The secure storage and preservation of data is a very important issue. Different methods and studies have been presented for the secure storage of data. One of these methods is Blockchain based approaches. Blockchain ...
详细信息
This study pioneers the utilization of the YHGSM dataset to conduct an in-depth analysis of the ramifications of the stratosphere's sudden warming (SSW) event in 2021 on local atmospheric circulation, temperature,...
详细信息
Recently, there has been a boom in imaginative medical services technologies that have enhanced the delivery of medical care data. Human-to-human and gadget-to-gadget networks are crucial in people’s lives and functi...
详细信息
This paper focuses on the application of Deep Learning technology to improve the performance of V2X (Vehicle-to-Everything) communication systems. Of the Multiple-input Multiple-output Orthogonal Frequency Division Mu...
详细信息
A computing system that is based on the internet and offers users all resources as on-demand services. Servers, storage, databases, software, and networking are among these on-demand services. Usually, the user must p...
详细信息
Percepti-Alarm is a groundbreaking endeavor aimed at revolutionizing the lives of the visually impaired. It introduces a transformative solution by integrating a high-tech camera onto the conventional white cane, offe...
详细信息
This research study proposes a novel Smart Irrigation System that integrates Microbial Fuel Cells (MFCs) with IoT and Machine Learning for sustainable agricultural practices. The system uses MFCs to generate electrici...
详细信息
With the rapid development and widespread application of cloud computing, container technology has become a hot topic for enterprises and research institutions in recent years. This article proposes an automated conta...
详细信息
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal...
详细信息
Today, remote computational activities must be secure and private. Trusted Execution Environments (TEEs) enable hardware-based data and operation isolation. This method may expose users to side-channel attacks and sof...
详细信息
暂无评论