We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things

    Internet of Medical Things (IoMT) technology is widely used in intelligent medical treatment; however, massive mobile data transmission makes the...

    Tong Mu, Qiaochuan Ren, ... **g Song in The Journal of Supercomputing
    Article 19 May 2023
  2. An optimal task scheduling method in IoT-Fog-Cloud network using multi-objective moth-flame algorithm

    Nowadays, cloud and fog computing have been leveraged to enhance Internet of Things (IoT) performance. The outstanding potential of cloud platforms...

    Taybeh Salehnia, Ali Seyfollahi, ... Laith Abualigah in Multimedia Tools and Applications
    Article 26 September 2023
  3. A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm

    The booming growth of cloud manufacturing services provides users with more choices. However, cloud manufacturing service recommendation remains a...

    Qiang Hu, Haoquan Qi, ... Minghua Liu in Journal of Cloud Computing
    Article Open access 03 August 2023
  4. Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach

    Enormous information is an accumulation of vast measures of information that contains copied things gathered from different sources. Distinguishing...

    Mohd Akbar, Irshad Ahmad, ... Praveen Barmavatu in Cluster Computing
    Article 03 November 2023
  5. Pmir: an efficient privacy-preserving medical images search in cloud-assisted scenario

    With the advancement of content-based medical image retrieval (CBMIR) technology which is used as a convenient assistant for medical diagnosis....

    Dong Li, Yanling Wu, ... Jiahui Wu in Neural Computing and Applications
    Article 13 November 2023
  6. AI-enabled legacy data integration with privacy protection: a case study on regional cloud arbitration court

    This paper presents an interesting case study on Legacy Data Integration (LDI for short) for a Regional Cloud Arbitration Court. Due to the...

    Jie Song, Haifei Fu, ... Dongqi Wang in Journal of Cloud Computing
    Article Open access 14 October 2023
  7. An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud

    Develo** a secured and accurate disease diagnosis framework in the healthcare cloud systems are still remains one of the crucial problems in recent...

    S. P. Rathinaeswari, V. Santhi in New Generation Computing
    Article 14 June 2024
  8. A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment

    Privacy and security are the most essential barriers preventing widespread public cloud adaptation. The data that is distributed within the cloud...

    S. Nikkath Bushra, Nalini Subramanian, ... S. Radhika in The Journal of Supercomputing
    Article 16 October 2023
  9. Task scheduling for improved response time of latency sensitive applications in fog integrated cloud environment

    Fog integrated Cloud Computing is a distributed computing paradigm where near-user end devices known as fog nodes cooperate with cloud resources...

    Rishika Mehta, Jyoti Sahni, Kavita Khanna in Multimedia Tools and Applications
    Article 03 March 2023
  10. A two-tier multi-objective service placement in container-based fog-cloud computing platforms

    The utilization of cloud computing in Internet of Things (IoT) applications has become widespread. However, it presents challenges for...

    Javad Dogani, Ali Yazdanpanah, ... Farshad Khunjush in Cluster Computing
    Article 28 November 2023
  11. Blockchain Assisted Cloud Security and Privacy Preservation using Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare Application

    The fundamental issue that happens in cloud computing is considered to be privacy when applying it in Ubiquitous healthcare systems, which rely on...

    K. Raju, N. Ramshankar, ... R. Lavanya in Journal of Grid Computing
    Article 31 July 2023
  12. Cloud Integration and Orchestration

    The objective of this chapter is to introduce the basics of cloud integration and orchestration in multi-cloud environments. Through this chapter,...
    Chellammal Surianarayanan, Pethuru Raj Chelliah in Essentials of Cloud Computing
    Chapter 2023
  13. An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm

    Numerous users are experiencing unsafe communications due to the growth of big network mediums, where no node communication is detected in emergency...

    Tao Hai, **cheng Zhou, ... Ebuka Ibeke in Journal of Cloud Computing
    Article Open access 09 May 2023
  14. E-Health Threat Intelligence Within Cyber-Defence Framework for E-Health Organizations

    In recent years, scholarly work on cybersecurity in smart health has gained substantial attention from both practitioners and scholars. This is...
    Arif Sari, Joshua Sopuru in Smart Systems for E-Health
    Chapter 2021
  15. Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities

    Electronic health records (EHRs) are increasingly employed to maintain, store and share varied types of patient data. The data can also be utilized...

    Tehsin Kanwal, Adeel Anjum, Abid Khan in Cluster Computing
    Article 22 April 2020
  16. Prioritized scheduling technique for healthcare tasks in cloud computing

    The Internet-of-things (IoT) plays a significant role in healthcare monitoring, where the IoT Cloud integration introduces many new opportunities for...

    Eman M. Elshahed, Randa M. Abdelmoneem, ... Shahinaz M. Al-Tabbakh in The Journal of Supercomputing
    Article Open access 04 October 2022
  17. A Modest Approach Toward Cloud Security Hygiene

    Cloud computing offers an on-demand process and computing service without direct active management by the user. It can reach thousands of different...
    Sujal Patel, Rashmi Agarwal, ... Ratan Jyoti in Cyber Security and Digital Forensics
    Conference paper 2024
  18. A cloud weather forecasting service and its relationship with anomaly detection

    The main goal of the anomaly detection analysis is to identify the observations that do not adhere to general patterns considered normal behavior. In...

    Amina Khedimi, Tarek Menouer, ... Mourad Boudhar in Service Oriented Computing and Applications
    Article 29 July 2022
  19. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud

    The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud...

    **ming Li, Hao Wang, ... Qiong Huang in Cybersecurity
    Article Open access 03 March 2024
  20. Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence

    Rapid development of the Internet of Everything (IoE) and cloud services offer a vital role in the growth of smart applications. It provides...

    Tanzila Saba, Amjad Rehman, ... Gwanggil Jeon in Cluster Computing
    Article 04 January 2023
Did you find what you were looking for? Share feedback.