[HTML][HTML] Edge-cloud synergy for AI-enhanced sensor network data: A real-time predictive maintenance framework
K Sathupadi, S Achar, SV Bhaskaran, N Faruqui… - Sensors, 2024 - mdpi.com
Sensor networks generate vast amounts of data in real-time, which challenges existing
predictive maintenance frameworks due to high latency, energy consumption, and …
predictive maintenance frameworks due to high latency, energy consumption, and …
[HTML][HTML] Secure identity access and data transmission scheme of cloud-assisted intelligent gymnasium
L Jiang, C Mu - Alexandria Engineering Journal, 2025 - Elsevier
Addressing the privacy security challenges in identity access and data transmission for
cloud-assisted intelligent gymnasium, this paper designs a secure identity access and data …
cloud-assisted intelligent gymnasium, this paper designs a secure identity access and data …
Data-Driven Healthcare: The Role of Computational Methods in Medical Innovation.
H Ponnarengan, S Rajendran… - … in Engineering & …, 2025 - search.ebscohost.com
The purpose of this review is to explore the intersection of computational engineering and
biomedical science, highlighting the transformative potential this convergence holds for …
biomedical science, highlighting the transformative potential this convergence holds for …
Protection Issues and Challenges within the Cloud: A Survey
M Latif, B Mehmood, N Khalid, S Ahmed… - VFAST Transactions on …, 2024 - vfast.org
A vast range of computing services are accessible over the Internet utilizing the cloud
network. In recent years the cloud storage sector and several others have integrated and …
network. In recent years the cloud storage sector and several others have integrated and …
Secret Sharing as a Defense Mechanism for Ransomware in Cloud Storage Systems.
Ransomware is a prevalent and highly destructive type of malware that has increasingly
targeted cloud storage systems, leading to significant data loss and financial damage …
targeted cloud storage systems, leading to significant data loss and financial damage …
A Modular Architecture and a Cost-Model to Estimate the Overhead of Implementing Confidentiality in Cloud Computing Environments
Cloud computing has become increasingly popular among organizations. As a result,
security has become a major concern in the adoption of cloud computing environments. To …
security has become a major concern in the adoption of cloud computing environments. To …
[PDF][PDF] The Impact of Parental Involvement on Grade 12 Students' Academic Performance
J Owen - 2024 - academia.edu
This study explores the impact of parental involvement on the academic performance of
Grade 12 students, emphasizing the critical role of family engagement in educational …
Grade 12 students, emphasizing the critical role of family engagement in educational …
Analisis Deteksi Penyusup pada Layanan Open Journal System Menggunakan Metode Network Forensic Development Life Cycle
H Wintolo, I Riadi, A Yudhana - SKANIKA: Sistem Komputer …, 2025 - jom.fti.budiluhur.ac.id
Penelitian ini bertujuan mendeteksi penyusup pada komputer server yang digunakan untuk
layanan Open Journal System (OJS). Komputer server ini terhubung ke jaringan internet …
layanan Open Journal System (OJS). Komputer server ini terhubung ke jaringan internet …
[PDF][PDF] Comparative Study of Teaching Methods in Russian and English Language Instruction.
J Owen - 2024 - easychair.org
This study explores the comparative effectiveness of teaching methods in Russian and
English language instruction, focusing on pedagogical approaches in both linguistic …
English language instruction, focusing on pedagogical approaches in both linguistic …