首页 > 最新文献

2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)最新文献

英文 中文
Performance Evaluation of Newly Implemented Resource Blocks (RB) Allocation Schemes on NS-3 simulator for mMTC 5G NR (New Radio) Femtocells mMTC 5G NR (New Radio) Femtocells新实现的资源块(RB)分配方案在NS-3模拟器上的性能评估
Ismail Angri, A. Najid, Mohammed Mahfoudi
The new standard of mobile technologies called 5G allows enormous improvements, comparing to the previous telecommunication network system LTE, in terms of user requirements by offering different use cases (eMBB, URLLC and mMTC). With the use of the Internet of Things (IoT) by 5G networks, the number of radio devices by each user will drop from 2 to around 7 to 10 devices. Despite this, the saturation of the system does not arise, thanks to the connected equipment’s high density, offered by Massive machine type communications (mMTC). A Radio Resource Management RRM procedure for efficient distribution of available radio resources between those devices is essential for 5G systems. In this article, we have studied the behavior of scheduling algorithms in a 5G environment, for a large number of connected objects and for different types of data flows, while limiting to small cells (Femtocells) with a speed of 3 km/h of the User Equipment (UE). In this objective, we program in C++ two new scheduling algorithms at the base station gNb, namely Exponential PF (EXP/PF) and Exponential Rule (EXP-rule), in addition to those already existing (Maximum-Weight (MW) and Proportional Fair (PF)), using the mmWave model of the famous NS-3 simulator. The performance comparison of the different 5G scheduler schemes was inspected via two important parameters, which are the user throughput and the Signal-to-Interference-plus-Noise Ratio (SINR). Consequently, we have demonstrated that the scheduling algorithms used by LTE networks can be implemented at the 5G gNB level. The results of our simulations have shown that the EXP-rule algorithm provides the best SINR and DataRate values for voice, video and data streams.
与之前的电信网络系统LTE相比,被称为5G的移动技术新标准通过提供不同的用例(eMBB、URLLC和mMTC),在用户需求方面实现了巨大的改进。随着5G网络使用物联网(IoT),每个用户的无线电设备数量将从2个减少到7到10个左右。尽管如此,由于大型机器类型通信(mMTC)提供的连接设备的高密度,系统不会出现饱和。用于在这些设备之间有效分配可用无线电资源的无线电资源管理RRM程序对于5G系统至关重要。在本文中,我们研究了5G环境下调度算法的行为,针对大量连接对象和不同类型的数据流,同时仅限于用户设备(UE)速度为3公里/小时的小蜂窝(Femtocells)。在此目标中,我们利用著名的NS-3模拟器的毫米波模型,在已有的调度算法(最大权重(MW)和比例公平(PF))的基础上,用c++编程了两种新的基站gNb调度算法,即指数PF (EXP/PF)和指数规则(EXP- Rule)。通过两个重要参数,即用户吞吐量和信噪比(SINR),对不同的5G调度方案进行了性能比较。因此,我们已经证明了LTE网络使用的调度算法可以在5G gNB级别上实现。仿真结果表明EXP-rule算法为语音、视频和数据流提供了最佳的SINR和DataRate值。
{"title":"Performance Evaluation of Newly Implemented Resource Blocks (RB) Allocation Schemes on NS-3 simulator for mMTC 5G NR (New Radio) Femtocells","authors":"Ismail Angri, A. Najid, Mohammed Mahfoudi","doi":"10.1109/CloudTech49835.2020.9365883","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365883","url":null,"abstract":"The new standard of mobile technologies called 5G allows enormous improvements, comparing to the previous telecommunication network system LTE, in terms of user requirements by offering different use cases (eMBB, URLLC and mMTC). With the use of the Internet of Things (IoT) by 5G networks, the number of radio devices by each user will drop from 2 to around 7 to 10 devices. Despite this, the saturation of the system does not arise, thanks to the connected equipment’s high density, offered by Massive machine type communications (mMTC). A Radio Resource Management RRM procedure for efficient distribution of available radio resources between those devices is essential for 5G systems. In this article, we have studied the behavior of scheduling algorithms in a 5G environment, for a large number of connected objects and for different types of data flows, while limiting to small cells (Femtocells) with a speed of 3 km/h of the User Equipment (UE). In this objective, we program in C++ two new scheduling algorithms at the base station gNb, namely Exponential PF (EXP/PF) and Exponential Rule (EXP-rule), in addition to those already existing (Maximum-Weight (MW) and Proportional Fair (PF)), using the mmWave model of the famous NS-3 simulator. The performance comparison of the different 5G scheduler schemes was inspected via two important parameters, which are the user throughput and the Signal-to-Interference-plus-Noise Ratio (SINR). Consequently, we have demonstrated that the scheduling algorithms used by LTE networks can be implemented at the 5G gNB level. The results of our simulations have shown that the EXP-rule algorithm provides the best SINR and DataRate values for voice, video and data streams.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122536831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High-performance computing under availability constraints to solve dense triangular system 可用性约束下的高性能计算求解密集三角形系统
Mounira Belmabrouk, M. Marrakchi
In this paper, we focus on parallel planning applied to a 2-step graph with a constant task cost which is the precedence graph of the algorithm solving a triangular system. We sort the tasks of 2-steps graph using critical path scheduling and we present a new schedule without and with some availability constraints. Some processors may not be available for some time interval. For each described scheduling, we determine the theoretical value of its makespan. Finally, we expose some experimental results.
本文主要研究了求解三角形系统算法的优先图,即具有恒定任务代价的两步图的并行规划问题。利用关键路径调度方法对两步图的任务进行排序,提出了一种不考虑可用性约束和考虑可用性约束的新调度方案。某些处理器可能在一段时间间隔内不可用。对于每个描述的调度,我们确定其最大时间跨度的理论值。最后,给出了一些实验结果。
{"title":"High-performance computing under availability constraints to solve dense triangular system","authors":"Mounira Belmabrouk, M. Marrakchi","doi":"10.1109/CloudTech49835.2020.9365898","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365898","url":null,"abstract":"In this paper, we focus on parallel planning applied to a 2-step graph with a constant task cost which is the precedence graph of the algorithm solving a triangular system. We sort the tasks of 2-steps graph using critical path scheduling and we present a new schedule without and with some availability constraints. Some processors may not be available for some time interval. For each described scheduling, we determine the theoretical value of its makespan. Finally, we expose some experimental results.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare ESSMAR:医疗保健边缘支持安全移动增强现实架构
An Braeken, P. Porambage, Amirthan Puvaneswaran, Madhusanka Liyanage
The recent advances in mobile devices and wireless communication sector transformed Mobile Augmented Reality (MAR) from science fiction to reality. Among the other MAR use cases, the incorporation of this MAR technology in the healthcare sector can elevate the quality of diagnosis and treatment for the patients. However, due to the highly sensitive nature of the data available in this process, it is also highly vulnerable to all types of security threats. In this paper, an edge-based secure architecture is presented for a MAR healthcare application. Based on the ESSMAR architecture, a secure key management scheme is proposed for both the registration and authentication phases. Then the security of the proposed scheme is validated using formal and informal verification methods.
移动设备和无线通信领域的最新进展将移动增强现实(MAR)从科幻小说变为现实。在其他MAR用例中,将这种MAR技术纳入医疗保健部门可以提高患者的诊断和治疗质量。然而,由于此过程中可用数据的高度敏感性,它也极易受到各种安全威胁的攻击。本文为MAR医疗保健应用程序提供了一种基于边缘的安全体系结构。基于ESSMAR体系结构,提出了一种适用于注册和身份验证阶段的安全密钥管理方案。然后采用正式和非正式验证方法对所提出方案的安全性进行了验证。
{"title":"ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare","authors":"An Braeken, P. Porambage, Amirthan Puvaneswaran, Madhusanka Liyanage","doi":"10.1109/CloudTech49835.2020.9365909","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365909","url":null,"abstract":"The recent advances in mobile devices and wireless communication sector transformed Mobile Augmented Reality (MAR) from science fiction to reality. Among the other MAR use cases, the incorporation of this MAR technology in the healthcare sector can elevate the quality of diagnosis and treatment for the patients. However, due to the highly sensitive nature of the data available in this process, it is also highly vulnerable to all types of security threats. In this paper, an edge-based secure architecture is presented for a MAR healthcare application. Based on the ESSMAR architecture, a secure key management scheme is proposed for both the registration and authentication phases. Then the security of the proposed scheme is validated using formal and informal verification methods.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132508667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Graph-based Model for Negative e-WOM Influence in Social Media 基于图的社交媒体e-口碑负面影响模型
Abderraouf Dembri, Mohamed Gharzouli
Nowadays, several companies use social media marketing to increase profit and control the market. The customer’s feedback has a powerful influence on company reputation by conveying their experience in social media. Customers exchange their feedback about the services using electronic Word-of-Mouth (e-WOM). Negative feedback could help companies improve their service to increase profit. In this work, we propose an approach to determine the effect of negative e-WOM relating to a company’s products or services. Firstly, we apply a machine-learning algorithm called random forest to classify e-WOM on three classes based on polarity: Positive, negative, or neutral. Secondly, we group negative e-WOM into different clusters based on their topics using a similarity method named cosine similarity. Thirdly, we generate an influence graph of negative e-WOM based on time precedence and social ties. Finally, we analyze the resulted graph to identify risk patterns and convey useful information. The provided method is implemented using Python and is tested with collected data.
如今,一些公司利用社交媒体营销来增加利润和控制市场。顾客的反馈通过在社交媒体上传达他们的体验,对公司的声誉有很大的影响。顾客透过电子口碑(e-WOM)交换对服务的意见。负面反馈可以帮助公司改善服务,增加利润。在这项工作中,我们提出了一种方法来确定与公司产品或服务相关的负面电子口碑的影响。首先,我们应用一种称为随机森林的机器学习算法,根据极性将e-WOM分为三类:积极、消极或中性。其次,我们使用余弦相似度方法,根据负面电子口碑的主题将其分成不同的类。第三,基于时间优先和社会关系,生成负性电子口碑的影响图。最后,我们对结果图进行分析,以识别风险模式并传达有用信息。所提供的方法使用Python实现,并使用收集的数据进行测试。
{"title":"Graph-based Model for Negative e-WOM Influence in Social Media","authors":"Abderraouf Dembri, Mohamed Gharzouli","doi":"10.1109/CloudTech49835.2020.9365914","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365914","url":null,"abstract":"Nowadays, several companies use social media marketing to increase profit and control the market. The customer’s feedback has a powerful influence on company reputation by conveying their experience in social media. Customers exchange their feedback about the services using electronic Word-of-Mouth (e-WOM). Negative feedback could help companies improve their service to increase profit. In this work, we propose an approach to determine the effect of negative e-WOM relating to a company’s products or services. Firstly, we apply a machine-learning algorithm called random forest to classify e-WOM on three classes based on polarity: Positive, negative, or neutral. Secondly, we group negative e-WOM into different clusters based on their topics using a similarity method named cosine similarity. Thirdly, we generate an influence graph of negative e-WOM based on time precedence and social ties. Finally, we analyze the resulted graph to identify risk patterns and convey useful information. The provided method is implemented using Python and is tested with collected data.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115650992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Breast Cancer Response Prediction using Artificial Intelligence and Radiomics 利用人工智能和放射组学进行乳腺癌反应预测
Yassine Amkrane, M. Adoui, M. Benjelloun
With breast cancer being one of the recurring diseases affecting women around the globe, the World Health Organization disclosed that more than 620,000 women died from breast cancer in the world in 2018 alone, which represents approximately 15% of all female cancer deaths. Thus, breast cancer diagnosis presents one of the main challenges that need to get timely treatments. In this context, multiple image modalities, namely mammography, echography and magnetic resonance Imaging (MRI) are used for breast tumor diagnosis. One of the main treatments of this pathology is chemotherapy. However, several secondary effects (hair loss, osteoporosis, vomiting, etc.) can occur due this treatment, and cancer can not respond to it. This paper aims to suggest a novel method to predict breast tumor response to treatment, using three main steps: 1. Tumor segmentation from MR images ; 2. Extraction of features from segmented tumors in order to generate a complete and exploitable database ; 3. The use of deep and machine learning architectures to compute tumor-response prediction models. Experimental results are applied using a public QIN Breast DCE-MRI dataset of breast cancer patients.
乳腺癌是影响全球女性的经常性疾病之一,世界卫生组织披露,仅2018年,全球就有62万多名女性死于乳腺癌,约占女性癌症死亡人数的15%。因此,乳腺癌的诊断是需要及时治疗的主要挑战之一。在这种情况下,多种图像模式,即乳房x光检查,超声检查和磁共振成像(MRI)用于乳腺肿瘤诊断。这种病理的主要治疗方法之一是化疗。然而,由于这种治疗,可能会出现一些继发性影响(脱发、骨质疏松、呕吐等),而且癌症对它没有反应。本文旨在提出一种预测乳腺肿瘤治疗反应的新方法,主要分为三个步骤:MR图像的肿瘤分割;2. 从分割的肿瘤中提取特征,以生成完整的可利用数据库;3.使用深度和机器学习架构来计算肿瘤反应预测模型。实验结果应用于公开的秦乳腺癌DCE-MRI数据集。
{"title":"Towards Breast Cancer Response Prediction using Artificial Intelligence and Radiomics","authors":"Yassine Amkrane, M. Adoui, M. Benjelloun","doi":"10.1109/CloudTech49835.2020.9365890","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365890","url":null,"abstract":"With breast cancer being one of the recurring diseases affecting women around the globe, the World Health Organization disclosed that more than 620,000 women died from breast cancer in the world in 2018 alone, which represents approximately 15% of all female cancer deaths. Thus, breast cancer diagnosis presents one of the main challenges that need to get timely treatments. In this context, multiple image modalities, namely mammography, echography and magnetic resonance Imaging (MRI) are used for breast tumor diagnosis. One of the main treatments of this pathology is chemotherapy. However, several secondary effects (hair loss, osteoporosis, vomiting, etc.) can occur due this treatment, and cancer can not respond to it. This paper aims to suggest a novel method to predict breast tumor response to treatment, using three main steps: 1. Tumor segmentation from MR images ; 2. Extraction of features from segmented tumors in order to generate a complete and exploitable database ; 3. The use of deep and machine learning architectures to compute tumor-response prediction models. Experimental results are applied using a public QIN Breast DCE-MRI dataset of breast cancer patients.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CloudTech 2020 Contents CloudTech 2020目录
{"title":"CloudTech 2020 Contents","authors":"","doi":"10.1109/cloudtech49835.2020.9365891","DOIUrl":"https://doi.org/10.1109/cloudtech49835.2020.9365891","url":null,"abstract":"","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The key layers of IoT architecture 物联网架构的关键层
Alae-Eddine Bouaouad, A. Cherradi, Assoul Saliha, N. Souissi
The IoT architectures proposed in the literature and which can be deployed in a Cloud environment are diverse and multiple. These architectures are organized in several layers that differ in terms of functionality and number. It is therefore necessary to analyze these architectures and their layers in order to identify the key layers to define a complete and exhaustive architecture. This paper presents the result of the analysis of the different IoT architectures in a Cloud environment, proposed in the literature, and thus allows us to identify initially twelve layers cited in the thirty-two architectures studied. The results of this analysis show that six key layers are relevant to build a new reference architecture of an IoT system in a Cloud environment.
文献中提出的可部署在云环境中的物联网架构是多种多样的。这些体系结构组织在几个层中,这些层在功能和数量上有所不同。因此,有必要对这些体系结构及其层进行分析,以便确定关键的层,以定义完整和详尽的体系结构。本文介绍了文献中提出的云环境中不同物联网架构的分析结果,从而使我们能够初步确定所研究的32个架构中引用的12个层。分析结果表明,六个关键层与在云环境中构建物联网系统的新参考架构相关。
{"title":"The key layers of IoT architecture","authors":"Alae-Eddine Bouaouad, A. Cherradi, Assoul Saliha, N. Souissi","doi":"10.1109/CloudTech49835.2020.9365919","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365919","url":null,"abstract":"The IoT architectures proposed in the literature and which can be deployed in a Cloud environment are diverse and multiple. These architectures are organized in several layers that differ in terms of functionality and number. It is therefore necessary to analyze these architectures and their layers in order to identify the key layers to define a complete and exhaustive architecture. This paper presents the result of the analysis of the different IoT architectures in a Cloud environment, proposed in the literature, and thus allows us to identify initially twelve layers cited in the thirty-two architectures studied. The results of this analysis show that six key layers are relevant to build a new reference architecture of an IoT system in a Cloud environment.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132123355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CloudTech 2020 Copyright Page CloudTech 2020版权页面
{"title":"CloudTech 2020 Copyright Page","authors":"","doi":"10.1109/cloudtech49835.2020.9365894","DOIUrl":"https://doi.org/10.1109/cloudtech49835.2020.9365894","url":null,"abstract":"","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing security classifications and taxonomies: a comprehensive study and comparison 云计算安全分类与分类法:全面研究与比较
Najat Tissir, S. E. Kafhali, N. Aboutabit
Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud’s attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.
云计算是一个不断发展的术语,它受到安全威胁、漏洞和攻击的影响。最近,人们提出了各种分类和分类法来描述和分类云安全问题。其中一些基于一般的安全因素,例如CIA三要素(机密性、完整性和可用性),而另一些则指定云安全类。这些类中的大多数是由云的属性决定的,比如云服务模型、云部署模型和云参与者。在本文中,我们探讨了在云计算安全分类/分类法的发展中已经存在的标准和维度。然后,我们研究和比较他们的优势和特点。此后,我们的目标是提供和开发详尽的云安全分类法,并推动研究人员更好地理解任何新引入的威胁或攻击的性质,对它们进行分类,并解释威胁与其他类别或子类别之间的关系。
{"title":"Cloud Computing security classifications and taxonomies: a comprehensive study and comparison","authors":"Najat Tissir, S. E. Kafhali, N. Aboutabit","doi":"10.1109/CloudTech49835.2020.9365884","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365884","url":null,"abstract":"Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud’s attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128640350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Convex Polyhedron Classifier for Sentiment Analysis 面向情感分析的新型凸多面体分类器
Soufiane El Mrabti, M. Lazaar, Mohammed Al Achhab, Hicham Omara
In this paper, we propose a Novel Convex Polyhedron classifier (NCPC) based on the geometric concept convex hull. NCPC is basically a linear piecewise classifier (LPC). It partitions linearly non-separable data into various linearly separable subsets. For each of these subset of data, a linear hyperplane is used to classify them. We evaluate the performance of this classifier by combining it with two feature selection methods (Chi- squared and Anova F-value). Using two datasets, the results indicate that our proposed classifier outperforms other LPC- based classifiers.
本文提出了一种基于凸壳几何概念的凸多面体分类器(NCPC)。NCPC基本上是线性分段分类器(LPC)。它将线性不可分的数据划分为各种线性可分的子集。对于每一个数据子集,使用一个线性超平面对它们进行分类。我们通过将该分类器与两种特征选择方法(卡方和方差f值)相结合来评估该分类器的性能。使用两个数据集,结果表明我们提出的分类器优于其他基于LPC的分类器。
{"title":"Novel Convex Polyhedron Classifier for Sentiment Analysis","authors":"Soufiane El Mrabti, M. Lazaar, Mohammed Al Achhab, Hicham Omara","doi":"10.1109/CloudTech49835.2020.9365906","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365906","url":null,"abstract":"In this paper, we propose a Novel Convex Polyhedron classifier (NCPC) based on the geometric concept convex hull. NCPC is basically a linear piecewise classifier (LPC). It partitions linearly non-separable data into various linearly separable subsets. For each of these subset of data, a linear hyperplane is used to classify them. We evaluate the performance of this classifier by combining it with two feature selection methods (Chi- squared and Anova F-value). Using two datasets, the results indicate that our proposed classifier outperforms other LPC- based classifiers.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1