Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security issues in fog environment: a systematic literature review
The potent concept of fog computing is currently attracting many researchers as it brings
cloud services closer to the end-user. It also roots out some of the major limitations of the …
cloud services closer to the end-user. It also roots out some of the major limitations of the …
Security in fog computing: A systematic review on issues, challenges and solutions
Fog computing refers to cloud computing development to the edge of a corporate network.
Fog computing, as a promising computing paradigm, facilitates computing, storing and …
Fog computing, as a promising computing paradigm, facilitates computing, storing and …
Application of quantum genetic optimization of LVQ neural network in smart city traffic network prediction
F Zhang, TY Wu, Y Wang, R **ong, G Ding, P Mei… - IEEE …, 2020 - ieeexplore.ieee.org
Accurate prediction of traffic flow in urban networks is of great significance for smart city
management. A short-term traffic flow prediction algorithm of Quantum Genetic Algorithm …
management. A short-term traffic flow prediction algorithm of Quantum Genetic Algorithm …
Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art
Fog nodes are implemented near to end‐users Internet of Things (IoT) devices, which
mitigate the impact of low latency, location awareness, and geographic distribution …
mitigate the impact of low latency, location awareness, and geographic distribution …
Analysis of security and privacy issues of information management of big data in B2B based healthcare systems
BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …
and efficient data transmission if business-to-business (B2B) methods were more widely …
An enhanced pairing-based authentication scheme for smart grid communications
To ensure that messages can be securely transmitted between different entities in a smart
grid, many researchers have focused on authentication and key exchange schemes. Chen …
grid, many researchers have focused on authentication and key exchange schemes. Chen …
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
Research on the Influence of AI and VR Technology for Students' Concentration and Creativity
Q Rong, Q Lian, T Tang - Frontiers in psychology, 2022 - frontiersin.org
The application of digital technology in teaching has triggered the evolution of traditional
teaching. Students have different corresponding relationships under digital behavior. The …
teaching. Students have different corresponding relationships under digital behavior. The …
Improved authenticated key agreement scheme for fog‐driven IoT healthcare system
TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …
and transportation systems, among others. Smart medical systems have become the most …
Exploring the factors influencing users' learning and sharing behavior on social media platforms
J Wang, J **e - Library Hi Tech, 2023 - emerald.com
Purpose The research goal is to understand what factors affect users' knowledge and
information learning and sharing on social media platforms. This study focuses on the …
information learning and sharing on social media platforms. This study focuses on the …