首页 > 最新文献

International Journal of Cloud Computing and Database Management最新文献

英文 中文
A cross-Tenant access control with efficient tenant revocation using CRMS scheme in cloud computing 云计算中使用CRMS方案的跨租户访问控制,具有有效的租户撤销
Pub Date : 2020-07-01 DOI: 10.33545/27075907.2020.v1.i2a.14
K. Mounya
{"title":"A cross-Tenant access control with efficient tenant revocation using CRMS scheme in cloud computing","authors":"K. Mounya","doi":"10.33545/27075907.2020.v1.i2a.14","DOIUrl":"https://doi.org/10.33545/27075907.2020.v1.i2a.14","url":null,"abstract":"","PeriodicalId":170946,"journal":{"name":"International Journal of Cloud Computing and Database Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133004062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud resources analysis and prediction system using Deep Neural network 基于深度神经网络的云资源分析与预测系统
Pub Date : 2020-07-01 DOI: 10.33545/27075907.2020.v1.i2a.15
N. Subalakshmi, M. Jeyakarthic
{"title":"Cloud resources analysis and prediction system using Deep Neural network","authors":"N. Subalakshmi, M. Jeyakarthic","doi":"10.33545/27075907.2020.v1.i2a.15","DOIUrl":"https://doi.org/10.33545/27075907.2020.v1.i2a.15","url":null,"abstract":"","PeriodicalId":170946,"journal":{"name":"International Journal of Cloud Computing and Database Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133337954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi authority access control mechanism for secure cloud storage 安全云存储的多权限访问控制机制
Pub Date : 2020-07-01 DOI: 10.33545/27075907.2020.v1.i2a.12
Ponaganti Suneel Kumar
{"title":"Multi authority access control mechanism for secure cloud storage","authors":"Ponaganti Suneel Kumar","doi":"10.33545/27075907.2020.v1.i2a.12","DOIUrl":"https://doi.org/10.33545/27075907.2020.v1.i2a.12","url":null,"abstract":"","PeriodicalId":170946,"journal":{"name":"International Journal of Cloud Computing and Database Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114739001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting cloud based multimedia content using signatures 使用签名保护基于云的多媒体内容
Pub Date : 2020-07-01 DOI: 10.33545/27075907.2020.v1.i2a.13
G. V. Reddy
{"title":"Protecting cloud based multimedia content using signatures","authors":"G. V. Reddy","doi":"10.33545/27075907.2020.v1.i2a.13","DOIUrl":"https://doi.org/10.33545/27075907.2020.v1.i2a.13","url":null,"abstract":"","PeriodicalId":170946,"journal":{"name":"International Journal of Cloud Computing and Database Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130456126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new framework for security and trust in cloud computing 云计算安全与信任的新框架
Pub Date : 2020-01-01 DOI: 10.33545/27075907.2020.v1.i1a.7
Abbas Abazari, A. Hatamlou
{"title":"A new framework for security and trust in cloud computing","authors":"Abbas Abazari, A. Hatamlou","doi":"10.33545/27075907.2020.v1.i1a.7","DOIUrl":"https://doi.org/10.33545/27075907.2020.v1.i1a.7","url":null,"abstract":"","PeriodicalId":170946,"journal":{"name":"International Journal of Cloud Computing and Database Management","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132234828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel symmetric searchable encryption scheme for string identification in cloud computing 云计算中用于字符串识别的一种新的对称可搜索加密方案
Pub Date : 2020-01-01 DOI: 10.33545/27075907.2020.v1.i1a.8
Penumalli Divyalekhya
{"title":"A novel symmetric searchable encryption scheme for string identification in cloud computing","authors":"Penumalli Divyalekhya","doi":"10.33545/27075907.2020.v1.i1a.8","DOIUrl":"https://doi.org/10.33545/27075907.2020.v1.i1a.8","url":null,"abstract":"","PeriodicalId":170946,"journal":{"name":"International Journal of Cloud Computing and Database Management","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123302643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing a new method for link prediction in social networks based on the meta-heuristic algorithm 提出了一种基于元启发式算法的社交网络链接预测新方法
Pub Date : 2020-01-01 DOI: 10.33545/27075907.2020.v1.i1a.6
Amin Rezaeipanah, M. Mokhtari, Milad Boshkani Zadeh
Social network analysis is one of the most important research fields in data mining today. The purpose of the analysis of these networks is to extract the embedded knowledge in the data set and to learn the behavior of users in the social networking environment. One of the most attractive and central applications of social network analysis is link prediction. The purpose of link prediction in social networks is to identify missing and unknown information from users or to predict the future link between two users. In recent years, various artificial intelligence algorithms have been introduced as one of the most important tools for resolving link prediction and big data. In this research, a strategy based on a meta-heuristic is used to improve link prediction in social networks. The proposed method is based on the characteristics of the signed social networks provided and turns the link prediction problem into a two-class classification problem. Then uses the capability of the Particle Swarm Optimization (PSO) and the topological properties of the social network graph to create a database with two classes, the first class pointing to the existence of a connection between the users and the second class pointing to the absence of this relationship. Creates a database using the support vector machine model for categorization work and uses the classic Katz similarity criterion for end-user suggestions. Twitter social network information has been used to compare and evaluate the proposed method. The results of the experiments show the superiority of the proposed method with 0.23, 0.99, and 6.32, respectively, compared to Meta-Path, Katz and CN algorithms in F-measure criterion.
社会网络分析是当今数据挖掘中最重要的研究领域之一。对这些网络进行分析的目的是提取数据集中的嵌入式知识,了解用户在社交网络环境中的行为。链接预测是社交网络分析最具吸引力和最核心的应用之一。社交网络中链接预测的目的是识别来自用户的缺失和未知的信息,或者预测两个用户之间未来的链接。近年来,各种人工智能算法被引入,作为解决链接预测和大数据的重要工具之一。在本研究中,采用一种基于元启发式的策略来改进社交网络中的链接预测。该方法基于所提供的签名社会网络的特征,将链接预测问题转化为两类分类问题。然后利用粒子群优化(PSO)的能力和社交网络图的拓扑属性创建了一个包含两类的数据库,第一类指向用户之间存在连接,第二类指向不存在这种关系。使用支持向量机模型创建用于分类工作的数据库,并使用经典的Katz相似性标准进行最终用户建议。并利用Twitter社交网络信息对所提出的方法进行比较和评价。实验结果表明,在F-measure准则上,与Meta-Path、Katz和CN算法相比,本文方法的优势分别为0.23、0.99和6.32。
{"title":"Providing a new method for link prediction in social networks based on the meta-heuristic algorithm","authors":"Amin Rezaeipanah, M. Mokhtari, Milad Boshkani Zadeh","doi":"10.33545/27075907.2020.v1.i1a.6","DOIUrl":"https://doi.org/10.33545/27075907.2020.v1.i1a.6","url":null,"abstract":"Social network analysis is one of the most important research fields in data mining today. The purpose of the analysis of these networks is to extract the embedded knowledge in the data set and to learn the behavior of users in the social networking environment. One of the most attractive and central applications of social network analysis is link prediction. The purpose of link prediction in social networks is to identify missing and unknown information from users or to predict the future link between two users. In recent years, various artificial intelligence algorithms have been introduced as one of the most important tools for resolving link prediction and big data. In this research, a strategy based on a meta-heuristic is used to improve link prediction in social networks. The proposed method is based on the characteristics of the signed social networks provided and turns the link prediction problem into a two-class classification problem. Then uses the capability of the Particle Swarm Optimization (PSO) and the topological properties of the social network graph to create a database with two classes, the first class pointing to the existence of a connection between the users and the second class pointing to the absence of this relationship. Creates a database using the support vector machine model for categorization work and uses the classic Katz similarity criterion for end-user suggestions. Twitter social network information has been used to compare and evaluate the proposed method. The results of the experiments show the superiority of the proposed method with 0.23, 0.99, and 6.32, respectively, compared to Meta-Path, Katz and CN algorithms in F-measure criterion.","PeriodicalId":170946,"journal":{"name":"International Journal of Cloud Computing and Database Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Cloud Computing and Database Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1