Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data replication techniques in the Internet of Things: a systematic literature review
X Sun, G Wang, L Xu, H Yuan - Library Hi Tech, 2021 - emerald.com
Purpose In data grids, replication has been regarded as a crucial optimization strategy.
Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt …
Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt …
[HTML][HTML] A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective
The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful
due to the development of many applications around us including smart cities, smart cars …
due to the development of many applications around us including smart cities, smart cars …
Allocating duplicate copies for IoT data in cloud computing based on harmony search algorithm
The Internet of things (IoT) generates a plethora of data nowadays, and cloud computing has
been introduced as an efficient solution to IoT data management. A cloud resource …
been introduced as an efficient solution to IoT data management. A cloud resource …
Minimizing delay in IoT systems through collaborative fog-to-fog (F2F) communication
The recent advances in IoT technologies have led to the introduction of a plethora of
networking, storage and computing systems. Today, the cloud computing system has …
networking, storage and computing systems. Today, the cloud computing system has …
[HTML][HTML] Design and implementation of high-availability architecture for IoT-cloud services
H Yang, Y Kim - Sensors, 2019 - mdpi.com
For many vertical Internet of Things (IoT) applications, the high availability is very important.
In traditional cloud systems, services are usually implemented with the same level of …
In traditional cloud systems, services are usually implemented with the same level of …
Guidance framework for develo** IoT-enabled systems' cybersecurity
Internet of Things (IoT) faces security concerns different from existing challenges in
conventional information systems connected through the Internet because of their limited …
conventional information systems connected through the Internet because of their limited …
Adaptive data placement in the Fog infrastructure of IoT applications with dynamic changes
Abstract Time-sensitive Internet of Things (IoT) applications need to provide instant
responses to end users. Seeking to reduce the latency of IoT applications is challenging …
responses to end users. Seeking to reduce the latency of IoT applications is challenging …
A reliability guaranteed solution for data storing and sharing
Digital data certified by a reputable organization are valuable digital data that can be stored
or shared on the internet. However, the problems are:(1) How to ensure the anonymity of …
or shared on the internet. However, the problems are:(1) How to ensure the anonymity of …
A bottom-up tree based storage approach for efficient IoT data analytics in cloud systems
JW Lin, JM Arul, JT Kao - Journal of Grid Computing, 2021 - Springer
Abstract Internet of Things (IoT) has been widely applied in various domains, eg
environmental monitoring, intelligent transport system, video surveillance, etc. In most of the …
environmental monitoring, intelligent transport system, video surveillance, etc. In most of the …
[HTML][HTML] Empirical performance and energy consumption evaluation of container solutions on resource constrained IoT gateways
Containers virtually package a piece of software and share the host Operating System (OS)
upon deployment. This makes them notably light weight and suitable for dynamic service …
upon deployment. This makes them notably light weight and suitable for dynamic service …