Int. J. Strateg. Inf. Technol. Appl.最新文献

筛选
英文 中文
A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency 在最小延迟内实现数据可用性的强大IOT-Cloud IaaS
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-10-01 DOI: 10.4018/ijsita.2019100102
S. Hammoudi, S. Harous, Z. Aliouat
{"title":"A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency","authors":"S. Hammoudi, S. Harous, Z. Aliouat","doi":"10.4018/ijsita.2019100102","DOIUrl":"https://doi.org/10.4018/ijsita.2019100102","url":null,"abstract":"Sensors in Internet of Things generate a huge amount of data. The massive volume of the captured data is stored on cloud servers. Over time, the unbalanced load servers prevent better resource utilization. It also increases the input and the output response time. Hence, applying load balancing techniques is very important to achieve efficient system performance. Ensuring the critical data availability in such dynamic systems is very essential. In this article, the authors propose ROBUST for ensuring data availability mechanism and a fault-tolerance architecture. ROBUST also realises load balancing among servers within minimum latency, by avoiding the problem of the overloaded sites and unbalanced use of the resources on the servers. Comparing the response time using the ROBUST and Load Balancing in the Cloud Using Specialization (LBCS), ROBUST architecture has given satisfactory results in terms of critical data latency. Compared with LBCS, ROBUST gains 42% critical data recovery from a primary server and 45% when searching for duplicated critical data. The authors implemented the system using the JADE platform.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130575521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast and Effective Watermarking Method for Medical Data security 一种快速有效的医疗数据安全水印方法
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-10-01 DOI: 10.4018/ijsita.2019100101
Abdallah Soualmi, A. Alti, L. Laouamer
{"title":"A Fast and Effective Watermarking Method for Medical Data security","authors":"Abdallah Soualmi, A. Alti, L. Laouamer","doi":"10.4018/ijsita.2019100101","DOIUrl":"https://doi.org/10.4018/ijsita.2019100101","url":null,"abstract":"Personal health information is considered a target for illegal users that attempt to read, delete, and/or steal data. Therefore, watermarking techniques offer new ways to protect sensitive data transferred over the Internet. This article presents a novel watermarking approach for securing sensitive data in e-health applications based on DWT and Schur decomposition coefficients. The proposed approach aims to offer a valuable balance between robustness and imperceptibility. Several experiments were conducted using a standard dataset of medical images. The experiments achieved promising results for high-level data protection and good imperceptibility values compared to existing works.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123942073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles 传输距离变化对车联网位置隐私保护方案的影响
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-10-01 DOI: 10.4018/ijsita.2019100103
Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, A. Guéroui
{"title":"Transmission Range Changing Effects on Location Privacy-Preserving Schemes in the Internet of Vehicles","authors":"Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, A. Guéroui","doi":"10.4018/ijsita.2019100103","DOIUrl":"https://doi.org/10.4018/ijsita.2019100103","url":null,"abstract":"The internet of vehicles (IoV) is getting a considerable amount of attention from different research parties. IoV aims at enhancing the driving experience with its wide range of applications varying from safety, road management to entertainment; however, some of such applications bring severe security and privacy issues; identity exposing, and location tracking are good examples. By enabling vehicles to send their statuses to themselves via beacon messages, this creates an environmental awareness for safety purposes but also exposes them to the aforementioned attacks. A lot of work has been done to mitigate the effect of such attacks but still does not provide a holistic solution. In this article, which is an extension to a prior work, the authors investigate the effects of changing the transmission range while sending beacons on the achieved level of location privacy based on two location privacy schemes: SLOW and CAPS. The authors use additional privacy metrics in addition to comparing the strategies in some well-known security attacks. The outcomes confirm the feasibility of using such a mechanism.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Big Data Analytics Adoption Factors in Improving Information Systems Security 提高信息系统安全的大数据分析采用因素
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-07-01 DOI: 10.4018/ijsita.2019070101
Marouane Balmakhtar, Scott E. Mensch
{"title":"Big Data Analytics Adoption Factors in Improving Information Systems Security","authors":"Marouane Balmakhtar, Scott E. Mensch","doi":"10.4018/ijsita.2019070101","DOIUrl":"https://doi.org/10.4018/ijsita.2019070101","url":null,"abstract":"This research measured determinants that influence the willingness of IT/IA professionals to recommend Big Data analytics to improve information systems security in an organization. A review of the literature as well as the works of prior researchers provided the basis for formulation of research questions. Results of this study found that security effectiveness, organizational need, and reliability play a role in the decision to recommend big data analytics to improve information security. This research has implications for both consumers and providers of big data analytics services through the identification of factors that influence IT/IA professionals. These factors aim to improve information systems security, and therefore, which service offerings are likely to meet the needs of these professionals and their organizations.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"21 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology GCC的区块链创新和信息技术:文献综述和方法
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-07-01 DOI: 10.4018/ijsita.2019070102
Yousef Alabbasi, K. Sandhu
{"title":"Blockchain Innovation and Information Technology at GCC: Literature Review and Methodology","authors":"Yousef Alabbasi, K. Sandhu","doi":"10.4018/ijsita.2019070102","DOIUrl":"https://doi.org/10.4018/ijsita.2019070102","url":null,"abstract":"Blockchain has become an epidemic and significant decision that organizations may make in the next few years, enabling institutions to integrate business functions, operations, and processes in a decentralized distributed ledger technology. This technology will transform the business world and economy in solving the limitations created by centralization and system inefficiency. Accordingly, with the high demand and complexity of growing economies such as the Gulf Cooperation Council GCC countries, the need for a typical solution technology is a game changer. This will lead GCC to a solid economic base. Blockchain technology can be applicable in many different fields such as Banking, education, Health, finance, government and trade. This article will address the literature review and methodology of Blockchain technology and innovation at the GCC, particularly in Saudi Arabia. Also, more research can be conducted in the future as the system may be integrated in these countries.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114389688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Innovation to Transform the Customer Experience 数字化创新改变客户体验
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-07-01 DOI: 10.4018/ijsita.2019070103
Evangelos Katsamakas, A. Saharia
{"title":"Digital Innovation to Transform the Customer Experience","authors":"Evangelos Katsamakas, A. Saharia","doi":"10.4018/ijsita.2019070103","DOIUrl":"https://doi.org/10.4018/ijsita.2019070103","url":null,"abstract":"Digital innovation is becoming a strategic priority for business and IT leaders in many companies. This article explores digital innovation at Six Flags Entertainment Corporation, the world's largest regional theme park company, with emphasis on the strategic leadership role of its Chief Information Officer (CIO). The article shows that digital innovation requires appropriate technology infrastructure, organization, leadership skills and a systematic process to evaluate existing and emerging technologies. Innovation ideas may come from many internal or external sources. Five digital initiatives illustrate how digital innovation can create new revenue streams and transform customer experience. Insights are provided on how to justify such initiatives and how to strike the right balance between a focus on innovation, while meeting the traditional operational needs. Overall, a focus on digital innovation is an opportunity for a strategic role of IT leaders, but that requires new skills and new education.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127910069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability 大规模本体对齐——一种支持信息系统互操作性的抽取方法
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-04-01 DOI: 10.4018/ijsita.2019040104
Mourad Zerhouni, S. Benslimane
{"title":"Large-Scale Ontology Alignment- An Extraction Based Method to Support Information System Interoperability","authors":"Mourad Zerhouni, S. Benslimane","doi":"10.4018/ijsita.2019040104","DOIUrl":"https://doi.org/10.4018/ijsita.2019040104","url":null,"abstract":"Ontology alignment is an important way of establishing interoperability between Semantic Web applications that use different but related ontologies. Ontology alignment is the process of identifying semantically equivalent entities from multiple ontologies. This is not always obvious because technical constraints such as data volume and execution time are determining factors in the choice of an alignment algorithm. Nowadays, partitioning and modularization are two main strategies for breaking down large ontologies into blocks or ontology modules respectively to align ontologies. This article proposes ONTEM as an effective alignment method for large-scale ontology based on the ontology entities extraction. This article conducts a comprehensive evaluation using the datasets of the OAEI 2018 campaign. The obtained results are promising, and they revealed that ONTEM is one of the most effective systems.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122550898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction 利用资源竞争和存储单元发展选择最佳GMM进行背景减法
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-04-01 DOI: 10.4018/ijsita.2019040102
Wafa Nebili, Brahim Farou, Hamid Seridi
{"title":"Using Resources Competition and Memory Cell Development to Select the Best GMM for Background Subtraction","authors":"Wafa Nebili, Brahim Farou, Hamid Seridi","doi":"10.4018/ijsita.2019040102","DOIUrl":"https://doi.org/10.4018/ijsita.2019040102","url":null,"abstract":"Background subtraction is an essential step in the process of monitoring videos. Several works have proposed models to differentiate the background pixels from the foreground pixels. Mixtures of Gaussian (GMM) are among the most popular models for a such problem. However, the use of a fixed number of Gaussians influence on their results quality. This article proposes an improvement of the GMM based on the use of the artificial immune recognition system (AIRS) to generate and introduce new Gaussians instead of using a fixed number of Gaussians. The proposed approach exploits the robustness of the mutation function in the generation phase of the new ARBs to create new Gaussians. These Gaussians are then filtered into the resource competition phase in order to keep only ones that best represent the background. The system tested on Wallflower and UCSD datasets has proven its effectiveness against other state-of-art methods.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128074060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users VANET用户极限点隐私(EPP)方案下的位置隐私评估
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-04-01 DOI: 10.4018/ijsita.2019040103
Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari
{"title":"Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users","authors":"Messaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari","doi":"10.4018/ijsita.2019040103","DOIUrl":"https://doi.org/10.4018/ijsita.2019040103","url":null,"abstract":"The main purpose of designing vehicular ad-hoc networks (VANETs) is to achieve safety by periodically broadcasting the vehicle's coordinates with a high precision. This advantage brings a threat represented in the possible tracking and identification of the vehicles. A possible solution is to use and change pseudonyms. However, even by changing pseudonyms, the vehicle could still be tracked if the adversary has a prior knowledge about the potential start and end points of a particular driver who has social interactions (e.g., with neighbors) which introduces the concept of vehicular social networks (VSNs). This article extends the authors previous work, namely: “EPP Extreme Points Privacy for Trips and Home Identification in Vehicular Social Networks,” which exploits the nature of the end points that are common between VSN users in order to create shared zones to anonymize them. The extension is represented by (a) the evaluation of the enjoyed location privacy of VSN users after quitting the district in addition to (b) detailing the used environment during the evaluation.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards a New Data Replication Management in Cloud Systems 迈向云系统中新的数据复制管理
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2019-04-01 DOI: 10.4018/ijsita.2019040101
Abdenour Lazeb, R. Mokadem, Ghalem Belalem
{"title":"Towards a New Data Replication Management in Cloud Systems","authors":"Abdenour Lazeb, R. Mokadem, Ghalem Belalem","doi":"10.4018/ijsita.2019040101","DOIUrl":"https://doi.org/10.4018/ijsita.2019040101","url":null,"abstract":"Applications produce huge volumes of data that are distributed on remote and heterogeneous sites. This generates problems related to access and sharing data. As a result, managing data in large-scale environments is a real challenge. In this context, large-scale data management systems often use data replication, a well-known technique that treats generated problems by storing multiple copies of data, called replicas, across multiple nodes. Most of the replication strategies in these environments are difficult to adapt to cloud environments. They aim to achieve the best performance of the system without meeting the important objectives of the cloud provider. This article proposes a new dynamic replication strategy. The proposed algorithm significantly improves provider gain without neglecting customer satisfaction.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信