RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Determinants of Writing Research According to International Standards in Web of Science Journals

        Al Sawy, Yaser Mohammad Mohammad International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.3

        The study aimed to define all the main determinants of writing a research paper in an integrated manner within the requirements of the science network journals, by introducing scientific research and the steps of writing a research paper, starting from choosing the title to writing the abstract, identifying the research problem, questions, importance and objectives of the study, how to choose previous studies, research methodology and tools, discussion and results In addition to determining the acceptable percentage of plagiarism for science network journals, recommendations, choosing appropriate references and choosing the appropriate references, in addition to determining the acceptable percentage of plagiarism for the journals of the Network of Science, the researcher used the method of analytical investigative research to find out the axes of the study and analyze different reference citation methods to deal with different sources of information (articles-books-theses-conference works-reviews), In addition to studying the most important international programs for measuring plagiarism ratios that are accredited within the journals of the Science Network, and the study concluded that the researcher must present original and innovative results, add an integrated and logical work, take into account all the scientific conditions in the design of the research, its steps and ethics, and take into account the international standards in citing Reference, taking into account the rates of plagiarism within Web of Science journals.

      • Local Self-Government in the Conditions of Digitization: International-Legal Experience

        Perezhniak, Boris,Vasylchuk, Larysa,Bevz, Tetiana,Pyroha, Serhii,Ulianov, Oleksiy International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.10

        Nowadays more and more attention is paid to digital technologies, digitization, and the digitization of public services in particular. Progressive countries aim to build "digital" governance and a digital economy. In this aspect, the international experience of using digitization in the field of public administration, including in local self-government bodies, plays an important role. Therefore, it is important to analyze the international legal experience of the functioning of local self-government in the conditions of digitization. The purpose of the work is to study the international legal experience of the functioning of local self-government in the conditions of digitization. The object of the study is local self-government in the conditions of digitization through the prism of international legal experience. The subject of the study is social relations that arise, change, and cease during the implementation of digitization in local self-government in Ukraine and foreign countries. The research methodology consists of such methods as the method of philosophical hermeneutics; dialectical method; classification method; comparative method; target method; method of documentary analysis; generalization method. Research results. As a result of the conducted research, the international experience of the functioning of local self-government in conditions of digitization was analyzed. In particular, the impact of digitization processes on the course of the decentralization reform in Ukraine is summarized. Also, from the analysis of international experience, a conclusion was made about the potential possibility of reducing the existing gap in the process of communication between the central government and united territorial communities thanks to the introduction of the latest technologies in the field of administrative services, to stimulate innovative and economic development of regions, attracting the attention of businesses and potential investors, as well as the functioning of more open local authorities with electronic communication tools.

      • A Predictive Virtual Machine Placement in Decentralized Cloud using Blockchain

        Suresh B.Rathod International Journal of Computer ScienceNetwork S 2024 International journal of computer science and netw Vol.24 No.4

        Host's data during transmission. Data tempering results in loss of host's sensitive information, which includes number of VM, storage availability, and other information. In the distributed cloud environment, each server (computing server (CS)) configured with Local Resource Monitors (LRMs) which runs independently and performs Virtual Machine (VM) migrations to nearby servers. Approaches like predictive VM migration [21] [22] by each server considering nearby server's CPU usage, roatative decision making capacity [21] among the servers in distributed cloud environment has been proposed. This approaches usage underlying server's computing power for predicting own server's future resource utilization and nearby server's resource usage computation. It results in running VM and its running application to remain in waiting state for computing power. In order to reduce this, a decentralized decision making hybrid model for VM migration need to be proposed where servers in decentralized cloud receives, future resource usage by analytical computing system and takes decision for migrating VM to its neighbor servers. Host's in the decentralized cloud shares, their detail with peer servers after fixed interval, this results in chance to tempering messages that would be exchanged in between HC and CH. At the same time, it reduces chance of over utilization of peer servers, caused due to compromised host. This paper discusses, an roatative decisive (RD) approach for VM migration among peer computing servers (CS) in decentralized cloud environment, preserving confidentiality and integrity of the host's data. Experimental result shows that, the proposed predictive VM migration approach reduces extra VM migration caused due over utilization of identified servers and reduces number of active servers in greater extent, and ensures confidentiality and integrity of peer host's data.

      • A Survey on Predicting Workloads and Optimising QoS in the Cloud Computing

        Omar F. Aloufi,Karim Djemame,Faisal Saeed,Fahad Ghabban International Journal of Computer ScienceNetwork S 2024 International journal of computer science and netw Vol.24 No.2

        This paper presents the concept and characteristics of cloud computing, and it addresses how cloud computing delivers quality of service (QoS) to the end-user. Next, it discusses how to schedule one's workload in the infrastructure using technologies that have recently emerged such as Machine Learning (ML). That is followed by an overview of how ML can be used for resource management. This paper then looks at the primary goal of this project, which is to outline the benefits of using ML to schedule upcoming demands to achieve QoS and conserve energy. In this survey, we reviewed the research related to ML methods for predicting workloads in cloud computing. It also provides information on the approaches to elasticity, while another section discusses the methods of prediction used in previous studies and those that used in this field. The paper concludes with a summary of the literature on predicting workloads and optimising QoS in the cloud computing.

      • The Security and Privacy Issues of Fog Computing

        Sultan Algarni,Khalid Almarhabi,Ahmed M. Alghamdi,Asem Alradadi International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.4

        Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

      • Software Defined Networking and Network Function Virtualization for improved data privacy using the emergent blockchain in banking systems

        ALRUWAILI, Anfal,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.8

        Banking systems are sensitive to data privacy since users' data, if not well protected, may be used to perform fake transactions. Blockchains, public and private, are frequently used in such systems thanks to their efficiency and high security. Public blockchains fail to fully protect users' data, despite their power in the accuracy of the transactions. The private blockchain is better used to protect the privacy of the sensitive data. They are not open and they apply authorization to login into the blockchain. However, they have a lower security compared to public blockchain. We propose in this paper a hybrid public-private architecture that profits from network virtualization. The main novelty of this proposal is the use of network virtualization that helps to reduce the complexity and efficiency of the computations. Simulations have been conducted to evaluate the performance of the proposed solution. Findings prove the efficiency of the scheme in reducing complexity and enhancing data privacy by guarantee high security. The contribution conducted by this proposal is that the results are verified by the centralized controller that ensures a correct validation of the resulted blockchains. In addition, computation complexity is to be reduced by profiting from the cooperation performed by the virtual agents.

      • Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

        Asma Albassam,Fatima Almutairi,Nouf Majoun,Reem Althukair,Zahra Alturaiki,Atta Rahman,Dania AlKhulaifi,Maqsood Mahmud International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.6

        Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

      • Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction

        Ahamad, Shahanawaj International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.2

        To fulfill user expectations, the rapid evolution of software techniques and approaches has necessitated reliable and flawless software operations. Aging prediction in the software under operation is becoming a basic and unavoidable requirement for ensuring the systems' availability, reliability, and operations. In this paper, an improved evolutionary computing-driven extreme learning scheme (ECD-ELM) has been suggested for object-oriented software aging prediction. To perform aging prediction, we employed a variety of metrics, including program size, McCube complexity metrics, Halstead metrics, runtime failure event metrics, and some unique aging-related metrics (ARM). In our suggested paradigm, extracting OOP software metrics is done after pre-processing, which includes outlier detection and normalization. This technique improved our proposed system's ability to deal with instances with unbalanced biases and metrics. Further, different dimensional reduction and feature selection algorithms such as principal component analysis (PCA), linear discriminant analysis (LDA), and T-Test analysis have been applied. We have suggested a single hidden layer multi-feed forward neural network (SL-MFNN) based ELM, where an adaptive genetic algorithm (AGA) has been applied to estimate the weight and bias parameters for ELM learning. Unlike the traditional neural networks model, the implementation of GA-based ELM with LDA feature selection has outperformed other aging prediction approaches in terms of prediction accuracy, precision, recall, and F-measure. The results affirm that the implementation of outlier detection, normalization of imbalanced metrics, LDA-based feature selection, and GA-based ELM can be the reliable solution for object-oriented software aging prediction.

      • Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

        Alsadie, Deafallah International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.4

        Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

      • A Computer-Aided Text Analysis to Explore Recruitment and Intellectual Polarization Strategies in ISIS Media

        Khafaga, Ayman Farid International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.8

        This paper employs a computer-aided text analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the strategies of recruitment and intellectual polarization in ISIS (Islamic State in Iraq and Syria) media. The paper's main objective is to shed light on the efficacy of employing computer software in the linguistic analysis of texts, and the extent to which CATA software contribute to deciphering hidden meanings of texts as well as to arrive at concise and authentic results from these texts. More specifically, this paper attempts to demonstrate the contribution of CATA software represented in the two variables of Frequency Distribution Analysis (FDA) and Content Analysis (CA) in decoding the strategies of recruitment and intellectual polarization in one of ISIS 's digital publication: Rumiyah (a digital magazine published by ISIS). The analytical focus is on three strategies of recruitment and intellectual polarization: (i) lexicalization, (ii) intertextual religionisation, and (iii) justification. Two main findings are revealed in this study. First, the application of CATA software into the linguistic investigation of texts contributes effectively to the understanding of the thematic and ideological messages pertaining to the analyzed text. Second, the computational analysis guarantees concise, credible, authentic and ample results than is the case if the analysis is conducted without the work of computer software. The paper, therefore, recommends the integration of CATA software into the linguistic analysis of the various types of texts.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼