C Wang, X Tan, C Yao, F Gu, F Shi, H Cao - Sustainability, 2022 - mdpi.com
Single point of failure and node attack tend to cause instability in the centralized Internet of Things (IoT). Combined with blockchain technology, the deficiency of traditional IoT …
In recent times the cloud-related Internet of Medical Things (IoMT) solution offers numerous healthcare services to wearable sensor gadgets for patients. Particularly, cost-efficient …
S Shakya, P Tripathi - International Journal of Information Technology, 2024 - Springer
The scheduling of appropriate resources for cloud workloads is a difficult task, as it depends on the quality of service needs of cloud applications. Due to their limited data storage and …
G Vijayasekaran… - International Journal of …, 2024 - Wiley Online Library
With increasing challenges and research in edge‐assisted IoT models, an improved resource scheduling approach exploiting deep learning concepts is proposed in this …
S Liu, B Qiao, D Han, G Wu - Internet of Things, 2024 - Elsevier
Most of the existing task offloading methods in edge computing environments do not fully utilize the processing capabilities of cloud servers and have high computational complexity …
M Farooq, MH Khan - Int. J. Sci. Res. in Network Security and …, 2024 - researchgate.net
Deep learning has emerged as a powerful technique for processing and extracting insights from complex data. However, the resource-constrained nature of edge devices poses …
Integrated CloudIoT is an emerging field of study that integrates the Cloud and the Internet of Things (IoT) to make machines smarter and deal with real-world objects in a distributed …
M Gao, W Cai, Y Jiang, W Hu, J Yao… - … -Computer Modeling in …, 2024 - cdn.techscience.cn
Currently, applications accessing remote computing resources through cloud data centers is the main mode of operation, but this mode of operation greatly increases communication …
C Tamizshelvan, V Vijayalakshmi - Wireless Networks, 2024 - Springer
To address the concerns about security and privacy in cloud-based data storage, this study proposes a unique approach to secure cloud-based data governance using hybrid machine …