The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In cloud storage environment, clients no longer have physical possession of their data, it indicates that their data may be leaked maliciously by cloud provider. To avoid the security risks, we propose a privacy preserving keyword searching scheme whose encryption procedure needs no pairing operation. Our scheme
Keyword Search Over Relational Databases(KSORD) has been widely studied in recent years. However, existing KSORD methods are usually based on schema graph or data graph and they are actually tuple-level methods. That is, the retrieved objects are direct tuple-level relational data, and the retrieval results are tuple
The advent of cloud computing has dramatically changed the IT scene, as it offers cost savings and improvements to major operations. Nevertheless, the major obstacle relies on the effort on how to secure sensitive data files that are outsourced to the cloud environment. To ensure confidentiality, the sensitive data
The remote storage service has been one of the most popular cloud services. However, outsourcing in the remote storage causes a privacy issue such as the exposure of personal data and the leakage of private information. In this paper, we focus on the encrypted keyword search problem, called searchable symmetric
cloud becomes a major challenge. The public-key encryption with keyword search (PEKS) scheme and many of its variants have been proposed to respond to this challenge. However, given a large number of data (or searchable keywords) would be tested sequentially in these PEKS schemes, previous search results should be employed
In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies. In this work, we consider an unstructured keyword based social network topology where each edge has a trust value associated with it to
particular category. Search is truly ``local'' in the sense that keyword relevance is not global, but specific to the category. In contrast to using a search engine, users can guide the exploration engine with relevance feedback alone without entering keywords.
relevance of results by combining topic-specific trust among community members and individual's resources evaluation. The approach has been prototyped with Antu, built over the IT-specific faceted keyword-based search tool Yarquen. An experimental study was conducted with informatics graduate students, and found improved
) covers all applications of anonymous encryption, fully private communication and search on encrypted data, which provide trusted data access control policy to CSP. However, the existing works only achieve either selectively attribute-hiding or adaptively attribute-hiding under some strong assumptions in the public key
proteins based on the experimentally validated interactions curated in public PPI database. Additionally, we have tried to provide the information on interaction types associated with each of the predicted interactions with an estimated confidence. Further, we have analyzed our predicted interactions by finding overlap with
many schemes have been proposed but these schemes do not consider the semantic of the query. We proposed a novel method by combining LSI and hierarchical cluster to get the semantic relation between the result and to reduce the search space respectively. Further, to verify the search result authenticity, we use MAC tree
True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story
Cloud computing enables the data stored on the cloud to be accessed anytime and anywhere. The data stored online must be encrypted using either symmetric key encryption or public key encryption to prevent it from unauthorized access. The end user may desire to perform dynamic updates i.e. insertion, deletion and
Visual Object and Place Recognition are very important issues in computer vision and mobile robotics. In the literature, many approaches have been introduced to solve these problems. Still, one of the most widely used approaches in computer vision refers to as combining the machine learning algorithms to learn objects
Color continues to be an important topic and the cultural identification plays a significant role in society. This research focuses on combining known facts about cultural responses to colors by data-mining social media. To differentiate the use of 11 basic color terms in Japanese and German Twitter feeds, word
to use a hybrid approach, combining revenue from advertising and subscriptions. By far the most profitable venue for on-line advertising has been search, and much of the effectiveness of search advertising comes from the “adwords” model of matching search queries to advertisements. This paper is to survey
systems, mechanical and geometric design, and many other areas. Nevertheless, computer-aided geometric design is an endeavor with a character, emphasis, and purpose of its own, combining techniques and principles from other fields with unique approaches that are often somewhat enigmatic and confusing to the novice. Many
backgrounds, geographical locations and situations. The working hypothesis of the project was that fuzzy mathematics combined with domain-specific data models, in other words, fuzzy ontologies, would help manage the uncertainty in finding information that matches the users needs. In this way, KNOWMOBILE places itself in the
sharing related to public safety communications (PSC) and information exchange technologies and procedures - and trust is the keyword here. According to our studies, the topic “trust-building” could be seen as the most important issue with regard to multi-agency PPDR cooperation. Cyber security should be seen
keywords and has higher detection rate. In this paper, we propose a rule based combination method for combining output of these two keyword spotters in order to benefit from features and advantages of each method and overcome weaknesses and drawbacks of them. Experimental results of applying this combination method on both
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.