Academic literature on the topic 'Security in Cloud Computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security in Cloud Computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security in Cloud Computing"

1

Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Joshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.

Full text
Abstract:
bstract: Cloud computing environment is a new way in which web base enable applications provide as a service for the users with low computational cost through internet. As we store data and it also provide services in distributed environment. Cloud ease its users byproviding virtualization technology of resources through internet. Cloud computing is the emerging field, due to this reason the various new techniques are still developing. At current scenario new security challenges were increases for cloud professionals. Due to lack of security in cloud computing environment user of cloud lost it
APA, Harvard, Vancouver, ISO, and other styles
3

R, Jain. "Survey on Mobile Cloud Computing." Advances in Robotic Technology 2, no. 1 (2024): 1–7. http://dx.doi.org/10.23880/art-16000111.

Full text
Abstract:
The paper explores how cloud computing offers the capacity to improve computing features and application services while addressing its transformative impact on mobile device systems. It recognizes, yet, the security risks associated with transferring data and computing. Using various cloud types for secure information searches and security-critical activities, the research proposal proposes a secure exporting architecture to basic clouds. It shows the significance of cryptography, confidentiality security measures, and data security methods in solving these security issues with cloud computing
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.

Full text
Abstract:
The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and qui
APA, Harvard, Vancouver, ISO, and other styles
5

Shyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

D, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dutta, Sreejit. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 04, no. 11 (2016): 4747–52. http://dx.doi.org/10.18535/ijetst/v3i11.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Charles, P. Joseph. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 05, no. 06 (2017): 5253–56. http://dx.doi.org/10.18535/ijetst/v4i6.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sabanayasmin, J., Dr S. Periyasamy, and Dr K. Balamurugan. "Achieving Security for Cloud Computing." Bonfring International Journal of Networking Technologies and Applications 6, no. 2 (2019): 01–04. http://dx.doi.org/10.9756/bijnta.9037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.

Full text
Abstract:
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security in Cloud Computing"

1

Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.

Full text
Abstract:
Ces dernières années, nous assistons à une immense révolution numérique de l’internet où de nombreuses applications, innovantes telles que l’internet des objets, les voitures autonomes, etc., ont émergé. Par conséquent, l’adoption des technologies d’externalisations des données, telles que le cloud ou le fog computing, afin de gérer cette expansion technologique semble inévitable. Cependant, l’utilisation du cloud ou du fog computing en tant que plateforme d’externalisation pour le stockage ou le partage des données crée plusieurs défis scientifiques. En effet, externaliser ses données signifi
APA, Harvard, Vancouver, ISO, and other styles
2

Panteliuk, D., and V. Romaka. "Cloud Computing Security Issues." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.

Full text
Abstract:
Le Cloud Computing, ou informatique en nuages, est un environnement de stockage et d’exécution flexible et dynamique qui offre à ses utilisateurs des ressources informatiques à la demande via internet. Le Cloud Computing se développe de manière exponentielle car il offre de nombreux avantages rendus possibles grâce aux évolutions majeures des Data Centers et de la virtualisation. Cependant, la sécurité est un frein majeur à l’adoption du Cloud car les données et les traitements seront externalisés hors de site de confiance de client. Cette thèse contribue à résoudre les défis et les issues de
APA, Harvard, Vancouver, ISO, and other styles
4

Win, Thu Yein. "Virtualisation security in cloud computing." Thesis, Glasgow Caledonian University, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.726791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Doelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.

Full text
Abstract:
Cloud computing has grown largely over the past three years and is widely popular amongst today's IT landscape. In a comparative study between 250 IT decision makers of UK companies they said, that they already use cloud services for 61% of their systems. Cloud vendors promise "infinite scalability and resources" combined with on-demand access from everywhere. This lets cloud users quickly forget, that there is still a real IT infrastructure behind a cloud. Due to virtualization and multi-tenancy the complexity of these infrastructures is even increased compared to traditional data c
APA, Harvard, Vancouver, ISO, and other styles
6

Blakstad, Kåre Marius, and Mats Andreassen. "Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21041.

Full text
Abstract:
Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are assessed with regards to a security assessment framework provided by the Cloud Security Alliance and the
APA, Harvard, Vancouver, ISO, and other styles
7

Ambrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.

Full text
Abstract:
<p>With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.</p><p>The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the i
APA, Harvard, Vancouver, ISO, and other styles
8

Backe, Anton, and Hugo Lindén. "Cloud Computing Security: A Systematic Literature Review." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-256426.

Full text
Abstract:
This literature review seeks to identify the major security issues and their solutions in cloud computing security as well as identifying areas for future research. Utilising a modified version of the approach suggested by Okoli and Schabram (2010) 52 articles were considered for the review, of which 26 were included in the final product. Although many security issues and solutions were identified it has become apparent that much of the research being done only relates to the theoretical side. Thus this review shows that while plenty of issues have been identified future research should focus
APA, Harvard, Vancouver, ISO, and other styles
9

Bulusu, Santosh, and Kalyan Sudia. "A Study on Cloud Computing Security Challenges." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2820.

Full text
Abstract:
Context: Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of Cloud Computing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations&apos; annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of CC. Among these include security aspects. Objectives: This thesis aims to identify security challenges for adapting cloud computing and their solutions f
APA, Harvard, Vancouver, ISO, and other styles
10

Inam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.

Full text
Abstract:
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero &amp; Llorente, 2012). A distinctive cloud is affected by different security issues such as Temporary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011). The pur
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security in Cloud Computing"

1

Vacca, John R., ed. Cloud Computing Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781315372112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Xingming, Han-Chieh Chao, Xingang You, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68505-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Xingming, Han-Chieh Chao, Xingang You, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sehgal, Naresh Kumar, Pramod Chandra P. Bhatt, and John M. Acken. Cloud Computing with Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-24612-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48671-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48674-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security in Cloud Computing"

1

Mishra, Preeti, Emmanuel S. Pilli, and R. C. Joshi. "Overview of Cloud Computing." In Cloud Security. Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9781003004486-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, Tony. "Cloud Computing Security." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yushu, Yong Xiang, and Leo Yu Zhang. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2523-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Srinivasan, S. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-7699-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Banafa, Ahmed. "Cloud Computing Security." In Quantum Computing and Other Transformative Technologies. River Publishers, 2023. http://dx.doi.org/10.1201/9781003339175-32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Samarati, Pierangela, and Sabrina De Capitani di Vimercati. "Cloud Security." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sehgal, Naresh Kumar, and Pramod Chandra P. Bhatt. "Cloud Computing and Information Security." In Cloud Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77839-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morrow, Susan. "Data Security in the Cloud." In Cloud Computing. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9780470940105.ch23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lele, Ajey. "Cloud Computing." In Disruptive Technologies for the Militaries and Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3384-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martin, John Paul, Vipin Singh, K. Chandrasekaran, and A. Kandasamy. "Explicating Fog Computing Key Research Challenges and Solutions." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security in Cloud Computing"

1

Arora, Prakhar, B. Lanitha, Muneeswaran V, Soma Saha, and H. Azath. "Cloud Computing Security Architecture and Risks." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10895554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bordak, Lukas. "Cloud Computing Security." In 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2019. http://dx.doi.org/10.1109/iceta48886.2019.9040043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

S, Divya, and Gini R. "Enhancing Data Security in Cloud Computing using Block chain." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.

Full text
Abstract:
Block chain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome th
APA, Harvard, Vancouver, ISO, and other styles
4

Jia, Minrui. "Cloud Security of Cloud Computing Application." In 2011 International Conference on Control, Automation and Systems Engineering (CASE). IEEE, 2011. http://dx.doi.org/10.1109/iccase.2011.5997643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang Yandong and Zhang Yongsheng. "Cloud computing and cloud security challenges." In 2012 International Symposium on Information Technology in Medicine and Education (ITME 2012). IEEE, 2012. http://dx.doi.org/10.1109/itime.2012.6291488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tripathi, Alok, and Abhinav Mishra. "Cloud computing security considerations." In 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC). IEEE, 2011. http://dx.doi.org/10.1109/icspcc.2011.6061557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Vani Dayal, Somya Agarwai, Syeda Shira Moin, and Mohammed Abdul Qadeer. "Security in cloud computing." In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2017. http://dx.doi.org/10.1109/csnt.2017.8418544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bouayad, Anas, Asmae Blilat, Nour El Houda Mejhed, and Mohammed El Ghazi. "Cloud computing: Security challenges." In 2012 Colloquium in Information Science and Technology (CIST). IEEE, 2012. http://dx.doi.org/10.1109/cist.2012.6388058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hameed, Rasha Talal, Abdulatif Ali Hussain, Omar Abdulwahabe Mohamad, Khamis A. Zidan, Omar Talal Hamid, and Saba Abdulbaqi Salman. "Improved Cloud Computing Security." In 2018 1st Annual International Conference on Information and Sciences (AiCIS). IEEE, 2018. http://dx.doi.org/10.1109/aicis.2018.00041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rishitha and T. R. Reshmi. "Security in Cloud Computing." In 2018 International Conference on Recent Trends in Advance Computing (ICRTAC). IEEE, 2018. http://dx.doi.org/10.1109/icrtac.2018.8679158.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security in Cloud Computing"

1

Cully, John, and Susie Wright. Cloud computing. Parliamentary Office of Science and Technology, 2020. http://dx.doi.org/10.58248/pn629.

Full text
Abstract:
Cloud computing refers to the delivery of computing services on-demand over the internet. This POSTnote describes the different types of cloud computing before outlining issues relating to security, regulation, energy use and barriers to the adoption of this technology.
APA, Harvard, Vancouver, ISO, and other styles
2

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. Security Issues for Cloud Computing. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada545053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Myers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Myers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Farrag, Khalid. Utilizing Cloud Computing Log Events for Security Automation. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
7

Jansen, W., and T. Grance. Guidelines on security and privacy in public cloud computing. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Akyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1052949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bartock, Michael, Murugiah Souppaya, Ryan Savino, et al. Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320-draft2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.

Full text
Abstract:
Abstract: Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), is evolving into a transformative technology with applications in healthcare, education, industrial training, smart cities, and entertainment. This research presents a unified framework integrating AI-driven XR technologies with computer vision, deep learning, cloud computing, and 5G connectivity to enhance immersion, interactivity, and scalability. AI-powered neural rendering, real-time physics simulation, spatial computing, and gesture recognition enable more realistic and adap
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!