Search
Search Results
-
EVACON-Rainsnow Computing: An Amalgamation of Cloud and Its Inherited Computing to Encourage End User for Both Localized and Globalized Remote Computing
The demand for cloud enabled computing is rising which motivated the researchers to develop various computings such as mobile cloud computing, edge...
-
Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach
Nowadays, Multi-access Edge Computing (MEC) and Internet of Flying Things (IoFT) clouds are attracting significant attention from both academic and...
-
Quantum autoencoders for communication-efficient cloud computing
In the model of quantum cloud computing, the server executes a computation on the quantum data provided by the client. In this scenario, it is...
-
Cloud Computing in the Philippines: Adoption, Inhibition, and Trends
Cloud computing (CC) is an emerging technology in the Philippines that allows the use of hardware and software to deliver a service over a network.... -
Task offloading in mmWave based 5G vehicular cloud computing
Vehicular cloud computing (VCC) is a promising paradigm for efficiently utilizing and sharing computing and storage resources on vehicles. However,...
-
Malware Mitigation in Cloud Computing Architecture
Cloud computing is one of the decade’s most trending discussions in information technology. The cloud is not an array of software, hardware or... -
Energy Efficient Resource Allocation and Latency Reduction in Mobile Cloud Computing Environments
Each mobile user in a typical multi-user mobile cloud computing (MCC) system has a number of independent tasks to do. In the modern world of finite...
-
Adaptive Computational Solutions to Energy Efficiency in Cloud Computing Environment Using VM Consolidation
Cloud Computing has emerged as a computing paradigm where services are provided through the internet in recent years. Offering on-demand services has...
-
Governance Model for Cloud Computing Service
Cloud computing services are one of the IT solutions whose popularity has grown across various industries. Big challenges face cloud computing... -
Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment
Artificial neural networks (ANN), fuzzy inference systems, approximate reasoning, and derivative-free optimization approaches like evolutionary...
-
A Heterogeneous Cloud-Edge Collaborative Computing Architecture with Affinity-Based Workflow Scheduling and Resource Allocation for Internet-of-Things Applications
Cloud-edge collaborative computing (CECC) is a critical way to solve the real-time problems in the Medical Internet of Things (MIoT) and Industrial...
-
Spot Pricing in Cloud Computing: A Comprehensive Survey of Mechanisms, Strategies, and Future Directions
Cloud computing (CC) has transformed the way businesses store, process, and access data, and spot pricing has emerged as a key feature of this... -
Enterprise financial risk model based on cloud computing in age of big data
In the era of BD, enterprises often face risks of financial exposure in the development process. If they cannot find and solve risks of financial...
-
Cloud music resources-oriented secure data storage and defense using edge computing
Research motivation: The aim is to study the secure storage of cloud music resources, especially the Secure Data Storage and Defense (SDSD) in the...
-
The analysis of edge computing combined with cloud computing in strategy optimization of music educational resource scheduling
With the rapid development of Internet technology, many platforms provide online music services for users. Faced with a large number of music...
-
Computing paradigms for smart farming in the era of drones: a systematic review
In the current era of agricultural robotization, it is necessary to use a suitable automated data collection system for constant plant, animal, and...
-
An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments
In recent years, the rapid growth of information technology organizations causes ability to meet their demands such as scalability, mobility and...
-
An Enhanced D Level Cut-Off Point-Quantum Secret Sharing Access Structure Scheme Based Efficient Monitoring Key Ciphertext Attributes with Encryption Access Control with Blockchain and Key Mechanism for Security in Cloud Computing
Due to the exponential growth of cloud data and network services, computational resources and cloud data security have one of the most attractive...
-
A Comprehensive Study on Cloud Computing: Architecture, Load Balancing, Task Scheduling and Meta-Heuristic Optimization
Cloud computing (CC) is evolving computing model with a vast array of heterogeneous autonomous systems by modular computational architecture. Load... -
HFTO: Hybrid Firebug Tunicate Optimizer for Fault Tolerance and Dynamic Task Scheduling in Cloud Computing
Task scheduling is an important issue in cloud computing when it comes to achieving multiple goals and satisfying different user needs. The...