期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Enhancing Mobile Cloud Computing Security Using Steganography
1
作者 hassan reza Madhuri Sonawane 《Journal of Information Security》 2016年第4期245-259,共15页
Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload da... Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized user by the cloud administration, but there is no security provision to prevent unauthorized access by the cloud administrators to the client data on the cloud computing. In this paper, we demonstrate how steganography, which is a secrecy method to hide information, can be used to enhance the security and privacy of data (images) maintained on the cloud by mobile applications. Our proposed model works with a key, which is embedded in the image along with the data, to provide an additional layer of security, namely, confidentiality of data. The practicality of the proposed method is represented via a simple case study. 展开更多
关键词 Cloud Computing Mobile Computing Software Security Software Privacy Data Hiding STEGANOGRAPHY ENCRYPTION
下载PDF
Applied Machine Learning Methods for Detecting Fractured Zones by Using Petrophysical Logs
2
作者 Haleh Azizi hassan reza 《Intelligent Control and Automation》 2021年第2期44-64,共21页
In the last decade, a few valuable types of research have been conducted to discriminate fractured zones from non-fractured ones. In this paper, petrophysical and image logs of eight wells were utilized to detect frac... In the last decade, a few valuable types of research have been conducted to discriminate fractured zones from non-fractured ones. In this paper, petrophysical and image logs of eight wells were utilized to detect fractured zones. Decision tree, random forest, support vector machine, and deep learning were four classifiers applied over petrophysical logs and image logs for both training and testing. The output of classifiers was fused by ordered weighted averaging data fusion to achieve more reliable, accurate, and general results. Accuracy of close to 99% has been achieved. This study reports a significant improvement compared to the existing work that has an accuracy of close to 80%. 展开更多
关键词 Decision Tree Deep Learning Ordered Weighted Averaging Random For-est Support Vector Machine
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部