{"title":"Performance comparison of various machine learning classifiers using a fusion of LBP, intensity and GLCM feature extraction techniques for thyroid nodules classification","authors":"Rajshree Srivastava, Pardeep Kumar","doi":"10.1504/ijguc.2023.10055313","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10055313","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage","authors":"Tu Zheng, Jindan Zhang, Yunxuan Su, Yuanyou Cui","doi":"10.1504/ijguc.2023.10058800","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10058800","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deer-based chicken swarm optimisation algorithm: a hybrid optimisation algorithm for output domain testing","authors":"V.,. Chandraprakash, R. Ramgouda","doi":"10.1504/ijguc.2023.10060037","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10060037","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134980495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage","authors":"Cui Yuanyou, Su Yunxuan, Tu Zheng, Zhang Jindan","doi":"10.1504/ijguc.2023.133415","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133415","url":null,"abstract":"With the advent of cloud computing, it is an important problem to verify the integrity of data stored on cloud service providers by proxy while ensuring proxy's credibility. In 2019, Zhang proposed an identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems that outsourced medical data to cloud storage. Meanwhile the proxy is added for improving the speed of data processing. Unfortunately, some flaws are found in their approach in this paper. The signature generated by the agent can be forged to modify the original data. We have made some improvements based on the original protocol to improve the shortcomings of the original scheme. Finally, the security analysis shows that the security of the new protocol is enhanced.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jaya-based CAViaR: Hadamard product and key matrix for privacy preservation and data sharing in cloud computing environment","authors":"Shubangini Patil, Rekha Patil","doi":"10.1504/ijguc.2023.132620","DOIUrl":"https://doi.org/10.1504/ijguc.2023.132620","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135828141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the extraction of accounting multi-relationship information based on cloud computing and multimedia","authors":"Yu Ning","doi":"10.1504/ijguc.2023.10058855","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10058855","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"14 1","pages":"505-515"},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced human learning optimisation algorithm for effective data clustering","authors":"Jigyasa Goyal, Yugal Kumar, Pardeep Kumar, Arvinder Kaur","doi":"10.1504/ijguc.2023.10060384","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10060384","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135613878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data protection of internet of things for edge computing and deep learning and governance of cyberspace","authors":"Zhi Li, Yuemeng Ge, Min Jia, Yanrui Xu","doi":"10.1504/ijguc.2023.131004","DOIUrl":"https://doi.org/10.1504/ijguc.2023.131004","url":null,"abstract":"The purpose is to deal with the network security problems in the background of the high information age, ensure the popularisation of Internet of things (IoT) technology based on Internet technology, and protect the information, life and property security of countries and individuals. First, the principle and advantages of edge computing and deep learning technology are described. Then, the current laws of IoT data protection are introduced, and the moral and ethical issues involved in IoT data are discussed. Finally, the research results of cyberspace governance in China and Europe are studied. The results show that the respondents who do not know anything about the data protection regulations and do not focus on the regulations are 27% and 18%, respectively.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135783854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}