Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
A survey on resiliency techniques in cloud computing infrastructures and applications
C Colman-Meixner, C Develder… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Today's businesses increasingly rely on cloud computing, which brings both great
opportunities and challenges. One of the critical challenges is resiliency: disruptions due to …
opportunities and challenges. One of the critical challenges is resiliency: disruptions due to …
An efficient radix trie‐based semantic visual indexing model for large‐scale image retrieval in cloud environment
In recent years, massive growth in the number of images on the web has raised the
requirement of develo** an effective indexing model to search digital images from a large …
requirement of develo** an effective indexing model to search digital images from a large …
Is China's development conforms to the Environmental Kuznets Curve hypothesis and the pollution haven hypothesis?
J Liu, J Qu, K Zhao - Journal of Cleaner Production, 2019 - Elsevier
Abstract The Environmental Kuznets Curve and Pollution Haven hypotheses have been
verified by many studies. However, there is still no consensus on whether China's situation …
verified by many studies. However, there is still no consensus on whether China's situation …
Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services
The rapid rising of artificial intelligence (AI) and Internet of Things technologies leads to the
accumulation of abundant communication data without being processed on time, which …
accumulation of abundant communication data without being processed on time, which …
Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm
Cloud computing technology provides shared computing which can be accessed over the
Internet. When cloud data centers are flooded by end-users, how to efficiently manage …
Internet. When cloud data centers are flooded by end-users, how to efficiently manage …
Auto-scaling web applications in clouds: A cost-aware approach
The elasticity feature of cloud computing and its pay-per-use pricing entice application
providers to use cloud application hosting. One of the most valuable methods, an application …
providers to use cloud application hosting. One of the most valuable methods, an application …
IoT-fog optimal workload via fog offloading
Billions of devises are expected to be connected to the Internet of Things network in the near
future, therefore, a considerable amount of data will be generated, and gathered every …
future, therefore, a considerable amount of data will be generated, and gathered every …
A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources
Workflow scheduling is a crucial aspect of cloud computing that should be performed in an
efficient manner for optimal utilization of resources. The development of a cost-efficient …
efficient manner for optimal utilization of resources. The development of a cost-efficient …
[HTML][HTML] Improving quality-of-service in cloud/fog computing through efficient resource allocation
Recently, a massive migration of enterprise applications to the cloud has been recorded in
the IT world. One of the challenges of cloud computing is Quality-of-Service management …
the IT world. One of the challenges of cloud computing is Quality-of-Service management …