{"title":"Toward stance parameter algorithm with aggregate comments for fake news detection","authors":"Yinnan Yao, Changhao Tang, Kun Ma","doi":"10.1504/ijguc.2023.133408","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133408","url":null,"abstract":"In the detection of fake news, the stance of comments usually contains evidence supporting false news that can be used to corroborate the detected results of the fake news. However, due to the misleading content of fake news, there is also the possibility of fake comments. By analysing the position of comments and considering the falseness of comments, comments can be used more effectively to detect fake news. In response to this problem, we proposed Bipolar Argumentation Frameworks of Reset Comments Stance (BAFs-RCS) and Average Parameter Aggregation of Comments (APAC) to use the stance of comments to correct the prediction results of the RoBERTa model. We use the Fakeddit dataset for experiments. Our macro-F1 results on 2-way and 3-way are improved by 0.0029 and 0.0038 compared to the baseline RoBERTa model's macro-F1 results at Fakeddit dataset. The results show that our method can effectively use the stance of comments to correct the results of model prediction errors.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Chaikalis, Dimitrios Kosmanos, Konstantinos E. Anagnostou, I. Savvas, Dimitros Bargiotas
{"title":"Enhancing the 5G V2X reliability using turbo coding for short frames","authors":"C. Chaikalis, Dimitrios Kosmanos, Konstantinos E. Anagnostou, I. Savvas, Dimitros Bargiotas","doi":"10.1504/ijguc.2023.10058799","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10058799","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"14 1","pages":"455-468"},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Crop Disorder using Deep Learning","authors":"Vinita Chauhan, Suma Dawn","doi":"10.1504/ijguc.2023.10060098","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10060098","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134883437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimisation of the hybrid grey wolf method in cluster-based wireless sensor network using edge computing","authors":"Rakesh Kumar, Ashok Kumar Rai","doi":"10.1504/ijguc.2023.10060014","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10060014","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135158234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent system design of urban street landscape device based on improved D*Lite algorithm","authors":"Qian Li","doi":"10.1504/ijguc.2023.10059754","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10059754","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136258353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An event-driven and lightweight proactive auto-scaling architecture for cloud applications","authors":"Uttom Akash, Partha Protim Paul, Ahsan Habib","doi":"10.1504/ijguc.2023.133450","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133450","url":null,"abstract":"The cloud environment is used by the application providers (APs) to host their applications in order to reduce procurement and management costs of the cloud resources. Moreover, the variation in the traffic load of the client applications and the appealing auto-scaling capability of the cloud resources have prompted application providers to seek ways to reduce the cost of their rented services. This paper describes a constructive auto-scaling mechanism based on the events in cloud systems fitted with heuristic predictors. The predictor examines historical data using these approaches: (1) Double Exponential Smoothing (DES), (2) Triple Exponential Smoothing (TES), (3) Weighted Moving Average (WMA) and (4) WMA with Fibonacci numbers. The outcomes of this model simulation in CloudSim indicate that the model can decrease the application provider's cost while preserving application user satisfaction.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and fabrication of dual band AMC-backed monopole antenna for WLAN and Wi-Fi applications","authors":"B. Madhavi, M.V. Siva Prasad","doi":"10.1504/ijguc.2023.133432","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133432","url":null,"abstract":"This paper presents the design and fabrication of a Coplanar Waveguide (CPW) fed dual band antenna with a Complementary Split Ring Resonator (CSRR) with and without Artificial Magnetic Conductor (AMC). This proposed model exhibits two operational bands with increased gain. The antenna design without AMC works at the bands of 2.41 to 2.62 GHz and 4.87 to 5.10 GHz. The obtained gains at resonances of working bands are 2.6 dB and 3.6 dB. The antenna with AMC operates at the bands of 2.33 to 2.57 GHz and 4.85 to 5.14 GHz, respectively. The attained gains at the resonances of working bands for AMC-backed monopole antenna are 5.15 dB and 6.12 dB. From the measured results, the bandwidth and gain are increased for AMC-backed design when compared with no AMC condition. In addition, the analysis of both antenna designs also done in HFSS workbench for analysing the return loss, 3D gains, current distributions and radiation patterns. As per the observed measures of gain values, the proposed antenna is suitable for the applications of Wi-Fi and WLAN.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication and authorisation in service-oriented grid architecture","authors":"Arbër Beshiri, Anastas Mishev","doi":"10.1504/ijguc.2023.133402","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133402","url":null,"abstract":"Applications (services) nowadays request access to resources that are mostly distributed over the network (wide-area network). These applications usually rely on mediums like Grid Computing Infrastructure (GCI) that enable them to be executed. GCI has heterogeneous nature and supports security as an essential part in grid systems. Grid Security Infrastructure (GSI) is a technology standard for grid security. Authentication and even authorisation present a security challenge for grids. In this paper are discussed the authentication and authorisation infrastructures in the grid, including technologies that cover these two major parts in this domain. Here are surveyed the challenges that security encounters, respectively grid authentication mechanisms, grid authorisation mechanisms and models. The combination of the grid authorisation technologies and grid authentication technologies with authorisation infrastructures enables role-based and fine-grained authorisation. Such technologies provide promising solutions for service (resources) oriented grid architecture authentication and authorisation.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}