This paper deeply discusses the storage and query optimization algorithm of distributed database for big data. Firstly, the importance of distributed database storage optimization is analyzed, and key technologies suc...
详细信息
Due to the rapid growth of technology usage of internet of Things devices has revolutionized in multiple domains and areas, but still there are few challenges to address like security and performance issues. Most of t...
详细信息
With the rapid development of the internet, network malware such as viruses, worms, and trojans has become increasingly complex and covert, posing significant threats to information security for individuals, businesse...
详细信息
In this paper, evolutionary game theory is used to study the boundary conditions of different stable states of knowledge alliances in distributedcomputing environments and the specific factors that influence the evol...
详细信息
Edge computing, a distributedcomputing concept, brings data processing and storage closer to endpoints or edge devices. Caching methods are crucial in edge computing environments for optimizing performance and minimi...
详细信息
internet of Things (IoT) technologies have become an inevitable part of our lives with many innovations and conveniences in many fields such as education, healthcare, social life and security. While healthcare network...
详细信息
Globalization has posed many threats to managing supply chains and logistic networks. Blockchain technology and internet of Things have outlined budding for answering global Supply Chain Management (SCM) issues. It is...
详细信息
The electric power sector is making significant changes to the power grid in order to make the power supply more stable, meet rising demand, and optimize the use of distributed generators. The internet of Things (IoT)...
详细信息
Deep learning methods based on CNNs and Transformers have attained notable achievements in image restoration (IR). However, CNNs have limited receptive fields, which can be a constraint in IR tasks for specific input ...
详细信息
Big data analytics delves into these immense datasets to reveal hidden patterns and correlations, yet its pervasive use raises substantial security and privacy concerns. This article centers on the specific issues con...
详细信息
暂无评论