Cloud computing proved itself a powerful and popular platform for providing computing services. It offers on-demand services to users with highly efficient resources over the internet. With the exponential increase in...
详细信息
We present the non-FIFO time-dependent graph model with REalistic vehicle eXchange times (REX) for schedule-based multimodal public transport, along with a novel query algorithm called TRIP-based LAbel-correction prop...
详细信息
Developing an effective and accurate Automated Essay Scoring (AES) system for Indonesian essays involves overcoming several challenges, including limited datasets and issues related to grading efficiency and feedback ...
详细信息
This paper introduces XMeta-OS, a meta-operating system specially designed with Linux as its foundation to unify and optimize resource management for the distributed edge-cloud when dynamic use of GPU resources is pos...
详细信息
Plant disease classification using machine learning in a real agricultural field environment is a difficult task. Often, an automated plant disease diagnosis method might fail to capture and interpret discriminatory i...
详细信息
Secure Multiparty Computation (SMC) facilitates secure collaboration among multiple parties while safeguarding the privacy of their confidential data. This paper introduces a two-party quantum SMC protocol designed fo...
详细信息
Predicting electricity consumption for buildings has been a concern lately, as it accounts for 39% of total electricity consumption. One of the buildings that uses a lot of electricity is the campus building. Various ...
详细信息
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a...
详细信息
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server ***,the attackers have designed even better mechanisms to break these security *** cryptography is the best data protection algorithm that exchanges data between authentic *** this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure ***,the XOR function will be applied to plain text,and then salt technique will be ***,a reversing mechanism will be implemented on that data to provide more data *** decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be *** the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms.
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest i...
详细信息
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest issues that *** types of malware are wreaking havoc on the *** on the cloud server are happening from both internal and external *** paper has developed a tool to prevent the cloud server from spamming *** an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)*** will block those IP addresses that the attacker will use and prevent spamming ***,the KNN classifiers will determine which area the spammer belongs *** the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results.
E-Learning has emerged as the most effective way of getting information in a range of sectors in the contemporary age. The utilisation of electronic content to provide education and development is referred to as e-lea...
详细信息
暂无评论