Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Green and climate-smart mining: A framework to analyze open-pit mines for cleaner mineral production
Green and climate-smart mining (GCSM) can transform the traditional mining system into a
more sustainable pattern by conserving the environment, reducing the ecological footprint …
more sustainable pattern by conserving the environment, reducing the ecological footprint …
Privacy preservation models for third-party auditor over cloud computing: A survey
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
Strategic Approaches in Network Communication and Information Security Risk Assessment
Risk assessment is a critical sub-process in information security risk management (ISRM)
that is used to identify an organization's vulnerabilities and threats as well as evaluate …
that is used to identify an organization's vulnerabilities and threats as well as evaluate …
A hybrid decision model and case study for comprehensive evaluation of green mine construction level
The mining industry around the world is plagued by environmental concerns associated with
the exploitation and utilization of mineral resources, as well as the economic issues caused …
the exploitation and utilization of mineral resources, as well as the economic issues caused …
Energy-efficient and secure mobile fog-based cloud for the Internet of Things
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is
highly suitable for obtaining virtualized data without additional waiting time. However, the …
highly suitable for obtaining virtualized data without additional waiting time. However, the …
A blockchain and smart contract-based data provenance collection and storing in cloud environment
Data uploading needs security and privacy in the cloud. But there are some problems like
centralized provenance data (PD) collection, storage, lack of security, integrity, and more …
centralized provenance data (PD) collection, storage, lack of security, integrity, and more …
[HTML][HTML] Big data handling approach for unauthorized cloud computing access
Nowadays, cloud computing is one of the important and rapidly growing services; its
capabilities and applications have been extended to various areas of life. Cloud computing …
capabilities and applications have been extended to various areas of life. Cloud computing …
Environmental risk assessment of subway station construction to achieve sustainability using the intuitionistic fuzzy analytic hierarchy process and set pair analysis
J Wang, S Liu, Y Song, J Wang… - Discrete Dynamics in …, 2021 - Wiley Online Library
Environmental risks have a significant impact on the sustainability of subway station
construction projects. This paper proposes an environmental risk assessment model based …
construction projects. This paper proposes an environmental risk assessment model based …
An Automatic Artificial Intelligence System for Malware Detection
One of the major issues in computer system security is detecting malware threats before they
spread. The continuous development of malware makes it challenging to detect malware …
spread. The continuous development of malware makes it challenging to detect malware …
Nash equilibrium and social optimization in cloud service systems with diverse users
L Fu, S ** - Cluster Computing, 2021 - Springer
Cloud service systems typically rank the tasks from diverse users according to their
privileges. Besides providing high performance service to membership-based users …
privileges. Besides providing high performance service to membership-based users …