and storage resources to the edge of the network. The interconnection of edge servers forms small-scale data centers, enabling ...
-
Article
Open AccessSecurity issues of news data dissemination in internet environment
With the rise of artificial intelligence and the development of social media, people's communication is more convenient and convenient. However, in the Internet environment, the untrue dissemination of news da...
-
Article
Open AccessEdge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks
Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across farmlands necessitates distributed transparent automation. We d...
-
Article
Open AccessTranslating gardens into accessible multisensory tours for blind and partially sighted visitors: an exploratory case study
This paper presents an exploratory case study which illustrates the first stage of our multi-stage methodology for translating gardens into a multisensory and accessible tour for blind and partially sighted (B...
-
Article
Open AccessPrivacy-preserving federated learning based on partial low-quality data
Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated learning provides a method to protect p...
-
Article
Open AccessA secure data interaction method based on edge computing
Deep learning achieves an outstanding success in the edge scene due to the appearance of lightweight neural network. However, a number of works show that these networks are vulnerable for adversarial examples,...
-
Article
Open AccessSRA-E-ABCO: terminal task offloading for cloud-edge-end environments
The rapid development of the Internet technology along with the emergence of intelligent applications has put forward higher requirements for task offloading. In Cloud-Edge-End (CEE) environments, offloading c...
-
Article
Open AccessRNA-RBP interactions recognition using multi-label learning and feature attention allocation
In this study, we present a sophisticated multi-label deep learning framework for the prediction of RNA-RBP (RNA-binding protein) interactions, a critical aspect in understanding RNA functionality modulation a...
-
Article
Open AccessTarget tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing
Automatic target tracking in emerging remote sensing video-generating tools based on microwave imaging technology and radars has been investigated in this paper. A moving target tracking system is proposed to ...
-
Article
Open AccessA secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
With the rapid development of the Internet of Medical Things (IoMT) and the increasing concern for personal health, sharing Electronic Medical Record (EMR) data is widely recognized as a crucial method for enh...
-
Article
Open AccessHarmfulness metrics in digital twins of social network rumors detection in cloud computing environment
Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...
-
Article
Open AccessMSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition
Mangroves are ecosystems that grow in the intertidal areas of coastal zones, playing crucial ecological roles and possessing unique economic and social values. They have garnered significant attention and rese...
-
Article
Open AccessA resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit
Resource allocation in Internet of Vehicles (IoV) edge computing is currently a research hotspot. Existing studies focus on social welfare or revenue maximization. However, there is little research on lowest r...
-
Article
Open AccessEdge-cloud computing cooperation detection of dust concentration for risk warning research
An edge-cloud computing collaborative dust concentration detection architecture is proposed for real-time operation of intelligent algorithms to reduce the warning delay. And, an end-to-end three-channel convo...
-
Article
Open AccessGenetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...
-
Article
Open AccessTimed-release encryption anonymous interaction protocol based on smart contract
Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve the reliability issue of nodes in ex...