International Journal of Cooperative Information Systems最新文献

筛选
英文 中文
Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services 云存储服务中支持哈希函数关键字搜索的安全框架
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-03-18 DOI: 10.1142/s0218843024500011
P. Punitha, Lakshmana Kumar, S. Revathi, R. Premalatha, R. S. Aiswarya
{"title":"Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services","authors":"P. Punitha, Lakshmana Kumar, S. Revathi, R. Premalatha, R. S. Aiswarya","doi":"10.1142/s0218843024500011","DOIUrl":"https://doi.org/10.1142/s0218843024500011","url":null,"abstract":"<p>As with IoT devices, cloud computation increases its applicability to other areas that use the information and puts it in a commonplace that is necessary for computing and analysis. These devices need the cloud to store and retrieve data since they are unable to store and process data on their own. Cloud computing offers a variety of services to consumers, including IaaS, PaaS, and SaaS. The usage of cloud resources for data storage that may be accessible by all users associated with cloud computing is a key disadvantage of cloud computing. Without disclosing the data’s contents, the usage of Public Key Encryptions with Keyword Search (PEKS) secures publicly encrypted keys against third-party search capabilities that are not trustworthy. PEKs provide a security risk every time Interior Keywords Guessing Attacks (IKGA) are discovered in the system since an unauthorized service estimates the keywords in the trapdoor. This issue can be resolved using various methodologies such as the Certificateless Fleshed Public Key Authenticated Encryption of Keyword Search (CL-HPAEKS), which also uses Altered Elliptic Curve Cryptography (MECC), and the Mutation Centred Flower Pollinations Algorithm (CM-FPA), which uses optimization in keys to be improving the algorithm’s performance. The system’s security is achieved by adding a Message Fragments 5 (MD5) scramble mechanism. The proposed system achieves system security of 96%, and it takes less time to implement than earlier encryption methods.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140169926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Computing Security of Mobile Communication System Based on Computer Algorithms 基于计算机算法的移动通信系统边缘计算安全性
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-03-09 DOI: 10.1142/s0218843024500023
Jinna Zhang
{"title":"Edge Computing Security of Mobile Communication System Based on Computer Algorithms","authors":"Jinna Zhang","doi":"10.1142/s0218843024500023","DOIUrl":"https://doi.org/10.1142/s0218843024500023","url":null,"abstract":"<p>With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8<span><math altimg=\"eq-00001.gif\" display=\"inline\" overflow=\"scroll\"><mspace width=\".17em\"></mspace></math></span><span></span>s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAIKD: Tesla stock prediction based on Twitter comments' sentiment feature extraction and ensemble networks CAIKD:基于推特评论情感特征提取和集合网络的特斯拉股票预测
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500072
Zilan Cao, Senyao Hu, Hangyu Cao, Zheng Tao
{"title":"CAIKD: Tesla stock prediction based on Twitter comments' sentiment feature extraction and ensemble networks","authors":"Zilan Cao, Senyao Hu, Hangyu Cao, Zheng Tao","doi":"10.1142/s0218843024500072","DOIUrl":"https://doi.org/10.1142/s0218843024500072","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACSICS: Deep Learning Modified Reinforcement Learning with Virtual Machine Consolidation for Energy-Efficient Resource Allocation in Cloud Computing ACSICS:深度学习改进型强化学习与虚拟机整合,实现云计算中的高能效资源分配
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500059
Chiranjit Dutta, R.M Rani, Amar Jain, I. Poonguzhali, D. Salunke, Ruchi Patel
{"title":"ACSICS: Deep Learning Modified Reinforcement Learning with Virtual Machine Consolidation for Energy-Efficient Resource Allocation in Cloud Computing","authors":"Chiranjit Dutta, R.M Rani, Amar Jain, I. Poonguzhali, D. Salunke, Ruchi Patel","doi":"10.1142/s0218843024500059","DOIUrl":"https://doi.org/10.1142/s0218843024500059","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMRCDS: Privacy Preserving Wireless Sensor Networks For E-Healthcare Applications IMRCDS:用于电子医疗应用的隐私保护无线传感器网络
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500060
Amani K. Samha, Ghalib H. Alshammri, Niroj Kumar Pani, Yogesh Misra, V. Kolluru
{"title":"IMRCDS: Privacy Preserving Wireless Sensor Networks For E-Healthcare Applications","authors":"Amani K. Samha, Ghalib H. Alshammri, Niroj Kumar Pani, Yogesh Misra, V. Kolluru","doi":"10.1142/s0218843024500060","DOIUrl":"https://doi.org/10.1142/s0218843024500060","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical Practitioner-Centric Heterogeneous Network Powered Efficient E-Healthcare Risk Prediction On Health Big Data 基于健康大数据的以医生为中心的异构网络支持高效电子医疗风险预测
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500126
P. Sathyaprakash, Poovendran Alagarsundaram, Mohanarangan Veerapperumal Devarajan, Ahmed Alkhayyat, Parthasarathy Poovendran, D. R. Rani, V. Savitha
{"title":"Medical Practitioner-Centric Heterogeneous Network Powered Efficient E-Healthcare Risk Prediction On Health Big Data","authors":"P. Sathyaprakash, Poovendran Alagarsundaram, Mohanarangan Veerapperumal Devarajan, Ahmed Alkhayyat, Parthasarathy Poovendran, D. R. Rani, V. Savitha","doi":"10.1142/s0218843024500126","DOIUrl":"https://doi.org/10.1142/s0218843024500126","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMRCDS: Analysis of Influencing Factors of Economic Management Decision of Commercial Banks Based on Big Data Intelligent Decision IMRCDS:基于大数据智能决策的商业银行经济管理决策影响因素分析
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500114
Weijian Yang, Han Yang
{"title":"IMRCDS: Analysis of Influencing Factors of Economic Management Decision of Commercial Banks Based on Big Data Intelligent Decision","authors":"Weijian Yang, Han Yang","doi":"10.1142/s0218843024500114","DOIUrl":"https://doi.org/10.1142/s0218843024500114","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACSICS: Depth-guided filtering-based null-domain background suppression for graphic image enhancement in visual communication design ACSICS:基于深度引导滤波的空域背景抑制,用于视觉传达设计中的图形图像增强
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500102
Tian Xia
{"title":"ACSICS: Depth-guided filtering-based null-domain background suppression for graphic image enhancement in visual communication design","authors":"Tian Xia","doi":"10.1142/s0218843024500102","DOIUrl":"https://doi.org/10.1142/s0218843024500102","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139613856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CC2530-based wireless data long-distance communication simulation design and application 基于 CC2530 的无线数据长途通信仿真设计与应用
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500047
Yuling Zhang
{"title":"CC2530-based wireless data long-distance communication simulation design and application","authors":"Yuling Zhang","doi":"10.1142/s0218843024500047","DOIUrl":"https://doi.org/10.1142/s0218843024500047","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139525938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMRCDS: Study on Soft Sensing Model of Multi-component System Concentration Based on Linear Superposition of Single Molecule System IMRCDS: 基于单分子系统线性叠加的多组分系统浓度软传感模型研究
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500084
Jiangting Song, Fujiang Jin, Li-chun Zhou
{"title":"IMRCDS: Study on Soft Sensing Model of Multi-component System Concentration Based on Linear Superposition of Single Molecule System","authors":"Jiangting Song, Fujiang Jin, Li-chun Zhou","doi":"10.1142/s0218843024500084","DOIUrl":"https://doi.org/10.1142/s0218843024500084","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139526273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信