Search
Now showing items 1521-1530 of 1907
Virtual network mapping for cloud services under probabilistic regional failures
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Network virtualization is critical for distributing cloud services over expanded distances and improving scalability and responsiveness. However many providers are very concerned about maintaining high availability, ...
Automated knowledge discovery in facility layout planning
(
International Business Information Management Association, IBIMA
, 2014 , Conference Paper)
This paper proposes a novel methodology for facilities layout planning and optimization in which fitness evaluation of layout alternatives is done in an automated manner using an artificial neural network trained to user ...
Query hidden attributes in social networks
(
IEEE Computer Society
, 2015 , Conference Paper)
Micro blogs and collaborative content sites such as Twitter and Amazon are popular among millions of users who generate huge numbers of tweets, posts, and reviews every day. Despite their popularity, these sites only provide ...
Cost effective assessment of transformers using machine learning approach
(
IEEE Computer Society
, 2014 , Conference Paper)
Furan content in transformer oil is highly correlated with the transformer insulation paper aging. In this paper, the ranges of furan content in power transformer is predicted using measurements of transformer oil tests ...
A novel chaos-based physical layer security transmission scheme for internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ...
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
An efficient and privacy-preserving energy trading scheme based on blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ...
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Smart stock exchange market: A secure predictive decentralized model
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Stock exchanges around the world are exploring the best possible solution that can improve trading efficiency, lower the risks and tighten secu- rity levels. The working and functioning of a stock exchange involves very ...