Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Cost Effective Optimal Task Scheduling Model in Hybrid Cloud Environment

    M. Manikandan1,*, R. Subramanian2, M. S. Kavitha3, S. Karthik3

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 935-948, 2022, DOI:10.32604/csse.2022.021816 - 08 February 2022

    Abstract In today’s world, Cloud Computing (CC) enables the users to access computing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located in remote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and task scheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud is employed since it is a capable solution to process large-scale… More >

  • Open Access

    ARTICLE

    Analyzing the Implications of Healthcare Data Breaches through Computational Technique

    Ahmed H. Almulihi1, Fawaz Alassery2, Asif Irshad Khan3, Sarita Shukla4, Bineet Kumar Gupta4, Rajeev Kumar4,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1763-1779, 2022, DOI:10.32604/iasc.2022.023460 - 09 December 2021

    Abstract The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories… More >

Displaying 1-10 on page 1 of 2. Per Page