24-26 Oct. 2017
Filter Results
-
Authors' index
Publication Year: 2017, Page(s):1 - 5|
PDF (47 KB)
-
Contents
Publication Year: 2017, Page(s):1 - 4|
PDF (91 KB)
-
[Copyright notice]
Publication Year: 2017, Page(s): 1|
PDF (36 KB)
-
-
[Title page]
Publication Year: 2017, Page(s): 1|
PDF (61 KB)
-
Cloud computing: Overview and risk identification based on classification by type
Publication Year: 2017, Page(s):1 - 8
Cited by: Papers (1)The Cloud Computing is experiencing a powerful and very fast development in the IT field. Based on the principle of virtualization, it allows the consumer to use computing resources on demand, by means of the Internet, regardless of location and time. This technology also ensures broadband network access with fast resizing as required by the user. Finally, the invoicing is determined according to ... View full abstract»
-
A self-adaptive very fast simulated annealing based on Hidden Markov model
Publication Year: 2017, Page(s):1 - 8The simulated annealing (SA) is amongst the well-known algorithms for stochastic optimization. Unfortunately, its major weakness is the slow rate of convergence, leading to a large period of poor improvement towards a global optimum. In this paper, we present a self-adaptive approach to enhance the SA performance during the run using Hidden Markov Model (HMM). Experiments have been performed on ma... View full abstract»
-
Performance prediction using support vector machine for the configuration of optimization algorithms
Publication Year: 2017, Page(s):1 - 7The aim of this paper is to propose a machine learning approach for predicting the performance of each configuration of optimization algorithms. Our approach consists of advocating making the decision of finding the most suitable configuration on a per-instance analysis based on a supervised machine learning model. That is, it consists of building a support vector machine (SVM) model to predict th... View full abstract»
-
Performance evaluation of container and virtual machine running cassandra workload
Publication Year: 2017, Page(s):1 - 8Today, scalable and high-available NoSQL distributed databases are largely used as Big Data platforms. Such distributed databases typically run on a virtualized infrastructure that could be implemented using Hypervisor-based virtualization or Container-based virtualization. Hypervisor-based virtualization is a mature technology but imposes overhead on CPU, memory, networking, and disk. Recently, b... View full abstract»
-
Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage
Publication Year: 2017, Page(s):1 - 7Data storage in cloud computing leads to several security issues such as data privacy, integrity, and authentication. Efficiency for the user to upload and download the data in a secure way plays an important role, as users are nowadays performing these actions on all types of devices, including e.g. smartphones. Signing and encryption of the sensitive data before hosting can solve potential secur... View full abstract»
-
Protecting medical images in cloud using visual cryptography scheme
Publication Year: 2017, Page(s):1 - 6Healthcare providers generate large amounts of medical imaging data to meet the increased demand. These digital records need to be processed and stored. So, mass storage systems and powerful image processing software are required. Nevertheless, to invest in a sophisticated local data center leads to high operating expenses. To overcome this challenge, cloud computing has recently been adopted in h... View full abstract»
-
Using cloud solution for medical image processing: Issues and implementation efforts
Publication Year: 2017, Page(s):1 - 7In the healthcare field, medical image processing through cloud computing is a promising technology. In fact, it allows healthcare professionals to process and analyze medical images using remote cloud resources. Furthermore, it provides cost-efficient software as a service, which realizes important cost savings associated with exploiting the local data center and hiring IT staff. Thus, it dramati... View full abstract»
-
X-ETL: A new method for designing multidimensional models
Publication Year: 2017, Page(s):1 - 6
Cited by: Papers (1)The Design of data warehouse as a support of the decision-making process remains a complex task and a major challenge for companies and organizations. This complexity is principally due to data sources that are heterogeneous and to the absence of a conventional method for modeling the data warehouse. Our work aims to integrate one of the most used data sources namely relational databases, and deve... View full abstract»
-
A new cryptographic method for cloud computing
Publication Year: 2017, Page(s):1 - 8We propose a noise-free efficient fully homomorphic encryption scheme based on a new homomorphic and probabilistic transform between the ring Z/2Z (ring of the residual integers modulo 2) and the ring of the Lipschitz integers. Our cryptosystem is capable of processing clear messages in the form of bits at input and providing ciphertexts in the form of Lipschitz quaternion matrices modulo a large ... View full abstract»
-
A machine Learning approach for sentiment analysis in the standard or dialectal Arabic Facebook comments
Publication Year: 2017, Page(s):1 - 8Social networks like Facebook contain an enormous amount of data, called Big Data. Extracting valuable information and trends from these data allows a better understanding and decision-making. In general, there are two categories of approaches to address this problem: Machine Learning approaches and lexicon based approaches. This work deals with the sentiment analysis for Facebook's comments writt... View full abstract»
-
On automated cloud bursting and hybrid cloud setups using Apache Mesos
Publication Year: 2017, Page(s):1 - 8Hybrid cloud technology is becoming increasingly popular as it merges private and public clouds to bring the best of two worlds together. However, due to the heterogeneous cloud installation, facilitating a hybrid cloud setup is not simple. Despite the availability of some commercial solutions to build a hybrid cloud, an open source implementation is still unavailable. In this paper, we try to bri... View full abstract»
-
An intelligent scheduling algorithm for energy efficiency in cloud environment based on artificial bee colony
Publication Year: 2017, Page(s):1 - 8The development of Cloud computing applications has initiated a substantial influence on the data center expansion around the world. This expansion has led to an increase in energy consumption within the different data centers. Aware of the environmental and financial impact of the energy efficiency, several research studies have tackled the problem of the energy efficiency at the level of the har... View full abstract»
-
A cloud-based RFID for VANET access filtering
Publication Year: 2017, Page(s):1 - 6Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the globe. The cloud-based RFID merged with the VANET provide many advantages such as data storage and processing. This paper proposes an intelligent RFID-enabled authentication scheme for filtering access applications in VANET environment. In the proposed scheme, an ECC authentication model is used to pro... View full abstract»
-
Using branch-and-price to maximize redundant network utilization in cloud datacenter
Publication Year: 2017, Page(s):1 - 8In cloud datacenter, work-conserving bandwidth provision benefits the network sharing of multiple virtual datacenters (VDCs). Traditionally, cloud networks are shared in a best-effort manner making it hard to reason about how network resources are allocated. While cloud computing providers offer guaranteed allocations for resources such as CPU and memory, they do not offer any concrete bandwidth f... View full abstract»
-
Dynamic web service composition using AND/OR directed graph
Publication Year: 2017, Page(s):1 - 8Because of their interesting properties, web services have grown in popularity and have become the preferred technology for distributed systems development. It is then necessary to find efficient solutions for web service composition that can deal with large amounts of services. However, in order to coordinate the exchanges of the data flow in a combination of services, different control structure... View full abstract»
-
Survey: Risk assessment models for cloud computing: Evaluation criteria
Publication Year: 2017, Page(s):1 - 5One of the most challenging steps in migrating infrastructure or an application to a cloud computing is security threats. Adapting a current risk assessment tool to cloud computing is a very difficult task due to its several characteristics and the use of distributed systems. This work proposes a critical review of the recent proposed risk assessment frameworks and models in cloud computing enviro... View full abstract»
-
Load balancing between nodes in a volunteer cloud computing by taking into consideration the number of cloud services replicas
Publication Year: 2017, Page(s):1 - 8In this paper, we investigate the load balancing between nodes in the volunteer cloud computing. We propose a new approach which is based on the idea of cloning a cloud service on one or more nodes when the number of the user requests will be important at a given time. Our solution allows a better system reliability and reduces the response time of the users by distributing their requests between ... View full abstract»
-
A parallel semantic sentiment analysis
Publication Year: 2017, Page(s):1 - 6The analysis of feelings(sentiment analysis or opinion mining) is the process of studying peoples opinion, emotion and how to consider an issue and make a decision into different categories like positive, negative and neutral in data mining. For example, sentiment analysis over Twitter provides organisations and individuals with a quick and effective way to monitor public feelings, such as knowing... View full abstract»
-
A database for Amazigh speech recognition research: AMZSRD
Publication Year: 2017, Page(s):1 - 5In the field of Amazigh automatic speech recognition, speech databases are inexistent. This domain has suffered from the absence of speech database references, which allows objective comparisons between the different systems of recognition. All the published works in this field have been experimented on local databases, which contain a limited Amazigh number of digits and letters. This paper prese... View full abstract»
-
Performance analysis of intrusion detection systems in the cloud computing
Publication Year: 2017, Page(s):1 - 8Cloud computing is a paradigm that provides access to compute infrastructure on demand by allowing a user to use a big number of virtual machines (VMs) to solve a given computational problem. Before implementing new applications running on the cloud, it is often useful to estimate the different performance/cost of possible implementations. Do it physically on cloud providers will be intensive and ... View full abstract»