Zobrazeno 1 - 10
of 132
pro vyhledávání: '"Zheli Liu"'
Publikováno v:
Heliyon, Vol 9, Iss 4, Pp e15353- (2023)
There are a large number of solutions for big data processing in the Internet of Things (IoT) environments, among which the IoT cloud infrastructure is one of the most mature solutions. Typically, modern IoT cloud infrastructures have different kinds
Externí odkaz:
https://doaj.org/article/6fa55b928d8741099578570142d2a513
Publikováno v:
IEEE Access, Vol 9, Pp 68880-68887 (2021)
Due to the COVID-19 epidemic, face-to-face team working has changed into distanced work from home. Modern, decentralized digital communication environments are changing with the availability of new technologies and the development of new real-world a
Externí odkaz:
https://doaj.org/article/580246d0a6c845c1bb1cbf8c6b5e4494
Publikováno v:
Biotechnology & Biotechnological Equipment, Vol 32, Iss 5, Pp 1277-1284 (2018)
The present study aimed to investigate the protective effect and mechanism of action of astaxanthin (AST) on the oxidative stress injury of adult retinal pigment epithelium-19 (ARPE-19) cells induced by hydrogen peroxide (H2O2). ARPE-19 cells were di
Externí odkaz:
https://doaj.org/article/832794dcfca441e8be2d070b7dd603f9
Publikováno v:
IEEE Access, Vol 6, Pp 9091-9098 (2018)
With the development of 5G and Internet of Vehicles technology, the possibility of remote wireless attack on an in-vehicle network has been proven by security researchers. Anomaly detection technology can effectively alleviate the security threat, as
Externí odkaz:
https://doaj.org/article/b929a37865624fddbe1e1deca0b7da5d
Publikováno v:
IEEE Access, Vol 6, Pp 38860-38869 (2018)
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leaka
Externí odkaz:
https://doaj.org/article/a5cf675cf8864b509511f712fd1b49a2
Publikováno v:
IEEE Access, Vol 6, Pp 77033-77042 (2018)
With the development of data transactions, data security issues have become increasingly important. For example, the copyright authentication and provenance of data have become the primary requirements for data security defense mechanisms. For this p
Externí odkaz:
https://doaj.org/article/254b0f1a512b4ea698d402519d11868f
Publikováno v:
PLoS ONE, Vol 11, Iss 1, p e0146808 (2016)
Choroidal neovascularization (CNV) is an important pathologic component of neovascular age-related macular degeneration (AMD), and CNV lesions later develop into fibrous scars, which contribute to the loss of central vision. Nowadays, the precise mol
Externí odkaz:
https://doaj.org/article/a5b5753f9b9f49009610870c6e1b1843
Publikováno v:
Sensors, Vol 18, Iss 3, p 878 (2018)
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These fo
Externí odkaz:
https://doaj.org/article/77fad59dcd634d3a9bbf36a6ceb3eaf8
Publikováno v:
Information Sciences. 626:537-558
Publikováno v:
ACM Transactions on Software Engineering and Methodology. 32:1-28
Open-source software (OSS) licenses dictate the conditions, which should be followed to reuse, distribute, and modify software. Apart from widely-used licenses such as the MIT License, developers are also allowed to customize their own licenses (call