Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Dynamic Proof of Storage.

Artykuły w czasopismach na temat „Dynamic Proof of Storage”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Dynamic Proof of Storage”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Muthu Selvam, M., K. Mariappan, G. V. Sriramakrishnan, and G. Suseendran. "DeyPoS-homomorphism authenticated tree (HAT) for multi-user locality in cloud storage." International Journal of Engineering & Technology 7, no. 2.31 (2018): 141. http://dx.doi.org/10.14419/ijet.v7i2.31.13427.

Pełny tekst źródła
Streszczenie:
The technology PoS (Dynamic Proof of storage) is a cryptographic primordial allows a abuser to test the reliability of subcontracted documents and effectively replace documents in the cloud storage system. Despite the fact that investigators have projected several dynamic proofs of storage designs in distinct client settings, hassle in the multi-client settings have now not been examined adequately. In sensible multi-client cloud server storage space wishes a cozy client part cross client system of deduplication, it permits client toward bypass importing manner as well as gain instantly the ri
Style APA, Harvard, Vancouver, ISO itp.
2

tha, C. Swe, and Jammi Ashok. "Dynamic Proof of Storage (POS)." International Journal of Computer Trends and Technology 52, no. 1 (2017): 17–21. http://dx.doi.org/10.14445/22312803/ijctt-v52p105.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Dr., Shubhangi D. C*1 &. Pooja2. "DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 8 (2017): 51–56. https://doi.org/10.5281/zenodo.839115.

Pełny tekst źródła
Streszczenie:
Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. Although researchers have proposed many dynamic PoS schemes in single user environments, the problem in multi-user environments has not been investigated sufficiently. A practical multi-user cloud storage system needs the secure client-side cross-user deduplication technique, which allows a user to skip the uploading process and obtain the ownership of the files immediately, when other owners of the same files h
Style APA, Harvard, Vancouver, ISO itp.
4

Hulsure, Rahul, Amol Datal, and Ambulge S. "Deduplication of Dynamic Proof of Storage for Multi-User Environments." International Journal of Computer Applications 179, no. 38 (2018): 42–44. http://dx.doi.org/10.5120/ijca2018916894.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

He, Kun, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, and Xiang Zhang. "DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments." IEEE Transactions on Computers 65, no. 12 (2016): 3631–45. http://dx.doi.org/10.1109/tc.2016.2560812.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Goldstein-Tweg, Tom, Elinor Ginzburg-Ganz, Juri Belikov, and Yoash Levron. "Uniqueness of Optimal Power Management Strategies for Energy Storage Dynamic Models." Energies 18, no. 6 (2025): 1483. https://doi.org/10.3390/en18061483.

Pełny tekst źródła
Streszczenie:
This paper contributes to the field of analytic and semi-analytic solutions for optimal power flow problems involving storage systems. Its primary contribution is a rigorous proof establishing the uniqueness of the “shortest path” optimal solution, a key element in this class of algorithms, building upon a graphical design procedure previously introduced. The proof is constructed through five consequential lemmas, each defining a distinct characteristic of the optimal solution. These characteristics are then synthesized to demonstrate the uniqueness of the optimal solution, which corresponds t
Style APA, Harvard, Vancouver, ISO itp.
7

Li, Ming Chu, Liang Zhang, and Cheng Guo. "Accurate Location in Batch Dynamic Provable Data Possession." Applied Mechanics and Materials 519-520 (February 2014): 9–12. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.9.

Pełny tekst źródła
Streszczenie:
The paper focused on the construction of an efficient DPDP for public audit. We improved the existing proof of storage model by manipulating authenticated skip list structure for authentication. We further explored embedded MHT structure helping our scheme to accurate locate the incorrect part in batch auditing. Extensive security and performance evaluation showed the proposed model is highly efficient and a nice trade-off between robust construction and storage cost.
Style APA, Harvard, Vancouver, ISO itp.
8

Lin, Jyh-Shyan, Kuo-Hsiung Liao, and Chao-Hsing Hsu. "A Group Collaboratable Proof of Retrievability Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 7 (2014): 4625–32. http://dx.doi.org/10.24297/ijct.v13i7.2501.

Pełny tekst źródła
Streszczenie:
Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be
Style APA, Harvard, Vancouver, ISO itp.
9

Taek-Young Youn, Nam-Su Jho, Si-Wan Noh, Kyung-Hyune Rhee, and Sang Uk Shin. "Security analysis of DeyPoS scheme." Research Briefs on Information and Communication Technology Evolution 5 (November 30, 2019): 80–85. http://dx.doi.org/10.56801/rebicte.v5i.86.

Pełny tekst źródła
Streszczenie:
Recently, He et al: [3], proposed a concrete scheme of deduplicatable dynamic PoS called DeyPoS, toachieve dynamic PoS (Proof of Storage) and secure cross-user deduplication, simultaneously. However,after a close look at their proposed scheme, we identity some security weaknesses. In this paper,we show the security vulnerability of DeyPoS scheme, compromise of data privacy and unforgeability.
Style APA, Harvard, Vancouver, ISO itp.
10

Fu, Anmin, Yuhan Li, Shui Yu, Yan Yu, and Gongxuan Zhang. "DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems." Journal of Network and Computer Applications 104 (February 2018): 97–106. http://dx.doi.org/10.1016/j.jnca.2017.12.007.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

JHO, Nam-Su, Daesung MOON, and Taek-Young YOUN. "Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability." IEICE Transactions on Information and Systems E105.D, no. 11 (2022): 1872–79. http://dx.doi.org/10.1587/transinf.2022ngp0004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Bayon, Rocio, Silverio Coco, María Barcenilla, et al. "Feasibility of Storing Latent Heat with Liquid Crystals. Proof of Concept at Lab Scale." Applied Sciences 6 (April 25, 2016): 121 (10). https://doi.org/10.3390/app6050121.

Pełny tekst źródła
Streszczenie:
In this work, the first experimental results of thermotropic liquid crystals used as phasechange materials for thermal storage are presented. For that purpose, the n = 10 derivative fromthe family of 41-n-alkoxybiphenyl-4-carboxylic acids has been prepared. Different techniqueslike polarized-light microscopy, differential scanning calorimetry, thermogravimetric analysis andrheological measurements have been applied for its characterization. Having a mesophase/isotropictransition temperature around 251 C, a clearing enthalpy of 55 kJ/kg, a thermal heat capacityof around 2.4 kJ/kg and a dynamic
Style APA, Harvard, Vancouver, ISO itp.
13

Chandramohan Kanmani Pappa, Dasthegir Nasreen Banu, Kumar Vaishnavi, Susila Nagarajan, Manivannan Karunakaran, and Perisetla Kandaswamy Hemalatha. "A Novel Approach for Block Chain Technology based Cyber Security in Cloud Storage Using Hash Function." Journal of Advanced Research in Applied Sciences and Engineering Technology 32, no. 3 (2023): 178–89. http://dx.doi.org/10.37934/araset.32.3.178189.

Pełny tekst źródła
Streszczenie:
Block chain is generic name to describe the technology used by Bitcoin and other digital currency to record and secure transaction. This technology enables a highly accessible ledger with greatly reduced risk for tampering. The dynamic immutable, data ledger makes ideal for real time monitoring of the shipment of goods. Cloud is an important of distributed storage system of networking. Cloud system need for security, storage management, minimize the cloud cost and fast storage could be improved. The security using new most development security system of block chain technology is used to improv
Style APA, Harvard, Vancouver, ISO itp.
14

Derek Asir Muthurajan Caleb. "AI-Driven Smart Fabric Provisioning: Transforming Network Automation through Intelligent Orchestration and Dynamic Testing." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 783–90. https://doi.org/10.32996/jcsts.2025.7.3.85.

Pełny tekst źródła
Streszczenie:
The evolution of modern data centers demands innovative approaches to fabric provisioning, particularly when integrating new switches, hosts, and storage into existing infrastructures. This article introduces a Smart Fabric Provisioning solution powered by Agentic AI that transforms traditional manual processes into automated, intelligent workflows. By creating dynamic full-mesh fabrics with simulated environments, the solution addresses critical challenges in solution qualification and resource utilization during proof-of-concept phases. The AI-driven approach enables logical link manipulatio
Style APA, Harvard, Vancouver, ISO itp.
15

Neeta P. Patil. "Secure File Sharing Using Blockchain and IPFS with Smart Contract-Based Access Control." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 184–94. https://doi.org/10.52783/jisem.v10i16s.2588.

Pełny tekst źródła
Streszczenie:
With the growing demand for secure, decentralized file sharing solutions, this study presents a blockchain and IPFS-based framework for efficient data storage and access control. The proposed system leverages asymmetric encryption, smart contracts, and distributed access management to ensure confidentiality and integrity. The files are encrypted using AES-256 before they are stored in IPFS, and SHA-256 hashing is used to verify the content. Access control is guaranteed using blockchain-based policies, encrypting access keys and dynamic permissions to ensure that users can exchange files. An in
Style APA, Harvard, Vancouver, ISO itp.
16

Thrimurthulu, Pallapothu *. P. B. Siva Varma. "DYNAMIC APPROACH FOR SECURE DEDUPLICATION OF DATA OVER THE COLUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 1 (2017): 407–12. https://doi.org/10.5281/zenodo.260066.

Pełny tekst źródła
Streszczenie:
Information deduplication is one of critical information pressure methods for killing copy duplicates of rehashing information and has been broadly utilized as a part of distributed storage keeping in mind the end goal to minimize the measure of storage room and spare transfer speed. For insurance of information security, this paper makes an endeavor to basically address the issue of approved information deduplication. To secure the classification of imperative information while supporting deduplication, the concurrent encryption system has been proposed to scramble the information before outs
Style APA, Harvard, Vancouver, ISO itp.
17

Yang, Haibin, Zhengge Yi, Ruifeng Li, et al. "Improved Outsourced Provable Data Possession for Secure Cloud Storage." Security and Communication Networks 2021 (July 22, 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.

Pełny tekst źródła
Streszczenie:
With the advent of data outsourcing, how to efficiently verify the integrity of data stored at an untrusted cloud service provider (CSP) has become a significant problem in cloud storage. In 2019, Guo et al. proposed an outsourced dynamic provable data possession scheme with batch update for secure cloud storage. Although their scheme is very novel, we find that their proposal is not secure in this paper. The malicious cloud server has ability to forge the authentication labels, and thus it can forge or delete the user’s data but still provide a correct data possession proof. Based on the orig
Style APA, Harvard, Vancouver, ISO itp.
18

Vishal, Passricha, Chopra Ashish, Sharma Pooja, and Singhal Shubhanshi. "A secure deduplication scheme for encrypted data." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 2 (2019): 77–86. https://doi.org/10.11591/ijict.v8i2.pp77-86.

Pełny tekst źródła
Streszczenie:
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is a most-effective data reduction technique that identifies and eliminates the redundant data. Dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a
Style APA, Harvard, Vancouver, ISO itp.
19

Slanina, Oliver, Susanne Quabis, and Robert Wynands. "Reproducibility of C. I. P.-compatible dynamic pressure measurements." tm - Technisches Messen 87, no. 10 (2020): 630–36. http://dx.doi.org/10.1515/teme-2020-0060.

Pełny tekst źródła
Streszczenie:
AbstractTo ensure the safety of users like hunters and sports shooters, the dynamic pressure inside an ammunition cartridge must not exceed a maximum value. We have investigated the reproducibility of the dynamic measurement of the gas pressure inside civilian ammunition cartridges during firing, when following the rules formulated by the Permanent International Commission for the Proof of Small Arms (C. I. P.). We find an in-house spread of 0.8 % between maximum and minimum pressure for runs with the same barrel and of 1.8 % among a set of three barrels. This sets a baseline for the expected
Style APA, Harvard, Vancouver, ISO itp.
20

Li, Xiuguang, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, and Xiaoyuan Yang. "SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios." Sensors 23, no. 9 (2023): 4307. http://dx.doi.org/10.3390/s23094307.

Pełny tekst źródła
Streszczenie:
With the rapid development of cloud storage and cloud computing technology, users tend to store data in the cloud for more convenient services. In order to ensure the integrity of cloud data, scholars have proposed cloud data integrity verification schemes to protect users’ data security. The storage environment of the Internet of Things, in terms of big data and medical big data, demonstrates a stronger demand for data integrity verification schemes, but at the same time, the comprehensive function of data integrity verification schemes is required to be higher. Existing data integrity verifi
Style APA, Harvard, Vancouver, ISO itp.
21

Lakshminarayani A and A Shaik Abdul Khadir. "A blockchain-integrated smart healthcare framework utilizing dynamic hunting leadership algorithm with deep learning-based disease detection and classification model." Scientific Temper 15, no. 04 (2024): 3281–89. https://doi.org/10.58414/scientifictemper.2024.15.4.37.

Pełny tekst źródła
Streszczenie:
The healthcare sector has embraced a digital revolution driven by modern technology. Smart healthcare solutions improve patient care by addressing the challenges of traditional methods using large-scale sensor devices. Blockchain (BC) technology ensures secure, decentralized storage and sharing of medical data, fostering intelligent healthcare ecosystems. Robotics and machine learning (ML) also benefit from shared medical data. This manuscript introduces a blockchain-integrated smart healthcare framework utilizing a dynamic hunting leadership algorithm for deep learning-based disease detection
Style APA, Harvard, Vancouver, ISO itp.
22

Xia, Qi, Jianbing Ni, John Bosco Aristotle Kanpogninge Ansuura, and James Gee. "Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage." JUCS - Journal of Universal Computer Science 21, no. (3) (2015): 440–53. https://doi.org/10.3217/jucs-021-03-0440.

Pełny tekst źródła
Streszczenie:
Mobile cloud computing is referred as the combination of cloud computing and mobile networks to bring benefits for both mobile users and cloud computing providers. While once the data of mobile users is outsourced to the cloud, it is a formidable and challenging task for the data owners to realize both the data confidentiality and the utilization because it seems unachievable to search and retrieve the special contents on the data encrypted by traditional encryption schemes. To address this issue, we propose a searchable public-key encryption scheme for a group of users in mobile cloud storage
Style APA, Harvard, Vancouver, ISO itp.
23

Ren, Zhengwei, Lina Wang, Qian Wang, and Mingdi Xu. "Dynamic Proofs of Retrievability for Coded Cloud Storage Systems." IEEE Transactions on Services Computing 11, no. 4 (2018): 685–98. http://dx.doi.org/10.1109/tsc.2015.2481880.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Rao, Lu, Tengfei Tu, Hua Zhang, Qiaoyan Wen, and Jia Xiao. "Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security." Wireless Communications and Mobile Computing 2018 (2018): 1–19. http://dx.doi.org/10.1155/2018/4186243.

Pełny tekst źródła
Streszczenie:
Remote data auditing service is important for mobile clients to guarantee the intactness of their outsourced data stored at cloud side. To relieve mobile client from the nonnegligible burden incurred by performing the frequent data auditing, more and more literatures propose that the execution of such data auditing should be migrated from mobile client to third-party auditor (TPA). However, existing public auditing schemes always assume that TPA is reliable, which is the potential risk for outsourced data security. Although Outsourced Proofs of Retrievability (OPOR) have been proposed to furth
Style APA, Harvard, Vancouver, ISO itp.
25

Masood, Raziqa, and Q. P. Rana. "Public Auditing for Secure Cloud Storage based on DHT." Journal of University of Shanghai for Science and Technology 23, no. 11 (2021): 86–98. http://dx.doi.org/10.51201/jusst/21/10853.

Pełny tekst źródła
Streszczenie:
Today cloud computing has been the most popular service enjoyed by people due to the easy maintenance provided by it. Cloud computing is cost-efficient and people pay according to the services they use. Many organizations are using cloud storage and the reason behind it is that the outsourcing services are provided by the cloud computing. Most of people do not trust the legality of the services provided by cloud (CSPs i.e. cloud service providers) because they are afraid of the security breach of their data. The public auditing of the data by their owners is a technique that can maintain the t
Style APA, Harvard, Vancouver, ISO itp.
26

M. Vasuki, Mrs. "Disaster Proof Cloud Data Centers with Advanced Backup and Recovery Using HAEdge." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50054.

Pełny tekst źródła
Streszczenie:
Abstract- Data storage and service delivery have become heavily dependent on globally distributed cloud data centers. Despite their efficiency, these data centers remain susceptible to a range of failure scenarios, including hardware breakdowns, system crashes, and environmental disasters. These vulnerabilities highlight the importance of fault-tolerant systems that can maintain service availability and reliability under adverse conditions. One of the most pressing concerns in this space is the development of robust data backup and recovery mechanisms, which are essential for ensuring business
Style APA, Harvard, Vancouver, ISO itp.
27

Nugroho, Sri, Luthfi Muhammad Mauludin, Togar Sirait, Mujiman Mujiman, Ahmad Sofyan, and Toto Tohir. "Design of Hybrid Energy System for Railway Application (Case Study of People Mover System in Doha, Qatar)." Current Journal: International Journal Applied Technology Research 4, no. 1 (2023): 1–7. http://dx.doi.org/10.35313/ijatr.v4i1.112.

Pełny tekst źródła
Streszczenie:
This paper presents the conceptual design of hybrid energy system used in railway application. The hybrid system with batteries and energy storage double-layer capacitor is a new technology that is used under extreme climatic conditions, especially in daytime temperature up to 50°C, high relative humidity, dust and heavy rain. It is a combination of double-layer capacitors and traction batteries. It draws power both externally and from braking energy. In order to reduce CO2 emissions to the environment, energy-saving drives and energy storage are used. Also, in public transportation, Sitras Hy
Style APA, Harvard, Vancouver, ISO itp.
28

Passricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data." International Journal of Advanced Pervasive and Ubiquitous Computing 11, no. 2 (2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.

Pełny tekst źródła
Streszczenie:
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplicati
Style APA, Harvard, Vancouver, ISO itp.
29

Yin, Shanqing, Johnathan Jun Howe Siew, Siew Bee Iris Ng, Andi Sudjana Putra, and Arron Ang. "Functional Redesign of the Hospital Trolley-Bed Tray Table." Ergonomics in Design: The Quarterly of Human Factors Applications 24, no. 4 (2016): 20–26. http://dx.doi.org/10.1177/1064804616630692.

Pełny tekst źródła
Streszczenie:
Patients arriving in the Accident and Emergency Department tend to be moved about throughout the care journey. Although each trolley bed had a tray table attached at the end of the bed for clinical use, its space was limited and additional equipment might be left on the bedside cabinets. Hence these items were easily left behind when patients shifted to another care area. The tray table attachments on the trolley beds became the focus of a redesign effort to improve storage capability in this mobile, dynamic environment. Through the combined use of human factors and design thinking methods, a
Style APA, Harvard, Vancouver, ISO itp.
30

Jevinger, Åse, and Paul Davidsson. "System Architectures for Sensor-Based Dynamic Remaining Shelf-life Prediction." International Journal of Operations Research and Information Systems 10, no. 4 (2019): 21–38. http://dx.doi.org/10.4018/ijoris.2019100102.

Pełny tekst źródła
Streszczenie:
Different storage and handling conditions in cold supply chains often cause variations in the remaining shelf life of perishable foods. In particular, the actual shelf life may differ from the expiration date printed on the primary package. Based on temperature sensors placed on or close to the food products, a remaining shelf-life prediction (RSLP) service can be developed, which estimates the remaining shelf life of individual products, in real-time. This type of service may lead to decreased food waste and is used for discovering supply chain inefficiencies and ensuring food quality. Depend
Style APA, Harvard, Vancouver, ISO itp.
31

Kaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.

Pełny tekst źródła
Streszczenie:
Cloud computing started a new era for IT enterprises. It allows the movement of application from local to remote location, massive data storage. Owner has access to centralized or decentralized data storage server, where data management handled by remote vendor. But, the heterogeneous and dynamic nature of cloud introduces security challenges. Among them, access control and integrity checking are most important which incur high consideration. Attribute-based encryption is one of the access control technique which allows integration of access policies, attributes, and encrypted data. In this pa
Style APA, Harvard, Vancouver, ISO itp.
32

Ahmad, Shafiq, Zia ur Rehman, Saud Altaf, et al. "Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN." Sustainability 14, no. 21 (2022): 14625. http://dx.doi.org/10.3390/su142114625.

Pełny tekst źródła
Streszczenie:
As a key component of ubiquitous computing, the wireless body area network (WBAN) can be used in a variety of disciplines, including health monitoring. Our everyday routines have been transformed by wearable technology, which has changed the medical industry and made our lives more convenient. However, the openness of the wireless network has raised concerns about the privacy and security of patient’s data because of the latent threat imposed by attackers. Patients’ sensitive data are safeguarded with authentication schemes against a variety of cyberattacks. Using pulse signals and a lightweig
Style APA, Harvard, Vancouver, ISO itp.
33

Voinov, Vassilly. "An Experimental Supported by Some Strong Theoretical Arguments Proof of the Fundamental Equality P=NP." Central Asia Business Journal 23, no. 1 (2023): 12–31. https://doi.org/10.55861/cabj.23.01.02.

Pełny tekst źródła
Streszczenie:
A refined version of the algorithm for constructing all 0-1 integer solutions for linear Diophantine equations is introduced. The correctness and its polynomial time complexity is confirmed by a Monte Carlo experiment that uses the trivial simple combinatorics. An implementation of this algorithm proves the polynomial time solvability of many business decision and optimization problems that are currently considered as being intractable: bin packing and cutting stock, open-shop and job- shop scheduling, production planning, dynamic storage allocation and many others. It is shown that all these
Style APA, Harvard, Vancouver, ISO itp.
34

Sengupta, Binanda, and Sushmita Ruj. "Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage." IEEE Transactions on Cloud Computing 8, no. 1 (2020): 138–51. http://dx.doi.org/10.1109/tcc.2017.2767584.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Nijzink, Remko, Christopher Hutton, Ilias Pechlivanidis, et al. "The evolution of root-zone moisture capacities after deforestation: a step towards hydrological predictions under change?" Hydrology and Earth System Sciences 20, no. 12 (2016): 4775–99. http://dx.doi.org/10.5194/hess-20-4775-2016.

Pełny tekst źródła
Streszczenie:
Abstract. The core component of many hydrological systems, the moisture storage capacity available to vegetation, is impossible to observe directly at the catchment scale and is typically treated as a calibration parameter or obtained from a priori available soil characteristics combined with estimates of rooting depth. Often this parameter is considered to remain constant in time. Using long-term data (30–40 years) from three experimental catchments that underwent significant land cover change, we tested the hypotheses that: (1) the root-zone storage capacity significantly changes after defor
Style APA, Harvard, Vancouver, ISO itp.
36

Prakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.

Pełny tekst źródła
Streszczenie:
Cryptographic cloud storage is used to make optimal use of the cloud storage infrastructure to outsource sensitive and mission-critical data. The continuous growth of encrypted data outsourced to cloud storage requires continuous updating. Attacks like file-injection are reported to compromise confidentiality of the user as a consequence of information leakage during update. It is required that dynamic schemes provide forward privacy guarantees. Updates should not leak information to the untrusted server regarding the previously issued queries. Therefore, the challenge is to design an efficien
Style APA, Harvard, Vancouver, ISO itp.
37

H. Abbdal Refish, Salah. "Data integrity proof and secure computation based on elgamal algorithm and iris extraction in cloud storage." International Journal of Engineering & Technology 7, no. 4 (2019): 6453–57. http://dx.doi.org/10.14419/ijet.v7i4.23293.

Pełny tekst źródła
Streszczenie:
Storage servers may not be fully trusted in cloud storage. So, it is of critical importance for users to check whether the data stored are kept intact or not. In this paper, an efficient and secure integrity checking method based on iris feature extraction and Elgamal algorithm is presented. This method gives the cloud users more confidence in detecting any block that has been modified. Additionally, the proposed scheme supports data dynamics by employing Merkle Hash Tree (MHT), which is used to store the location of each data operation. Data dynamics include such data operations as block modi
Style APA, Harvard, Vancouver, ISO itp.
38

LIAO, Hongfei, Guohui ZENG, Bo HUANG, Chi MA, Gong CHEN, and Jinbin ZHAO. "Optimal Control Virtual Inertia of Optical Storage Microgrid Based on Improved Sailfish Algorithm." Wuhan University Journal of Natural Sciences 27, no. 3 (2022): 218–30. http://dx.doi.org/10.1051/wujns/2022273218.

Pełny tekst źródła
Streszczenie:
The optical storage microgrid system composed of power electronic converters is a small inertia system. Load switching and power supply intermittent will affect the stability of the direct current (DC) bus voltage. Aiming at this problem, a virtual inertia optimal control strategy applied to optical storage microgrid is proposed. Firstly, a small signal model of the system is established to theoretically analyze the influence of virtual inertia and damping coefficient on DC bus voltage and to obtain the constraint range of virtual inertia and damping coefficient; Secondly, aiming at the defect
Style APA, Harvard, Vancouver, ISO itp.
39

D, Prof Latha. "Blockchain Solutions for Secure Healthcare Data Management: A Comprehensive Survey." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29730.

Pełny tekst źródła
Streszczenie:
The paper introduces an innovative approach to healthcare data security, addressing the critical concerns surrounding privacy and data integrity in the modern healthcare landscape. By amalgamating blockchain technology, AWS S3 services, and attribute-based access control (ABAC), the proposed solution offers a robust framework for safeguarding sensitive medical information. Through the implementation of ABAC, the solution enables dynamic and precise access control, ensuring that only authorized entities can access and manipulate healthcare data. Additionally, the utilization of a blockchain-bas
Style APA, Harvard, Vancouver, ISO itp.
40

Bobde, Yash, Gokuleshwaran Narayanan, Manas Jati, Raja Soosaimarian Peter Raj, Ivan Cvitić, and Dragan Peraković. "Enhancing Industrial IoT Network Security through Blockchain Integration." Electronics 13, no. 4 (2024): 687. http://dx.doi.org/10.3390/electronics13040687.

Pełny tekst źródła
Streszczenie:
In the rapidly evolving landscape of industrial ecosystems, Industrial IoT networks face increasing security challenges. Traditional security methods often struggle to protect these networks adequately, posing risks to data integrity, confidentiality, and access control. Our research introduces a methodology that leverages blockchain technology to enhance the security and trustworthiness of IoT networks. This approach starts with sensor nodes collecting and compressing data, followed by encryption using the ChaCha20-Poly1305 algorithm and transmission to local aggregators. A crucial element of
Style APA, Harvard, Vancouver, ISO itp.
41

Siva Prasad Nandi. "Serverless databases: Architectural evolution, implementation strategies, and future directions in cloud-native data management." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 567–74. https://doi.org/10.30574/wjarr.2025.26.2.1591.

Pełny tekst źródła
Streszczenie:
The evolution of modern data centers demands innovative approaches to fabric provisioning, particularly when integrating new switches, hosts, and storage into existing infrastructures. This article introduces a Smart Fabric Provisioning solution powered by Agentic AI that transforms traditional manual processes into automated, intelligent workflows. By creating dynamic full-mesh fabrics with simulated environments, the solution addresses critical challenges in solution qualification and resource utilization during proof-of-concept phases. The AI-driven approach enables logical link manipulatio
Style APA, Harvard, Vancouver, ISO itp.
42

Dhomkar, Siddharth, Jacob Henshaw, Harishankar Jayakumar, and Carlos A. Meriles. "Long-term data storage in diamond." Science Advances 2, no. 10 (2016): e1600911. http://dx.doi.org/10.1126/sciadv.1600911.

Pełny tekst źródła
Streszczenie:
The negatively charged nitrogen vacancy (NV−) center in diamond is the focus of widespread attention for applications ranging from quantum information processing to nanoscale metrology. Although most work so far has focused on the NV− optical and spin properties, control of the charge state promises complementary opportunities. One intriguing possibility is the long-term storage of information, a notion we hereby introduce using NV-rich, type 1b diamond. As a proof of principle, we use multicolor optical microscopy to read, write, and reset arbitrary data sets with two-dimensional (2D) binary
Style APA, Harvard, Vancouver, ISO itp.
43

Giaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices." ACM Transactions on Sensor Networks 18, no. 1 (2022): 1–51. http://dx.doi.org/10.1145/3480462.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S×C4IoT, a framework tha
Style APA, Harvard, Vancouver, ISO itp.
44

Giaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices." ACM Transactions on Sensor Networks 18, no. 1 (2022): 1–51. http://dx.doi.org/10.1145/3480462.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S×C4IoT, a framework tha
Style APA, Harvard, Vancouver, ISO itp.
45

Dumas, Jean-Guillaume, Aude Maignan, Clément Pernet, and Daniel S. Roche. "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 354–74. http://dx.doi.org/10.56553/popets-2023-0085.

Pełny tekst źródła
Streszczenie:
Proofs of Retrievability are protocols which allow a Client to store data remotely and to efficiently ensure, via audits, that the entirety of that data is still intact. Dynamic Proofs of Retrievability (DPoR) also support efficient retrieval and update of any small portion of the data. We propose a novel protocol for arbitrary outsourced data storage that achieves both low remote storage size and audit complexity. A key ingredient, that can be also of intrinsic interest, reduces to efficiently evaluating a secret polynomial at given public points, when the (encrypted) polynomial is stored on
Style APA, Harvard, Vancouver, ISO itp.
46

Passricha, Vishal, Ashish Chopra, Pooja Sharma, and Shubhanshi Singhal. "A secure deduplication scheme for encrypted data." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 2 (2019): 77. http://dx.doi.org/10.11591/ijict.v8i2.pp77-86.

Pełny tekst źródła
Streszczenie:
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is a most-effective data reduction technique that identifies and eliminates the redundant data. Dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a
Style APA, Harvard, Vancouver, ISO itp.
47

Keshri, Nandita, Ingo Truppel, Werner B. Herppich, Martin Geyer, Cornelia Weltzien, and Pramod V. Mahajan. "In-Situ Measurement of Fresh Produce Respiration Using a Modular Sensor-Based System." Sensors 20, no. 12 (2020): 3589. http://dx.doi.org/10.3390/s20123589.

Pełny tekst źródła
Streszczenie:
In situ, continuous and real-time monitoring of respiration (R) and respiratory quotient (RQ) are crucial for identifying the optimal conditions for the long-term storage of fresh produce. This study reports the application of a gas sensor (RMS88) and a modular respirometer for in situ real-time monitoring of gas concentrations and respiration rates of strawberries during storage in a lab-scale controlled atmosphere chamber (190 L) and of Pinova apples in a commercial storage facility (170 t). The RMS88 consisted of wireless O2 (0% to 25%) and CO2 sensors (0% to 0.5% and 0% to 5%). The modular
Style APA, Harvard, Vancouver, ISO itp.
48

Choi, Hyung Won, Jinhee Jeong, Ja Ryong Koo, Young Kim, and Yong Tae Kang. "Proof of concept for unsteady dynamic model of sorption thermal battery with H2O/LiBr and universal methodology to optimize energy storage density." Energy 328 (August 2025): 136612. https://doi.org/10.1016/j.energy.2025.136612.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Morin-Pépin, Stéphane, and Adel Francis. "Dynamic Spatiotemporal Scheduling for Construction Building Projects." Buildings 14, no. 10 (2024): 3139. http://dx.doi.org/10.3390/buildings14103139.

Pełny tekst źródła
Streszczenie:
For building projects, the manager is responsible for coordinating the work of subcontractors at the construction site. This includes operations, material flows, and storage. In summary, one of their main roles is to ensure smooth team rotation, maintain fluid circulation, and avoid congestion or relaxation on the site. However, traditional tools lack the ability to consider the planning and management of worksite spaces when calculating the execution schedule and critical path. Consequently, three-week planning is usually carried out separately on independent plans, often using spreadsheets.
Style APA, Harvard, Vancouver, ISO itp.
50

TSUDA, ICHIRO, TAKASHI TAHARA, and HIROAKI IWANAGA. "CHAOTIC PULSATION IN HUMAN CAPILLARY VESSELS AND ITS DEPENDENCE ON MENTAL AND PHYSICAL CONDITIONS." International Journal of Bifurcation and Chaos 02, no. 02 (1992): 313–24. http://dx.doi.org/10.1142/s0218127492000318.

Pełny tekst źródła
Streszczenie:
We found a chaotic pulsation in a finger’s capillary vessels in both normal subjects and psychiatric patients, as well as cardiac chaos. A proof of chaos was made by the reconstruction of the dynamics in phase space and the calculation of the Lyapunov exponents. From the aspect of chaotic information processing, we give a measure of the information storage capacity of the observed chaos. We also found a difference in the topology of capillary and cardiac chaos, and a difference in their dependence on the subject’s conditions.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!