Social networks have developed rapidly, recent research has begun to explore social networks to understand their structure, advertising and marketing, and data mining. Cloud computing as an emerging computing paradigm, is expected to reshape the information technology processes in the near future. Cloud services, which are available in a payas- you-go manner, promise ubiquitous 24/7 […]
A human behavior modeling Paradigm in cyber infrastructure
There are many problems in which one seeks to develop predictive models to map between a set of predictor variables and an outcome. Statistical tools such as multiple regression or neural networks provide mature methods for computing model parameters when the set of predictive covariates and the model structure are pre-specified. Furthermore, recent research is […]
The Sequence of Operations In Credit Card Transaction Processing
They proposed credit card fraud detection with a neural network. They have built detection system, which is trained on a large sample of labeled credit card account transactions. These transactions contain example fraud cases due to lost cards, stolen cards, application fraud, counterfeit fraud, mail-order fraud, and non received issue (NRI) fraud. suggest a credit […]
Learning with attributes as label embedding
The image classification problem: given an image, we wish to annotate it with one (or multiple) class label(s) describing its visual content. Image classification is a prediction task where the goal is to learn from labeled data a function : The maps an input x in the space of images to an output in the […]
Multiple-input-multiple-output (MIMO) wireless systems
Increasing demand for high-speed wireless networks has motivated the development of wireless ad-hoc networks. In order to fully exploit the technological development in radio hardware and integrated circuits, which allow for implementation of more complicated communication schemes, the fundamental performance limits of wireless networks should be reevaluated. In this context, the distinct characteristics of wireless […]
Collaboration Framework for Multi Cloud Systems
The term cloud computing can be defined as “a system that is concerned with the integration, virtualization, standardization, and management of services and resources”. The benefits of cloud computing include minimized capital expenditure, utilization and efficiency improvement, high computing power, location and device independence and finally very high scalability . Cloud computing brings a scenario […]
Two server password only Authentication and key exchange
Nowdays, passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines and so on. A computer user may require passwords for many purposes: logging in to computer accounts, retrieving e-mail from servers, accessing programs, databases, networks, web sites, […]
The Basis Of Information Entropy
The current state of the art of privacy-preserving techniques in participatory sensing. The first implementation of a privacy aware architecture, named Anony Sense, for the anonymous task allocation and data reporting. From the perspective of cryptography, analyzed the realistic architectural assumptions and privacy requirements, and then provided an instantiation that achieved privacy protection in participatory […]