Edge computing is the key technology for 5G to achieve high bandwidth and low latency. It has been widely applied in vertical industries. However, with the fast development of various intelligent application services,...
详细信息
Stress Detection employing physiological data desires to grasp and apprehend physical and physiological signals. Skin conductance, three axes acceleration and temperature data are gathered by the system using various ...
详细信息
The growing need to solve large-scale computing problems has spurred the creation of multi cloud infrastructures in recent years. The complexity of trust-related problems has increased in this field, calling for creat...
详细信息
This work presents an innovative algorithm demonstrating the effectiveness of zero-knowledge proofs (ZKPs) in network security. By integrating Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) for key...
详细信息
As learning institutions increasingly adopt cloud-based blended learning models of integrating technology into traditional pedagogical approaches brings forth a myriad of challenges in ensuring quality assurance. This...
详细信息
When the smart city communication data is safely shared, the sharing process is mainly realized through single authorization attribute base encryption, and the key and ciphertext cannot be updated in time, which makes...
详细信息
With the increase in the number of smart devices, the data generated is growing exponentially, leading to a large amount of data flowing to the cloud and causing congestion in core network communication. Edge computin...
详细信息
This research paper explores the field of cloudcomputing optimisation, with the goal of tackling the two-fold difficulty of efficiently allocating resources and effectively managing costs. The primary objective is to...
详细信息
A paradigm known as 'Fog computing' makes use of the benefits that come from using both cloud and edge devices to help contemporary computer systems by lowering latency, enhancing mobility, offering quality se...
详细信息
As cloud environments become widespread, cybersecurity has emerged as a top priority across areas such as networks, communication, data privacy, response times, and availability. Various sectors, including industries,...
详细信息
暂无评论