Results (97)
Search Parameters:
Keyword: computingAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreInfrastructure-as-a-Service Ontology for Consumer-Centric Assessment
In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreExtended Buffer-referred Prefetching to Leverage Prefetch Coverage
This paper is an extension of the work originally presented in the 26th International Con- ference on Automation and Computing. This study regarding hardware prefetching aims at concealing cache misses, leading to maximizing the performance of modern processors. This paper leverages prefetch coverage improvement as a way to achieve the goal. Original work proposes two…
Read MoreOptimization of Query Processing on Multi-tiered Persistent Storage
The efficient processing of database applications on computing systems with multi-tiered persistent storage devices needs specialized algorithms to create optimal persistent storage management plans. A correct allocation and deallocation of multi-tiered persistent storage may significantly improve the overall performance of data processing. This paper describes the new algorithms that create allocation and deallocation plans for…
Read MoreAnalysis of Different Supervised Machine Learning Methods for Accelerometer-Based Alcohol Consumption Detection from Physical Activity
This paper builds on the realization that since mobile devices have become a common tool for researchers to collect, process, and analyze large quantities of data, we are now entering a generation where the creation of solutions to difficult real-world problems will mostly come in the form of mobile device apps. One such relevant real-life…
Read MoreUsing Dynamic Market-Based Control for Real-Time Intelligent Speed Adaptation Road Networks
Traffic road management is becoming more complex due to limited resources and an increasing number of hybrid vehicles. Currently, a number of global classical computing tools are used to manage the traffic road network. This kind of classical computing is resource intensive and expensive, and in the best case, optimizing a traffic network takes a…
Read MoreSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreQuantum Secure Lightweight Cryptography with Quantum Permutation Pad
Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…
Read MorePlummeting Makespan by Proficient Workflow Scheduling in Cloud Environment
Cloud is an Internet-based computing technology in which on-demand shared resources such as software, platforms, repositories, and information are delivered to customers. In the emerging era of computing cloud environment provide the use of resources with the concept of virtualization. Workflow of the tasks has vital role for the improvement of computing performance which leads…
Read MoreOntology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique
The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…
Read MoreFetal Electrocardiogram Extraction using Moth Flame Optimization (MFO)-Based Adaptive Filter
Effective Fetal Electrocardiogram (FECG) Extraction provides medical workers with precise knowledge for monitoring fetal health condition during gestational age. However, Fetal ECG Extraction still remains a challenge as the signal is weak and contaminated with noises of different kinds, more significantly maternal ECG. In this work, a new Moth Flame optimization algorithm (MFO)-based adaptive filter…
Read MoreDecentralized Management System for Solid-State Voltage Regulators in Nodes of Distribution Power Networks
The article describes the concept and architecture of a decentralized control system for a solid-state voltage regulator (SSVR). The SSVR is a universal device for controlling the mode and operation parameters of medium voltage electrical networks. SSVR manage the amount of current in line using the vector voltage control method. The SSVR control system consists…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read MoreA Novel Approach of Smart Logistics for the Health-Care Sector Using Genetic Algorithm
The heath-care sector has confronted significant difficulties in the past few years due to several issues such as insufficient human resources, budget cuts, and shortage of equipment and drugs. The logistics in the health-care sector take an extensive part of the budget, especially since it is the main axis to provide the hospital’s pharmacies with…
Read MoreDocker-C2A : Cost-Aware Autoscaler of Docker Containers for Microservices-based Applications
This article proposes a cost-aware autoscaler for microservices-based applications deployed with docker containers. This autoscaler decreases the cost of the application deployment as it reduces computing resources. In elastic treatment, microservice resources are scaled when the used metric as the central processing unit (CPU) exceeds the threshold. In case of threshold exceeding, an autoscaler adds…
Read MoreAutomatic Stochastic Dithering Techniques on GPU: Image Quality and Processing Time Improved
Dithering or error diffusion is a technique used to obtain a binary image, suitable for printing, from a grayscale one. At each step, the algorithm computes an allowed value of a pixel from a grayscale one, applying a threshold and, therefore, causing a conversion error. To obtain the optical illusion of a continuous tone, the…
Read MoreA Simulation Based Proactive Approach for Smart Capacity Estimation in the Context of Dynamic Positions and Events
Technologies are growing with the passage of time and providing solutions for the existing problems. One of such problems is to manage the crowd according to available capacity. Especially when the crowd density is dynamic because of dynamic position of the persons (Pilgrims). Not only dynamic position of the pilgrims makes crowd capacity dynamic but…
Read MoreEnhanced Power Utilization for Grid Resource Providers
A grid is a system that can manage and organize services and resources that spread amongst different control domains, employ interfaces and protocols, and offer a high quality of services. The integration of Multi-Agent Systems (MAS) with a grid environment significantly affects grid performance. MAS is considered a suitable solution for open systems that modify…
Read MoreReal-Time Identification and Classification of Driving Maneuvers using Smartphone
The fast-paced development of smart technologies and the prevalence of vehicles, created an urgent demands to study and improve safety issues related to driving. In order to reduce traffic accidents, driving behavior was found to be very important issues to study and investigate. Recently, the advent and widespread of smartphone platforms with advanced computing competence…
Read MoreA Toolkit for the Automatic Analysis of Human Behavior in HCI Applications in the Wild
Nowadays, smartphones and laptops equipped with cameras have become an integral part of our daily lives. The pervasive use of cameras enables the collection of an enormous amount of data, which can be easily extracted through video images processing. This opens up the possibility of using technologies that until now had been restricted to laboratories,…
Read MoreMulti-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System
Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…
Read MoreMalware Classification Using XGboost-Gradient Boosted Decision Tree
In this industry 4.0 and digital era, we are more dependent on the use of communication and various transaction such as financial, exchange of information by various means. These transaction needs to be secure. Differentiation between the use of benign and malware is one way to make these transactions secure. We propose in this work…
Read MoreApplicability of Generalized Metropolis-Hastings Algorithm to Estimating Aggregate Functions in Wireless Sensor Networks
Over the last decades, numerous distributed consensus-based algorithms have found a wide application as a complementary mechanism for data aggregation in wireless sensor networks. In this paper, we provide an analysis of the generalized Metropolis-Hastings algorithm for data aggregation with a fully-distributed stopping criterion. The goal of the implemented stopping criterion is to effectively bound…
Read More
