首页 > 最新文献

Journal of Cloud Computing最新文献

英文 中文
ASOD: an adaptive stream outlier detection method using online strategy ASOD:使用在线策略的自适应流异常点检测方法
Pub Date : 2024-07-05 DOI: 10.1186/s13677-024-00682-0
Zhichao Hu, Xiangzhan Yu, Likun Liu, Yu Zhang, Haining Yu
In the current era of information technology, blockchain is widely used in various fields, and the monitoring of the security and status of the blockchain system is of great concern. Online anomaly detection for the real-time stream data plays vital role in monitoring strategy to find abnormal events and status of blockchain system. However, as the high requirements of real-time and online scenario, online anomaly detection faces many problems such as limited training data, distribution drift, and limited update frequency. In this paper, we propose an adaptive stream outlier detection method (ASOD) to overcome the limitations. It first designs a K-nearest neighbor Gaussian mixture model (KNN-GMM) and utilizes online learning strategy. So, it is suitable for online scenarios and does not rely on large training data. The K-nearest neighbor optimization limits the influence of new data locally rather than globally, thus improving the stability. Then, ASOD applies the mechanism of dynamic maintenance of Gaussian components and the strategy of dynamic context control to achieve self-adaptation to the distribution drift. And finally, ASOD adopts a dimensionless distance metric based on Mahalanobis distance and proposes an automatic threshold method to accomplish anomaly detection. In addition, the KNN-GMM provides the life cycle and the anomaly index for continuous tracking and analysis, which facilities the cause analysis and further interpretation and traceability. From the experimental results, it can be seen that ASOD achieves near-optimal F1 and recall on the NAB dataset with an improvement of 6% and 20.3% over the average, compared to baselines with sufficient training data. ASOD has the lowest F1 variance among the five best methods, indicating that it is effective and stable for online anomaly detection on stream data.
在当前的信息技术时代,区块链被广泛应用于各个领域,对区块链系统安全和状态的监控备受关注。实时流数据的在线异常检测在发现区块链系统异常事件和状态的监控策略中发挥着重要作用。然而,由于实时性和在线场景的高要求,在线异常检测面临着训练数据有限、分布漂移和更新频率有限等诸多问题。本文提出了一种自适应流异常点检测方法(ASOD)来克服上述限制。它首先设计了一个 K 近邻高斯混合模型(KNN-GMM),并采用在线学习策略。因此,它适用于在线场景,且不依赖大量训练数据。K-nearest neighbor 优化限制了新数据对局部而非全局的影响,从而提高了稳定性。然后,ASOD 应用高斯成分动态维护机制和动态上下文控制策略,实现对分布漂移的自适应。最后,ASOD 采用了基于 Mahalanobis 距离的无量纲距离度量,并提出了一种自动阈值方法来完成异常检测。此外,KNN-GMM 还提供了生命周期和异常指数,用于持续跟踪和分析,从而便于分析原因,并进一步解释和追溯。从实验结果可以看出,ASOD 在 NAB 数据集上实现了接近最优的 F1 和召回率,与有足够训练数据的基线相比,平均提高了 6% 和 20.3%。在五种最佳方法中,ASOD 的 F1 方差最小,这表明它对流数据的在线异常检测是有效和稳定的。
{"title":"ASOD: an adaptive stream outlier detection method using online strategy","authors":"Zhichao Hu, Xiangzhan Yu, Likun Liu, Yu Zhang, Haining Yu","doi":"10.1186/s13677-024-00682-0","DOIUrl":"https://doi.org/10.1186/s13677-024-00682-0","url":null,"abstract":"In the current era of information technology, blockchain is widely used in various fields, and the monitoring of the security and status of the blockchain system is of great concern. Online anomaly detection for the real-time stream data plays vital role in monitoring strategy to find abnormal events and status of blockchain system. However, as the high requirements of real-time and online scenario, online anomaly detection faces many problems such as limited training data, distribution drift, and limited update frequency. In this paper, we propose an adaptive stream outlier detection method (ASOD) to overcome the limitations. It first designs a K-nearest neighbor Gaussian mixture model (KNN-GMM) and utilizes online learning strategy. So, it is suitable for online scenarios and does not rely on large training data. The K-nearest neighbor optimization limits the influence of new data locally rather than globally, thus improving the stability. Then, ASOD applies the mechanism of dynamic maintenance of Gaussian components and the strategy of dynamic context control to achieve self-adaptation to the distribution drift. And finally, ASOD adopts a dimensionless distance metric based on Mahalanobis distance and proposes an automatic threshold method to accomplish anomaly detection. In addition, the KNN-GMM provides the life cycle and the anomaly index for continuous tracking and analysis, which facilities the cause analysis and further interpretation and traceability. From the experimental results, it can be seen that ASOD achieves near-optimal F1 and recall on the NAB dataset with an improvement of 6% and 20.3% over the average, compared to baselines with sufficient training data. ASOD has the lowest F1 variance among the five best methods, indicating that it is effective and stable for online anomaly detection on stream data.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141552719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users 基于计算智能的分类系统,用于诊断精神活性物质使用者的记忆损伤
Pub Date : 2024-06-28 DOI: 10.1186/s13677-024-00675-z
Chaoyang Zhu
Computational intelligence techniques have emerged as a promising approach for diagnosing various medical conditions, including memory impairment. Increased abuse of psychoactive drugs poses a global public health burden, as repeated exposure to these substances can cause neurodegeneration, premature aging, and negatively affect memory impairment. Many studies in the literature relied on statistical studies, but they remained inaccurate. Some studies relied on physical data because the time factor was not considered, until Artificial Intelligence (AI) techniques came along that proved their worth in this diagnosis. The variable deep neural network method was used to adapt to the intermediate results and re-process the intermediate in case the result is undesirable. Computational intelligence was used in this study to classify a brain image from MRI or CT scans and to show the effectiveness of the dose ratio on health with treatment time, and to diagnose memory impairment in users of psychoactive substances. Understanding the neurotoxic profiles of psychoactive substances and the underlying pathways is hypothesized to be of great importance in improving the risk assessment and treatment of substance use disorders. The results proved the worth of the proposed method in terms of the accuracy of recognition rate as well as the possibility of diagnosis. It can be concluded that the diagnostic efficiency is increased by increasing the number of hidden layers in the neural network and controlling the weights and variables that control the deep learning algorithm. Thus, we conclude that good classification in this field may save human life or early detection of memory impairment.
计算智能技术已成为诊断包括记忆损伤在内的各种医疗状况的一种很有前途的方法。精神活性药物滥用的增加给全球公共卫生造成了负担,因为反复接触这些物质会导致神经变性、过早衰老,并对记忆损伤产生负面影响。文献中的许多研究依赖于统计研究,但这些研究仍然不准确。一些研究依赖于物理数据,因为没有考虑时间因素,直到人工智能(AI)技术的出现,证明了其在这一诊断中的价值。可变深度神经网络方法用于适应中间结果,并在结果不理想时重新处理中间结果。在这项研究中,计算智能被用于对核磁共振成像或 CT 扫描的大脑图像进行分类,显示剂量比对健康的影响与治疗时间的关系,以及诊断精神活性物质使用者的记忆损伤。据推测,了解精神活性物质的神经毒性特征及其潜在途径对于改善药物使用障碍的风险评估和治疗具有重要意义。研究结果表明,从识别率的准确性和诊断的可能性来看,所提出的方法是有价值的。可以得出的结论是,通过增加神经网络的隐藏层数以及控制深度学习算法的权重和变量,可以提高诊断效率。因此,我们得出结论,在这一领域,良好的分类可以挽救人的生命或早期发现记忆障碍。
{"title":"Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users","authors":"Chaoyang Zhu","doi":"10.1186/s13677-024-00675-z","DOIUrl":"https://doi.org/10.1186/s13677-024-00675-z","url":null,"abstract":"Computational intelligence techniques have emerged as a promising approach for diagnosing various medical conditions, including memory impairment. Increased abuse of psychoactive drugs poses a global public health burden, as repeated exposure to these substances can cause neurodegeneration, premature aging, and negatively affect memory impairment. Many studies in the literature relied on statistical studies, but they remained inaccurate. Some studies relied on physical data because the time factor was not considered, until Artificial Intelligence (AI) techniques came along that proved their worth in this diagnosis. The variable deep neural network method was used to adapt to the intermediate results and re-process the intermediate in case the result is undesirable. Computational intelligence was used in this study to classify a brain image from MRI or CT scans and to show the effectiveness of the dose ratio on health with treatment time, and to diagnose memory impairment in users of psychoactive substances. Understanding the neurotoxic profiles of psychoactive substances and the underlying pathways is hypothesized to be of great importance in improving the risk assessment and treatment of substance use disorders. The results proved the worth of the proposed method in terms of the accuracy of recognition rate as well as the possibility of diagnosis. It can be concluded that the diagnostic efficiency is increased by increasing the number of hidden layers in the neural network and controlling the weights and variables that control the deep learning algorithm. Thus, we conclude that good classification in this field may save human life or early detection of memory impairment.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications 为云原生应用提供基于自适应调度的细粒度灰盒模糊测试
Pub Date : 2024-06-26 DOI: 10.1186/s13677-024-00681-1
Jiageng Yang, Chuanyi Liu, Binxing Fang
Coverage-guided fuzzing is one of the most popular approaches to detect bugs in programs. Existing work has shown that coverage metrics are a crucial factor in guiding fuzzing exploration of targets. A fine-grained coverage metric can help fuzzing to detect more bugs and trigger more execution states. Cloud-native applications that written by Golang play an important role in the modern computing paradigm. However, existing fuzzers for Golang still employ coarse-grained block coverage metrics, and there is no fuzzer specifically for cloud-native applications, which hinders the bug detection in cloud-native applications. Using fine-grained coverage metrics introduces more seeds and even leads to seed explosion, especially in large targets such as cloud-native applications. Therefore, we employ an accurate edge coverage metric in fuzzer for Golang, which achieves finer test granularity and more accurate coverage information than block coverage metrics. To mitigate the seed explosion problem caused by fine-grained coverage metrics and large target sizes, we propose smart seed selection and adaptive task scheduling algorithms based on a variant of the classical adversarial multi-armed bandit (AMAB) algorithm. Extensive evaluation of our prototype on 16 targets in real-world cloud-native infrastructures shows that our approach detects 233% more bugs than go-fuzz, achieving an average coverage improvement of 100.7%. Our approach effectively mitigates seed explosion by reducing the number of seeds generated by 41% and introduces only 14% performance overhead.
覆盖率指导模糊法是检测程序错误最常用的方法之一。现有工作表明,覆盖率指标是指导模糊探索目标的关键因素。细粒度的覆盖率度量有助于模糊检测到更多的错误并触发更多的执行状态。由 Golang 编写的云原生应用程序在现代计算模式中发挥着重要作用。然而,现有的 Golang 模糊器仍然采用粗粒度块覆盖指标,而且没有专门针对云原生应用的模糊器,这阻碍了云原生应用的错误检测。使用细粒度覆盖率指标会引入更多种子,甚至导致种子爆炸,尤其是在云原生应用等大型目标中。因此,我们在 Golang 的模糊器中采用了精确的边缘覆盖指标,它比块覆盖指标实现了更细的测试粒度和更精确的覆盖信息。为了缓解细粒度覆盖指标和大目标规模造成的种子爆炸问题,我们提出了基于经典对抗多臂匪徒(AMAB)算法变体的智能种子选择和自适应任务调度算法。在真实世界云原生基础设施的 16 个目标上对我们的原型进行的广泛评估表明,我们的方法比 go-fuzz 多检测出 233% 的错误,平均覆盖率提高了 100.7%。我们的方法有效缓解了种子爆炸,将生成的种子数量减少了 41%,仅带来 14% 的性能开销。
{"title":"Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications","authors":"Jiageng Yang, Chuanyi Liu, Binxing Fang","doi":"10.1186/s13677-024-00681-1","DOIUrl":"https://doi.org/10.1186/s13677-024-00681-1","url":null,"abstract":"Coverage-guided fuzzing is one of the most popular approaches to detect bugs in programs. Existing work has shown that coverage metrics are a crucial factor in guiding fuzzing exploration of targets. A fine-grained coverage metric can help fuzzing to detect more bugs and trigger more execution states. Cloud-native applications that written by Golang play an important role in the modern computing paradigm. However, existing fuzzers for Golang still employ coarse-grained block coverage metrics, and there is no fuzzer specifically for cloud-native applications, which hinders the bug detection in cloud-native applications. Using fine-grained coverage metrics introduces more seeds and even leads to seed explosion, especially in large targets such as cloud-native applications. Therefore, we employ an accurate edge coverage metric in fuzzer for Golang, which achieves finer test granularity and more accurate coverage information than block coverage metrics. To mitigate the seed explosion problem caused by fine-grained coverage metrics and large target sizes, we propose smart seed selection and adaptive task scheduling algorithms based on a variant of the classical adversarial multi-armed bandit (AMAB) algorithm. Extensive evaluation of our prototype on 16 targets in real-world cloud-native infrastructures shows that our approach detects 233% more bugs than go-fuzz, achieving an average coverage improvement of 100.7%. Our approach effectively mitigates seed explosion by reducing the number of seeds generated by 41% and introduces only 14% performance overhead.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems 基于非正交多址的 MEC,用于电子商务系统中的高能效任务卸载
Pub Date : 2024-06-24 DOI: 10.1186/s13677-024-00680-2
Xiao Zheng, Muhammad Tahir, Khursheed Aurangzeb, Muhammad Shahid Anwar, Muhammad Aamir, Ahmad Farzan, Rizwan Ullah
Mobile edge computing (MEC) reduces the latency for end users to access applications deployed at the edge by offloading tasks to the edge. With the popularity of e-commerce and the expansion of business scale, server load continues to increase, and energy efficiency issues gradually become more prominent. Computation offloading has received widespread attention as a technology that effectively reduces server load. However, how to improve energy efficiency while ensuring computing requirements is an important challenge facing computation offloading. To solve this problem, using non-orthogonal multiple access (NOMA) to increase the efficiency of multi-access wireless transmission, MEC supporting NOMA is investigated in the research. Computing resources will be divided into separate sub-computing that will be handled via e-commerce terminals or transferred to edge sides by reutilizing radio resources, we put forward a Group Switching Matching Algorithm Based on Resource Unit Allocation (GSM-RUA) algorithm that is multi-dimensional. To this end, we first formulate this task allocation problem as a long-term stochastic optimization problem, which we then convert to three short-term deterministic sub-programming problems using Lyapunov optimization, namely, radio resource allocation in a large timescale, computation resource allocating and splitting in a small-time frame. Of the 3 short-term deterministic sub-programming problems, the first sub-programming problem can be remodeled into a 1 to n matching problem, which can be solved using the block-shift-matching-based radio resource allocation method. The latter two sub-programming problems are then transformed into two continuous convex problems by relaxation and then solved easily. We then use simulations to prove that our GSM-RUA algorithm is superior to the state-of-the-art resource management algorithms in terms of energy consumption, efficiency and complexity for e-commerce scenarios.
移动边缘计算(MEC)通过将任务卸载到边缘,减少了终端用户访问部署在边缘的应用程序的延迟。随着电子商务的普及和业务规模的扩大,服务器负载不断增加,能效问题逐渐凸显。计算卸载作为一种能有效降低服务器负载的技术受到了广泛关注。然而,如何在保证计算需求的前提下提高能效是计算卸载面临的重要挑战。为解决这一问题,本研究利用非正交多址接入(NOMA)提高多址无线传输效率,研究了支持 NOMA 的 MEC。计算资源将被划分为独立的子计算,这些子计算将通过电子商务终端处理,或通过无线电资源的再利用转移到边缘侧,我们提出了一种多维的基于资源单元分配的分组切换匹配算法(GSM-RUA)。为此,我们首先将该任务分配问题表述为一个长期随机优化问题,然后利用李亚普诺夫优化法将其转换为三个短期确定性子规划问题,即大时间尺度下的无线电资源分配、小时间范围内的计算资源分配和拆分。在这 3 个短期确定性子规划问题中,第一个子规划问题可以重塑为 1 到 n 的匹配问题,可以使用基于块移匹配的无线电资源分配方法来解决。通过松弛,后两个子规划问题可以转化为两个连续凸问题,然后轻松求解。然后,我们通过仿真证明,在电子商务场景下,我们的 GSM-RUA 算法在能耗、效率和复杂度方面都优于最先进的资源管理算法。
{"title":"Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems","authors":"Xiao Zheng, Muhammad Tahir, Khursheed Aurangzeb, Muhammad Shahid Anwar, Muhammad Aamir, Ahmad Farzan, Rizwan Ullah","doi":"10.1186/s13677-024-00680-2","DOIUrl":"https://doi.org/10.1186/s13677-024-00680-2","url":null,"abstract":"Mobile edge computing (MEC) reduces the latency for end users to access applications deployed at the edge by offloading tasks to the edge. With the popularity of e-commerce and the expansion of business scale, server load continues to increase, and energy efficiency issues gradually become more prominent. Computation offloading has received widespread attention as a technology that effectively reduces server load. However, how to improve energy efficiency while ensuring computing requirements is an important challenge facing computation offloading. To solve this problem, using non-orthogonal multiple access (NOMA) to increase the efficiency of multi-access wireless transmission, MEC supporting NOMA is investigated in the research. Computing resources will be divided into separate sub-computing that will be handled via e-commerce terminals or transferred to edge sides by reutilizing radio resources, we put forward a Group Switching Matching Algorithm Based on Resource Unit Allocation (GSM-RUA) algorithm that is multi-dimensional. To this end, we first formulate this task allocation problem as a long-term stochastic optimization problem, which we then convert to three short-term deterministic sub-programming problems using Lyapunov optimization, namely, radio resource allocation in a large timescale, computation resource allocating and splitting in a small-time frame. Of the 3 short-term deterministic sub-programming problems, the first sub-programming problem can be remodeled into a 1 to n matching problem, which can be solved using the block-shift-matching-based radio resource allocation method. The latter two sub-programming problems are then transformed into two continuous convex problems by relaxation and then solved easily. We then use simulations to prove that our GSM-RUA algorithm is superior to the state-of-the-art resource management algorithms in terms of energy consumption, efficiency and complexity for e-commerce scenarios.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141532336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system 基于沙米尔秘密共享的电子病历云系统多时间服务器定时释放加密技术
Pub Date : 2024-06-12 DOI: 10.1186/s13677-024-00676-y
Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun, Sufang Zhou, Chunfu Jia
Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient information. However, ensuring the security of EHR cloud system remains a critical issue. Some patients require regular remote medical services, and controlling access to medical data involving patient privacy during specific times is essential. Timed-release encryption (TRE) technology enables the sender to preset a future time T at which the data can be decrypted and accessed. It is a cryptographic primitive with time-dependent properties. Currently, mainstream TRE schemes are based on non-interactive single time server methods. However, if the single time server is attacked or corrupted, it is easy to directly threaten the security applications of TRE. Although some research schemes “distribute” the single time server into multiple ones, they still cannot resist the single point of failure problem. To address this issue, we propose a multiple time servers TRE scheme based on Shamir secret sharing and another variant derived from it. In our proposed schemes, the data receiver does not need to interact with the time servers; instead, they only need to obtain the time trapdoors that exceed or equal the preset threshold value for decryption, which ensures the identity privacy of the data sender and tolerates partial downtime or other failures of some time servers, significantly improving TRE reliability. Security analysis indicates that our proposed schemes demonstrate data confidentiality, verifiability, anti-advance decryption, and robust decryption with multiple time trapdoors, making them more practical. Efficiency analysis indicates that although our schemes have slightly higher computational costs than most efficient existing TRE schemes, such differences are insignificant from a practical application perspective.
电子病历(EHR)云系统作为推动医疗数据信息化的主要工具,通过提供准确、完整的患者信息,对医生和患者都产生了积极影响。然而,确保电子病历云系统的安全性仍然是一个关键问题。有些患者需要定期接受远程医疗服务,因此必须控制在特定时间内对涉及患者隐私的医疗数据的访问。定时释放加密(TRE)技术使发送方能够预设一个未来时间 T,在该时间 T 上可以解密和访问数据。它是一种加密原语,具有随时间变化的特性。目前,主流的 TRE 方案都基于非交互式单一时间服务器方法。然而,如果单一时间服务器受到攻击或损坏,很容易直接威胁到 TRE 的安全应用。虽然一些研究方案将单个时间服务器 "分布 "到多个时间服务器中,但仍无法抵御单点故障问题。针对这一问题,我们提出了一种基于 Shamir 秘密共享的多时间服务器 TRE 方案,以及由其衍生出的另一种变体。在我们提出的方案中,数据接收方不需要与时间服务器交互,而只需要获取超过或等于预设阈值的时间陷阱门进行解密,这样既保证了数据发送方的身份隐私,又能容忍部分时间服务器的部分宕机或其他故障,大大提高了 TRE 的可靠性。安全性分析表明,我们提出的方案具有数据保密性、可验证性、防提前解密性和使用多个时间陷阱门的稳健解密性,因此更加实用。效率分析表明,虽然我们的方案的计算成本略高于现有的大多数高效 TRE 方案,但从实际应用的角度来看,这种差异并不明显。
{"title":"Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system","authors":"Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun, Sufang Zhou, Chunfu Jia","doi":"10.1186/s13677-024-00676-y","DOIUrl":"https://doi.org/10.1186/s13677-024-00676-y","url":null,"abstract":"Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient information. However, ensuring the security of EHR cloud system remains a critical issue. Some patients require regular remote medical services, and controlling access to medical data involving patient privacy during specific times is essential. Timed-release encryption (TRE) technology enables the sender to preset a future time T at which the data can be decrypted and accessed. It is a cryptographic primitive with time-dependent properties. Currently, mainstream TRE schemes are based on non-interactive single time server methods. However, if the single time server is attacked or corrupted, it is easy to directly threaten the security applications of TRE. Although some research schemes “distribute” the single time server into multiple ones, they still cannot resist the single point of failure problem. To address this issue, we propose a multiple time servers TRE scheme based on Shamir secret sharing and another variant derived from it. In our proposed schemes, the data receiver does not need to interact with the time servers; instead, they only need to obtain the time trapdoors that exceed or equal the preset threshold value for decryption, which ensures the identity privacy of the data sender and tolerates partial downtime or other failures of some time servers, significantly improving TRE reliability. Security analysis indicates that our proposed schemes demonstrate data confidentiality, verifiability, anti-advance decryption, and robust decryption with multiple time trapdoors, making them more practical. Efficiency analysis indicates that although our schemes have slightly higher computational costs than most efficient existing TRE schemes, such differences are insignificant from a practical application perspective.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework 高效定位云基础设施的系统异常:基于动态图变换器的新型并行框架
Pub Date : 2024-06-04 DOI: 10.1186/s13677-024-00677-x
Hongxia He, Xi Li, Peng Chen, Juan Chen, Ming Liu, Lei Wu
Cloud environment is a virtual, online, and distributed computing environment that provides users with large-scale services. And cloud monitoring plays an integral role in protecting infrastructures in the cloud environment. Cloud monitoring systems need to closely monitor various KPIs of cloud resources, to accurately detect anomalies. However, due to the complexity and highly dynamic nature of the cloud environment, anomaly detection for these KPIs with various patterns and data quality is a huge challenge, especially those massive unlabeled data. Besides, it’s also difficult to improve the accuracy of the existing anomaly detection methods. To solve these problems, we propose a novel Dynamic Graph Transformer based Parallel Framework (DGT-PF) for efficiently detect system anomalies in cloud infrastructures, which utilizes Transformer with anomaly attention mechanism and Graph Neural Network (GNN) to learn the spatio-temporal features of KPIs to improve the accuracy and timeliness of model anomaly detection. Specifically, we propose an effective dynamic relationship embedding strategy to dynamically learn spatio-temporal features and adaptively generate adjacency matrices, and soft cluster each GNN layer through Diffpooling module. In addition, we also use nonlinear neural network model and AR-MLP model in parallel to obtain better detection accuracy and improve detection performance. The experiment shows that the DGT-PF framework have achieved the highest F1-Score on 5 public datasets, with an average improvement of 21.6% compared to 11 anomaly detection models.
云环境是一种虚拟、在线和分布式计算环境,可为用户提供大规模服务。云监控在保护云环境中的基础设施方面发挥着不可或缺的作用。云监控系统需要密切监控云资源的各种关键绩效指标,以准确检测异常情况。然而,由于云环境的复杂性和高度动态性,对这些具有不同模式和数据质量的 KPI 进行异常检测是一项巨大的挑战,尤其是那些海量的无标记数据。此外,提高现有异常检测方法的准确性也很困难。为了解决这些问题,我们提出了一种新颖的基于动态图变换器的并行框架(DGT-PF),用于有效检测云基础设施中的系统异常,该框架利用带有异常关注机制的变换器和图神经网络(GNN)来学习 KPI 的时空特征,从而提高模型异常检测的准确性和及时性。具体来说,我们提出了一种有效的动态关系嵌入策略,以动态学习时空特征并自适应生成邻接矩阵,并通过 Diffpooling 模块对每个 GNN 层进行软聚类。此外,我们还并行使用了非线性神经网络模型和 AR-MLP 模型,以获得更好的检测精度,提高检测性能。实验结果表明,DGT-PF 框架在 5 个公共数据集上取得了最高的 F1 分数,与 11 个异常检测模型相比,平均提高了 21.6%。
{"title":"Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework","authors":"Hongxia He, Xi Li, Peng Chen, Juan Chen, Ming Liu, Lei Wu","doi":"10.1186/s13677-024-00677-x","DOIUrl":"https://doi.org/10.1186/s13677-024-00677-x","url":null,"abstract":"Cloud environment is a virtual, online, and distributed computing environment that provides users with large-scale services. And cloud monitoring plays an integral role in protecting infrastructures in the cloud environment. Cloud monitoring systems need to closely monitor various KPIs of cloud resources, to accurately detect anomalies. However, due to the complexity and highly dynamic nature of the cloud environment, anomaly detection for these KPIs with various patterns and data quality is a huge challenge, especially those massive unlabeled data. Besides, it’s also difficult to improve the accuracy of the existing anomaly detection methods. To solve these problems, we propose a novel Dynamic Graph Transformer based Parallel Framework (DGT-PF) for efficiently detect system anomalies in cloud infrastructures, which utilizes Transformer with anomaly attention mechanism and Graph Neural Network (GNN) to learn the spatio-temporal features of KPIs to improve the accuracy and timeliness of model anomaly detection. Specifically, we propose an effective dynamic relationship embedding strategy to dynamically learn spatio-temporal features and adaptively generate adjacency matrices, and soft cluster each GNN layer through Diffpooling module. In addition, we also use nonlinear neural network model and AR-MLP model in parallel to obtain better detection accuracy and improve detection performance. The experiment shows that the DGT-PF framework have achieved the highest F1-Score on 5 public datasets, with an average improvement of 21.6% compared to 11 anomaly detection models.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141256385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From data to insights: the application and challenges of knowledge graphs in intelligent audit 从数据到见解:知识图谱在智能审计中的应用与挑战
Pub Date : 2024-05-29 DOI: 10.1186/s13677-024-00674-0
Hao Zhong, Dong Yang, Shengdong Shi, Lai Wei, Yanyan Wang
In recent years, knowledge graph technology has been widely applied in various fields such as intelligent auditing, urban transportation planning, legal research, and financial analysis. In traditional auditing methods, there are inefficiencies in data integration and analysis, making it difficult to achieve deep correlation analysis and risk identification among data. Additionally, decision support systems in the auditing process may face issues of insufficient information interpretability and limited predictive capability, thus affecting the quality of auditing and the scientificity of decision-making. However, knowledge graphs, by constructing rich networks of entity relationships, provide deep knowledge support for areas such as intelligent search, recommendation systems, and semantic understanding, significantly improving the accuracy and efficiency of information processing. This presents new opportunities to address the challenges of traditional auditing techniques. In this paper, we investigate the integration of intelligent auditing and knowledge graphs, focusing on the application of knowledge graph technology in auditing work for power engineering projects. We particularly emphasize mainstream key technologies of knowledge graphs, such as data extraction, knowledge fusion, and knowledge graph reasoning. We also introduce the application of knowledge graph technology in intelligent auditing, such as improving auditing efficiency and identifying auditing risks. Furthermore, considering the environment of cloud-edge collaboration to reduce computing latency, knowledge graphs can also play an important role in intelligent auditing. By integrating knowledge graph technology with cloud-edge collaboration, distributed computing and data processing can be achieved, reducing computing latency and improving the response speed and efficiency of intelligent auditing systems. Finally, we summarize the current research status, outlining the challenges faced by knowledge graph technology in the field of intelligent auditing, such as scalability and security. At the same time, we elaborate on the future development trends and opportunities of knowledge graphs in intelligent auditing.
近年来,知识图谱技术被广泛应用于智能审计、城市交通规划、法律研究、金融分析等多个领域。在传统的审计方法中,数据整合和分析效率低下,难以实现数据间的深度关联分析和风险识别。此外,审计过程中的决策支持系统还可能面临信息可解释性不足、预测能力有限等问题,从而影响审计质量和决策的科学性。然而,知识图谱通过构建丰富的实体关系网络,为智能搜索、推荐系统、语义理解等领域提供了深层次的知识支持,大大提高了信息处理的准确性和效率。这为应对传统审计技术的挑战提供了新的机遇。本文研究了智能审计与知识图谱的融合,重点探讨了知识图谱技术在电力工程审计工作中的应用。我们特别强调了知识图谱的主流关键技术,如数据提取、知识融合和知识图谱推理。我们还介绍了知识图谱技术在智能审计中的应用,如提高审计效率、识别审计风险等。此外,考虑到云边协作以减少计算延迟的环境,知识图谱也可以在智能审计中发挥重要作用。通过将知识图谱技术与云边协作相结合,可以实现分布式计算和数据处理,减少计算延迟,提高智能审计系统的响应速度和效率。最后,我们总结了当前的研究现状,概述了知识图谱技术在智能审计领域面临的挑战,如可扩展性和安全性。同时,我们还阐述了知识图谱在智能审计领域的未来发展趋势和机遇。
{"title":"From data to insights: the application and challenges of knowledge graphs in intelligent audit","authors":"Hao Zhong, Dong Yang, Shengdong Shi, Lai Wei, Yanyan Wang","doi":"10.1186/s13677-024-00674-0","DOIUrl":"https://doi.org/10.1186/s13677-024-00674-0","url":null,"abstract":"In recent years, knowledge graph technology has been widely applied in various fields such as intelligent auditing, urban transportation planning, legal research, and financial analysis. In traditional auditing methods, there are inefficiencies in data integration and analysis, making it difficult to achieve deep correlation analysis and risk identification among data. Additionally, decision support systems in the auditing process may face issues of insufficient information interpretability and limited predictive capability, thus affecting the quality of auditing and the scientificity of decision-making. However, knowledge graphs, by constructing rich networks of entity relationships, provide deep knowledge support for areas such as intelligent search, recommendation systems, and semantic understanding, significantly improving the accuracy and efficiency of information processing. This presents new opportunities to address the challenges of traditional auditing techniques. In this paper, we investigate the integration of intelligent auditing and knowledge graphs, focusing on the application of knowledge graph technology in auditing work for power engineering projects. We particularly emphasize mainstream key technologies of knowledge graphs, such as data extraction, knowledge fusion, and knowledge graph reasoning. We also introduce the application of knowledge graph technology in intelligent auditing, such as improving auditing efficiency and identifying auditing risks. Furthermore, considering the environment of cloud-edge collaboration to reduce computing latency, knowledge graphs can also play an important role in intelligent auditing. By integrating knowledge graph technology with cloud-edge collaboration, distributed computing and data processing can be achieved, reducing computing latency and improving the response speed and efficiency of intelligent auditing systems. Finally, we summarize the current research status, outlining the challenges faced by knowledge graph technology in the field of intelligent auditing, such as scalability and security. At the same time, we elaborate on the future development trends and opportunities of knowledge graphs in intelligent auditing.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"64 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141198279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HybOff: a Hybrid Offloading approach to improve load balancing in fog environments HybOff:改进雾环境负载平衡的混合卸载方法
Pub Date : 2024-05-28 DOI: 10.1186/s13677-024-00663-3
Hamza Sulimani, Rahaf Sulimani, Fahimeh Ramezani, Mohsen Naderpour, Huan Huo, Tony Jan, Mukesh Prasad
Load balancing is crucial in distributed systems like fog computing, where efficiency is paramount. Offloading with different approaches is the key to balancing the load in distributed environments. Static offloading (SoA) falls short in heterogeneous networks, necessitating dynamic offloading to reduce latency in time-sensitive tasks. However, prevalent dynamic offloading (PoA) solutions often come with hidden costs that impact sensitive applications, including decision time, networks congested and distance offloading. This paper introduces the Hybrid Offloading (HybOff) algorithm, which substantially enhances load balancing and resource utilization in fog networks, addressing issues in both static and dynamic approaches while leveraging clustering theory. Its goal is to create an uncomplicated low-cost offloading approach that enhances IoT application performance by eliminating the consequences of hidden costs regardless of network size. Experimental results using the iFogSim simulation tool show that HybOff significantly reduces offloading messages, distance, and decision-offloading consequences. It improves load balancing by 97%, surpassing SoA (64%) and PoA (88%). Additionally, it increases system utilization by an average of 50% and enhances system performance 1.6 times and 1.4 times more than SoA and PoA, respectively. In summary, this paper tries to introduce a new offloading approach in load balancing research in fog environments.
在雾计算等效率至关重要的分布式系统中,负载平衡至关重要。在分布式环境中,采用不同方法进行卸载是平衡负载的关键。在异构网络中,静态卸载(SoA)存在不足,因此需要动态卸载来减少时间敏感任务的延迟。然而,流行的动态卸载(PoA)解决方案往往会带来隐性成本,影响敏感应用,包括决策时间、网络拥塞和距离卸载。本文介绍了混合卸载(HybOff)算法,该算法利用聚类理论解决了静态和动态方法中的问题,大大提高了雾网络中的负载平衡和资源利用率。其目标是创建一种不复杂的低成本卸载方法,通过消除隐藏成本的后果来提高物联网应用性能,而与网络规模无关。使用 iFogSim 仿真工具的实验结果表明,HybOff 能显著减少卸载信息、距离和决策卸载后果。它将负载平衡提高了 97%,超过了 SoA(64%)和 PoA(88%)。此外,它平均提高了 50%的系统利用率,系统性能分别是 SoA 和 PoA 的 1.6 倍和 1.4 倍。总之,本文试图在雾环境负载平衡研究中引入一种新的卸载方法。
{"title":"HybOff: a Hybrid Offloading approach to improve load balancing in fog environments","authors":"Hamza Sulimani, Rahaf Sulimani, Fahimeh Ramezani, Mohsen Naderpour, Huan Huo, Tony Jan, Mukesh Prasad","doi":"10.1186/s13677-024-00663-3","DOIUrl":"https://doi.org/10.1186/s13677-024-00663-3","url":null,"abstract":"Load balancing is crucial in distributed systems like fog computing, where efficiency is paramount. Offloading with different approaches is the key to balancing the load in distributed environments. Static offloading (SoA) falls short in heterogeneous networks, necessitating dynamic offloading to reduce latency in time-sensitive tasks. However, prevalent dynamic offloading (PoA) solutions often come with hidden costs that impact sensitive applications, including decision time, networks congested and distance offloading. This paper introduces the Hybrid Offloading (HybOff) algorithm, which substantially enhances load balancing and resource utilization in fog networks, addressing issues in both static and dynamic approaches while leveraging clustering theory. Its goal is to create an uncomplicated low-cost offloading approach that enhances IoT application performance by eliminating the consequences of hidden costs regardless of network size. Experimental results using the iFogSim simulation tool show that HybOff significantly reduces offloading messages, distance, and decision-offloading consequences. It improves load balancing by 97%, surpassing SoA (64%) and PoA (88%). Additionally, it increases system utilization by an average of 50% and enhances system performance 1.6 times and 1.4 times more than SoA and PoA, respectively. In summary, this paper tries to introduce a new offloading approach in load balancing research in fog environments.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141172132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data 基于身份的分层认证加密与加密云数据上的关键词搜索
Pub Date : 2024-05-26 DOI: 10.1186/s13677-024-00633-9
Danial Shiraly, Ziba Eslami, Nasrollah Pakniat
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern. Searchable Encryption (SE) is an effective method for protecting sensitive data while preserving server-side searchability. Hierarchical Public key Encryption with Keyword Search (HPEKS), a new variant of SE, allows users with higher access permission to search over encrypted data sent to lower-level users. To the best of our knowledge, there exist only four HPEKS schemes in the literature. Two of them are in traditional public-key setting, and the remaining ones are identity-based public key cryptosystems. Unfortunately, all of the four existing HPEKS schemes are vulnerable against inside Keyword Guessing Attacks (KGAs). Moreover, all of the existing HPEKS schemes are based on the computationally expensive bilinear pairing operation which dramatically increases the computational costs. To overcome these issues, in this paper, we introduce the notion of Hierarchical Identity-Based Authenticated Encryption with Keyword Search (HIBAEKS). We formulate a security model for HIBAEKS and propose an efficient pairing-free HIBAEKS scheme. We then prove that the proposed HIBAEKS scheme is secure under the defined security model and is resistant against KGAs. Finally, we compare our proposed scheme with related constructions regarding security requirements, computational and communication costs to indicate the overall superiority of our proposed scheme.
随着云计算技术的飞速发展,云存储服务也日趋成熟。然而,在远程服务器上存储敏感数据会带来隐私风险,目前已引起人们的关注。可搜索加密(SE)是一种既能保护敏感数据,又能保持服务器端可搜索性的有效方法。具有关键字搜索功能的分级公钥加密(HPEKS)是 SE 的一种新变体,它允许具有较高访问权限的用户搜索发送给较低级别用户的加密数据。据我们所知,文献中只有四种 HPEKS 方案。其中两个是传统公钥方案,其余的是基于身份的公钥密码系统。遗憾的是,现有的四种 HPEKS 方案都容易受到内部关键词猜测攻击(KGA)的攻击。此外,所有现有的 HPEKS 方案都基于计算昂贵的双线性配对操作,这大大增加了计算成本。为了克服这些问题,我们在本文中引入了基于身份认证的关键词搜索分层加密(HIBAEKS)概念。我们为 HIBAEKS 建立了一个安全模型,并提出了一种高效的无配对 HIBAEKS 方案。然后,我们证明了所提出的 HIBAEKS 方案在所定义的安全模型下是安全的,并且可以抵御 KGA。最后,我们比较了我们提出的方案与相关结构在安全要求、计算和通信成本方面的差异,以说明我们提出的方案的整体优越性。
{"title":"Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data","authors":"Danial Shiraly, Ziba Eslami, Nasrollah Pakniat","doi":"10.1186/s13677-024-00633-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00633-9","url":null,"abstract":"With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern. Searchable Encryption (SE) is an effective method for protecting sensitive data while preserving server-side searchability. Hierarchical Public key Encryption with Keyword Search (HPEKS), a new variant of SE, allows users with higher access permission to search over encrypted data sent to lower-level users. To the best of our knowledge, there exist only four HPEKS schemes in the literature. Two of them are in traditional public-key setting, and the remaining ones are identity-based public key cryptosystems. Unfortunately, all of the four existing HPEKS schemes are vulnerable against inside Keyword Guessing Attacks (KGAs). Moreover, all of the existing HPEKS schemes are based on the computationally expensive bilinear pairing operation which dramatically increases the computational costs. To overcome these issues, in this paper, we introduce the notion of Hierarchical Identity-Based Authenticated Encryption with Keyword Search (HIBAEKS). We formulate a security model for HIBAEKS and propose an efficient pairing-free HIBAEKS scheme. We then prove that the proposed HIBAEKS scheme is secure under the defined security model and is resistant against KGAs. Finally, we compare our proposed scheme with related constructions regarding security requirements, computational and communication costs to indicate the overall superiority of our proposed scheme.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN 更正:利用 DenseNet 和 CNN 进行数据融合和移动边缘计算,增强肺癌诊断能力
Pub Date : 2024-05-26 DOI: 10.1186/s13677-024-00673-1
Chengping Zhang, Muhammad Aamir, Yurong Guan, Muna Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi

Following publication of the original article [1], we have been notified that Acknowledgement declaration was published incorrectly.

It is now:

Acknowledgements

The authors express their gratitude to Huanggang Normal University for supporting this research. Furthermore, they acknowledge the support from King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Program number (RSPD2024R206).

It should be as per below:

Acknowledgements

The authors express their gratitude to Huanggang Normal University for supporting this research. Furthermore, they acknowledge the support from King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Program number (RSP2024R206).

  1. Zhang, CNN (2024) Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and (2024). 17:13 https://doi.org/10.1186/s13677-024-00597-w

Download references

The authors express their gratitude to Huanggang Normal University for supporting this research. Furthermore, they acknowledge the support from King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Program number (RSP2024R206).

Authors and Affiliations

  1. Mechanical and Electrical Engineering College, Hainan Vocational University of Science and Technology, Haikou, 571126, China

    Chengping Zhang

  2. College of Computer Science, Huanggang Normal University, Huanggang, 438000, China

    Muhammad Aamir & Yurong Guan

  3. Department of Software Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 22452, Riyadh, 11495, Saudi Arabia

    Muna Al-Razgan

  4. Department of Electrical Engineering, College of Engineering, King Saud University, P.O. Box 800, Riyadh, 11421, Saudi Arabia

    Emad Mahrous Awwad

  5. Faculty of Engineering, Chulalongkorn University Bangkok Thailand, Bangkok, Thailand

    Rizwan Ullah

  6. School of Information and Communication Engineering, Hainan University, Haikou, Hainan, China

    Uzair Aslam Bhatti

  7. Department of Computer Science, Al Ain University, Al Ain, UAE

    Yazeed Yasin Ghadi

Authors
  1. Chengping ZhangView author publications

    You can also search for this author in PubMed Google Scholar

  2. Muhammad AamirView author publications

    You can also search for this author in PubMed Google Scholar

  3. Yurong GuanView author publications

    You can also search for this author in PubMed Google Scholar

  4. Muna
原文[1]发表后,我们被告知致谢声明有误,现改为:致谢作者感谢黄冈师范学院对本研究的支持。此外,他们感谢沙特阿拉伯利雅得沙特国王大学通过研究人员支持项目编号(RSPD2024R206)提供的支持。应如下所示:致谢作者感谢黄冈师范学院对本研究的支持。此外,作者还感谢沙特阿拉伯利雅得沙特国王大学通过研究人员支持项目编号(RSP2024R206)提供的支持。Zhang, CNN (2024) Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and (2024).17:13 https://doi.org/10.1186/s13677-024-00597-wDownload 参考文献作者感谢黄冈师范学院对本研究的支持。此外,他们感谢沙特阿拉伯利雅得沙特国王大学通过研究人员支持计划编号(RSP2024R206)提供的支持。作者及工作单位海南职业技术学院机电工程学院,中国海口,571126张成平黄冈师范学院计算机科学学院,中国黄冈,438000穆罕默德-阿米尔& 关玉荣沙特国王大学计算机与信息科学学院软件工程系,P. O. Box 22452, Riyadh, Saudi Arabia.O. Box 22452, Riyadh, 11495, Saudi Arabia Muna Al-RazganDepartment of Electrical Engineering, College of Engineering, King Saud University, P.O. Box 800, Riyadh, 11495, Saudi ArabiaBox 800, Riyadh, 11421, Saudi ArabiaEmad Mahrous AwwadFaculty of Engineering, Chulalongkorn University Bangkok Thailand, Bangkok, ThailandRizwan UllahSchool of Information and Communication Engineering, Hainan University, Haikou, Hainan, ChinaUzair Aslam BhattiDepartment of Computer Science, Al Ain University, Al Ain、UAEYazeed Yasin GhadiAuthorsChengping ZhangView author publications您也可以在PubMed Google Scholar中搜索该作者Muhammad AamirView author publications您也可以在PubMed Google Scholar中搜索该作者Yurong GuanView author publications您也可以在PubMed Google Scholar中搜索该作者Muna Al-Razgan查看作者发表的论文您也可以在PubMed Google学术中搜索该作者Emad Mahrous Awwad查看作者发表的论文您也可以在PubMed Google学术中搜索该作者Rizwan Ullah查看作者发表的论文您也可以在PubMed Google学术中搜索该作者Google ScholarUzair Aslam BhattiView 作者发表作品您也可以在 PubMed Google ScholarYazeed Yasin GhadiView 作者发表作品您也可以在 PubMed Google ScholarCorresponding authorCorrespondence to Muhammad Aamir.出版商注释Springer Nature对出版地图中的管辖权主张和机构隶属关系保持中立。原文的在线版本可在以下网址找到:https://doi.org/10.1186/s13677-024-00597-w.Open Access 本文采用知识共享署名 4.0 国际许可协议进行许可,该协议允许以任何媒介或格式使用、共享、改编、分发和复制,只要您适当注明原作者和来源,提供知识共享许可协议的链接,并说明是否进行了修改。本文中的图片或其他第三方材料均包含在文章的知识共享许可协议中,除非在材料的署名栏中另有说明。如果材料未包含在文章的知识共享许可协议中,且您打算使用的材料不符合法律规定或超出许可使用范围,则您需要直接从版权所有者处获得许可。如需查看该许可的副本,请访问 http://creativecommons.org/licenses/by/4.0/.Reprints and permissionsCite this articleZhang, C., Aamir, M., Guan, Y. et al. Correction to:利用DenseNet和CNN通过数据融合和移动边缘计算增强肺癌诊断。J Cloud Comp 13, 111 (2024). https://doi.org/10.1186/s13677-024-00673-1Download citationPublished: 26 May 2024DOI: https://doi.org/10.1186/s13677-024-00673-1Share this articleAnyone you share the following link with will be able to read this content:Get shareable linkSorry, a shareable link is not currently available for this article.Copy to clipboard Provided by the Springer Nature SharedIt content-sharing initiative
{"title":"Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN","authors":"Chengping Zhang, Muhammad Aamir, Yurong Guan, Muna Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi","doi":"10.1186/s13677-024-00673-1","DOIUrl":"https://doi.org/10.1186/s13677-024-00673-1","url":null,"abstract":"<p>Following publication of the original article [1], we have been notified that Acknowledgement declaration was published incorrectly.</p><p>It is now:</p><p>Acknowledgements</p><p>The authors express their gratitude to Huanggang Normal University for supporting this research. Furthermore, they acknowledge the support from King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Program number (RSPD2024R206).</p><p>It should be as per below:</p><p>Acknowledgements</p><p>The authors express their gratitude to Huanggang Normal University for supporting this research. Furthermore, they acknowledge the support from King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Program number (RSP2024R206).</p><ol data-track-component=\"outbound reference\"><li data-counter=\"1.\"><p>Zhang, CNN (2024) Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and (2024). 17:13 https://doi.org/10.1186/s13677-024-00597-w</p></li></ol><p>Download references<svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" role=\"img\" width=\"16\"><use xlink:href=\"#icon-eds-i-download-medium\" xmlns:xlink=\"http://www.w3.org/1999/xlink\"></use></svg></p><p>The authors express their gratitude to Huanggang Normal University for supporting this research. Furthermore, they acknowledge the support from King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Program number (RSP2024R206).</p><h3>Authors and Affiliations</h3><ol><li><p>Mechanical and Electrical Engineering College, Hainan Vocational University of Science and Technology, Haikou, 571126, China</p><p>Chengping Zhang</p></li><li><p>College of Computer Science, Huanggang Normal University, Huanggang, 438000, China</p><p>Muhammad Aamir &amp; Yurong Guan</p></li><li><p>Department of Software Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 22452, Riyadh, 11495, Saudi Arabia</p><p>Muna Al-Razgan</p></li><li><p>Department of Electrical Engineering, College of Engineering, King Saud University, P.O. Box 800, Riyadh, 11421, Saudi Arabia</p><p>Emad Mahrous Awwad</p></li><li><p>Faculty of Engineering, Chulalongkorn University Bangkok Thailand, Bangkok, Thailand</p><p>Rizwan Ullah</p></li><li><p>School of Information and Communication Engineering, Hainan University, Haikou, Hainan, China</p><p>Uzair Aslam Bhatti</p></li><li><p>Department of Computer Science, Al Ain University, Al Ain, UAE</p><p>Yazeed Yasin Ghadi</p></li></ol><span>Authors</span><ol><li><span>Chengping Zhang</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Muhammad Aamir</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Yurong Guan</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Muna ","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1