A Computational Dynamic Trust Model for User Authorization Abstract? A Computational Dynamic Trust Model for User Authorization. Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for…
A Decomposition Framework for Image Denoising Algorithms Abstract? A Decomposition Framework for Image Denoising Algorithms. we consider an image decomposition model that provides a novel framework for image denoising. The model computes the components of the image to be processed in a moving frame that encodes its local geometry directions of gradients and level lines….
A Generic Query Model for the Unified Discovery of Heterogeneous Services Abstract? A Generic Query Model for the Unified Discovery of Heterogeneous Services. In this paper, we propose Proteus, a generic query model for the discovery of operations offered by heterogeneous services. We demonstrate the need for such a model, and show how it…
A Heuristic Clustering-based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment Abstract? Aiming at the current problems that most physical hosts in the cloud data center are so overloaded that it makes the whole cloud data center? load imbalanced and that existing load balancing approaches have relatively high complexity, this paper…
A High-Speed Low-Complexity Modified Radix-25 FFT Processor for Gigabit WPAN Applications Abstract?a novel modified radix-25 algorithm for 512-point fast Fourier transform (FFT) computation and high-speed eight-parallel data-path architecture for multi-gigabit wireless personal area network (WPAN) systems. The proposed FFT processor can provide a high data throughput and low hardware complexity by using eight-parallel data-path and…
A Hybrid Cloud Approach for Secure Authorized Deduplication Abstract? Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent…
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks Abstract? A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks.Energy saving is an important issue in Mobile Ad Hoc Networks (MANETs). Recent studies show that network coding can help reduce the energy consumption in MANETs by using less transmissions. However, apart from transmission cost,…
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks Abstract?A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. Energy saving is an important issue in Mobile Ad Hoc Networks (MANETs). Recent studies show that network coding can help reduce the energy consumption in MANETs by using less transmissions. However, apart from transmission cost,…
A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers Abstract?A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers. This paper presents a novel economic model to regulate capacity sharing in a federation of hybrid cloud providers (CPs). The proposed work models the interactions among the CPs as a repeated…
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Abstract? Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated,…
A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Abstract?Approximations of a concept by a variable precision rough-set model (VPRS) usually vary under a dynamic information system environment. It is thus effective to carry out incremental updating approximations by utilizing previous data structures.< Final Year Project > This paper focuses on a new…