GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    In: Scientific Programming, Hindawi Limited, Vol. 2020 ( 2020-07-14), p. 1-11
    Abstract: With the advancement in ICT, web search engines have become a preferred source to find health-related information published over the Internet. Google alone receives more than one billion health-related queries on a daily basis. However, in order to provide the results most relevant to the user, WSEs maintain the users’ profiles. These profiles may contain private and sensitive information such as the user’s health condition, disease status, and others. Health-related queries contain privacy-sensitive information that may infringe user’s privacy, as the identity of a user is exposed and may be misused by the WSE and third parties. This raises serious concerns since the identity of a user is exposed and may be misused by third parties. One well-known solution to preserve privacy involves issuing the queries via peer-to-peer private information retrieval protocol, such as useless user profile (UUP), thereby hiding the user’s identity from the WSE. This paper investigates the level of protection offered by UUP. For this purpose, we present QuPiD (query profile distance) attack: a machine learning-based attack that evaluates the effectiveness of UUP in privacy protection. QuPiD attack determines the distance between the user’s profile (web search history) and upcoming query using our proposed novel feature vector. The experiments were conducted using ten classification algorithms belonging to the tree-based, rule-based, lazy learner, metaheuristic, and Bayesian families for the sake of comparison. Furthermore, two subsets of an America Online dataset (noisy and clean datasets) were used for experimentation. The results show that the proposed QuPiD attack associates more than 70% queries to the correct user with a precision of over 72% for the clean dataset, while for the noisy dataset, the proposed QuPiD attack associates more than 40% queries to the correct user with 70% precision.
    Type of Medium: Online Resource
    ISSN: 1058-9244 , 1875-919X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hindawi Limited ; 2020
    In:  Scientific Programming Vol. 2020 ( 2020-12-3), p. 1-12
    In: Scientific Programming, Hindawi Limited, Vol. 2020 ( 2020-12-3), p. 1-12
    Abstract: Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR systems, the recognition accuracy of text is directly dependent on the quality of segmentation. In cursive text OCR systems, the segmentation of handwritten Urdu language text is a complex task because of the context sensitivity and diagonality of the text. This paper presents a line segmentation algorithm for Urdu handwritten and printed text and subsequently to ligatures. In the proposed technique, the counting pixel approach is employed for modified header and baseline detection, in which the system first removes the skewness of the text page, and then the page is converted into lines and ligatures. The algorithm is evaluated on manually generated Urdu printed and handwritten dataset. The proposed algorithm is tested separately on handwritten and printed text, showing 96.7% and 98.3% line accuracy, respectively. Furthermore, the proposed line segmentation algorithm correctly extracts the lines when tested on Arabic text.
    Type of Medium: Online Resource
    ISSN: 1875-919X , 1058-9244
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hindawi Limited ; 2020
    In:  Scientific Programming Vol. 2020 ( 2020-06-16), p. 1-9
    In: Scientific Programming, Hindawi Limited, Vol. 2020 ( 2020-06-16), p. 1-9
    Abstract: With the accelerating growth of big data, especially in the healthcare area, information extraction is more needed currently than ever, for it can convey unstructured information into an easily interpretable structured data. Relation extraction is the second of the two important tasks of relation extraction. This study presents an overview of relation extraction using distant supervision, providing a generalized architecture of this task based on the state-of-the-art work that proposed this method. Besides, it surveys the methods used in the literature targeting this topic with a description of different knowledge bases used in the process along with the corpora, which can be helpful for beginner practitioners seeking knowledge on this subject. Moreover, the limitations of the proposed approaches and future challenges were highlighted, and possible solutions were proposed.
    Type of Medium: Online Resource
    ISSN: 1058-9244 , 1875-919X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: Scientific Programming, Hindawi Limited, Vol. 2020 ( 2020-09-01), p. 1-17
    Abstract: Politics is one of the hottest and most commonly mentioned and viewed topics on social media networks nowadays. Microblogging platforms like Twitter and Weibo are widely used by many politicians who have a huge number of followers and supporters on those platforms. It is essential to study the supporters’ network of political leaders because it can help in decision making when predicting their political futures. This study focuses on the supporters’ network of three famous political leaders of Pakistan, namely, Imran Khan (IK), Maryam Nawaz Sharif (MNS), and Bilawal Bhutto Zardari (BBZ). This is done using social network analysis and semantic analysis. The proposed method (1) detects and removes fake supporter(s), (2) mines communities in the politicians’ social network(s), (3) investigates the supporters’ reply network for conversations between supporters about each leader, and, finally, (4) analyses the retweet network for information diffusion of each political leader. Furthermore, sentiment analysis of the supporters of politicians is done using machine learning techniques, which ultimately predicted and revealed the strongest supporter network(s) among the three political leaders. Analysis of this data reveals that as of October 2017 (1) IK was the most renowned of the three politicians and had the strongest supporter’s community while using Twitter in a very controlled manner, (2) BBZ had the weakest supporters’ network on Twitter, and (3) the supporters of the political leaders in Pakistan are flexible on Twitter, communicating with each other, and that any group of supporters has a low level of isolation.
    Type of Medium: Online Resource
    ISSN: 1058-9244 , 1875-919X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Scientific Programming Vol. 2022 ( 2022-3-16), p. 1-13
    In: Scientific Programming, Hindawi Limited, Vol. 2022 ( 2022-3-16), p. 1-13
    Abstract: Nowadays, millions of telecommunication devices, IoT sensors, and web services, especially social media sites, are producing big data every second. Such applications with massive data-generating capabilities need to access these data quickly. Among other approaches, cloud computing provides content delivery networks, which utilize data replication for better latency to such real-time applications. Fast processing, storage, and timely analysis of these data are the challenge for most of these future Internet applications. However, cloud computing is the ultimate storage and processing paradigm to resolve such issues and to deal with big data, with the same speed in which data are being produced. Moreover, cloud computing technology has been evolved with the tag line of “Everything as A Service” now, and for powering all these services, provision of data is a compulsory and significant task. To provide end user with easy and fast access to data, the cloud maintains backup and replicates the copies in multiple data centers. The geographical locations of these data centers where data are being placed have a profound impact on data access time. To deal with the challenge of effective data replication and to reduce data access time to a minimum, we propose a genetic algorithm (GA)-based technique to suggest and store data on nearly located data centers. The proposed algorithm improves the access time, and thus, the efficiency of cloud servers by providing quality of service (QoS) to end user.
    Type of Medium: Online Resource
    ISSN: 1875-919X , 1058-9244
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    In: Scientific Programming, Hindawi Limited, Vol. 2022 ( 2022-9-13), p. 1-10
    Abstract: The tremendous development in mobile technology attracts users’ attention. Thus, the users are shifting from traditional computational devices to smartphones and tablets, and because of that, mobile devices have anticipated most of the global IP traffic. However, mobile device’s resource-constrained behaviour cannot handle the heavy computational load. Mobile cloud computing (MCC) mitigates resource-constrained issues by enabling computing resources with minimal effort. However, providing security in MCC is an obstacle due to users’ uncertain and dynamic behaviour and the explosion of online computerized data. Providing security, confidentiality, and authentication is not enough in MCC; therefore, the users need authorization. Thus, the paper designs an access control mechanism by computing the trust based on the user’s uncertain behaviour. This mechanism mitigates the malicious actions caused by authenticated users. Performance results indicate that the access control mechanism accurately detects and mitigates malicious users from the MCC environment.
    Type of Medium: Online Resource
    ISSN: 1875-919X , 1058-9244
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Elsevier BV ; 2018
    In:  Future Generation Computer Systems Vol. 87 ( 2018-10), p. 364-371
    In: Future Generation Computer Systems, Elsevier BV, Vol. 87 ( 2018-10), p. 364-371
    Type of Medium: Online Resource
    ISSN: 0167-739X
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2018
    detail.hit.zdb_id: 48781-8
    detail.hit.zdb_id: 2020551-X
    detail.hit.zdb_id: 1100390-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Hindawi Limited ; 2020
    In:  Scientific Programming Vol. 2020 ( 2020-06-12), p. 1-9
    In: Scientific Programming, Hindawi Limited, Vol. 2020 ( 2020-06-12), p. 1-9
    Abstract: The aim of the Internet of things (IoT) is to bring every object (wearable sensors, healthcare sensors, cameras, home appliances, smart phones, etc.) online. These different objects generate huge data which consequently lead to the need of requirements of efficient storage and processing. Cloud computing is an emerging technology to overcome this problem. However, there are some applications (healthcare) which need to process data in real time to improve its performance and require low latency and delay. Fog computing is one of the promising solutions which facilitate healthcare domain in terms of reducing the delay multihop data communication, distributing resource demands, and promoting service flexibility. In this study, a fog-based IoT healthcare framework is proposed in order to minimize the energy consumption of the fog nodes. Experimental results reveal that the performance of the proposed framework is efficient in terms of network delay and energy usage. Furthermore, the authors discussed and suggested important services of big data infrastructure which need to be present in fog devices for the analytics of healthcare big data.
    Type of Medium: Online Resource
    ISSN: 1058-9244 , 1875-919X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Elsevier BV ; 2016
    In:  Computers & Mathematics with Applications Vol. 71, No. 7 ( 2016-04), p. 1464-1478
    In: Computers & Mathematics with Applications, Elsevier BV, Vol. 71, No. 7 ( 2016-04), p. 1464-1478
    Type of Medium: Online Resource
    ISSN: 0898-1221
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2016
    detail.hit.zdb_id: 2004251-6
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...