International Journal of Innovative Computing and Applications (8 papers in press)
Dual Neighborhood Discrete Artificial Bee Colony Algorithm for the Convex Polygons Packing Problem with Constraints of Equilibrium
by Zhendong Huang, Renbin Xiao
Abstract: For the optimal packing problem of convex polygons in a circular container with performance constraint, a hybrid algorithm which combines an improved ripple exploratory heuristic algorithm (IREHA) with dual-neighbourhood discrete artificial bee colony algorithm (DDABC) is proposed. IREHA improves search efficiency of the original REHA. Because of the excellent performance of artificial bee colony algorithm, which can not be directly used to optimize the discrete packing order, DDABC based on discrete dual neighbourhood structure is designed to combine with IREHA to form hybrid algorithm. The numerical experiments show that the hybrid algorithm is very effective.
Keywords: Equilibrium constraints; Packing optimization; Heuristic; Discrete artificial bee colony algorithm; Dual neighbourhood.
by Shashank Gupta, Brij Gupta
Blind Hyperspectral Unmixing by Nonparametric Non-Gaussianity Measure
by Fasong WANG
Abstract: For linear mixing model (LMM) of hyperspectral unmixing (HU) in hyperspectral images processing problem, the endmember fractional abundances satisfy the sum-to-one constraint, which makes the well-known independent component analysis (ICA) based blind source separation (BSS) algorithms not well suited to blind hyperspectral unmixing (bHU). A novel nonparametric bHU approach consulting dependent component analysis (DCA) is presented in this paper. The novel cost function is derived based on the cumulative density function (CDF) and order statistics (OS) instead of traditional probability density function (PDF). By executing the stochastic gradient rule of constrained optimization method, the efficient dependent sources separation algorithm for bHU is obtained to fulfill the endmember signatures extraction and abundances estimation tasks. Simulations based on the synthetic data are performed to evaluate the validity of the proposed nonpNG-bHU algorithm.
Keywords: independent component analysis (ICA); blind source separation (BSS); blind hyperspectral unmixing (bHU); dependent component analysis (DCA).
Hybrid algorithms for 3-SAT optimization using MapReduce on clouds
by Sergio Nesmachnow, Marcos Barreto, Andrei Tchernykh
Abstract: This article presents the advances on applying a MapReduce approach for solving optimization problems using Hadoop on cloud computing systems. The main advantages and limitations of the proposed strategy are presented and commented. A concrete case study is reported, analyzing several algorithmic approaches to solve the 3-SAT, a well-known version of the Boolean satisfiability problem. Several variants of the MapReduce 3-SAT solver are designed and evaluated to demonstrate that the collaborative approach is a promising option for solving optimization problems in the cloud.
Keywords: MapReduce; Hadoop; Optimization; Cloud; 3-SAT.
POND: Polishing the Execution of Nested Context-Familiar Runtime Dynamic Parsing and Sanitization of XSS Worms on Online Edge Servers of Fog Computing
by Shashank Gupta, Brij Gupta
Keywords: Cloud Security; Fog Computing; Edge Servers; XSS Worms; Online Social Network (OSN) Security; Context-Familiar Sanitization; HTML5.
Special Issue on: Secure Data Storage in Cloud Computing
An Access Control Framework for Multi-level Security in Cloud Environments
by Hongbin Zhang, Junshe Wang, Jiang Chang, Ning Cao
Abstract: Access control is important for the security in cloud environments while increasing demands for secure interactions in the cloud bring new challenges to access control technologies. As a cloud always consists of many domains, in this paper we design an access control framework which provides rigorous multilevel security in single domain and a multilevel mapping method between domains. In each domain, a policy processing method is designed to handle the multilevel policies and creates a DAG model that describes the access control relationship between all entities in the domain. The DAG model can be converted to a hierarchical access control structures that ensure rigorous multilevel security in intra domains. And between domains, the mapping method based on quantized subject attributes is proposed to determine the subjects security level in its target domain. Credibility is used in the framework to adjust the mapping value in order to achieve flexible multilevel inter-domain access control. Experimental results from simulations show that proposal in this paper can realize accurate inter-domain mapping and achieve multilevel security access control in inter-domain.
Keywords: multi-level security; cloud; access control; multi-attributes quantization; inter-domain mapping.
Special Issue on: Social Media Analysis From Misinformation to Valuable Data Source
Multi-level Privacy Preserving Data Publishing
by Zhiqiang Gao
Abstract: Policedata is an important source of social media data and can be regarded as a technical assistance to increase government accountability and transparency. Notably, it contains large amounts of personal private information that should be preserved deliberately. However, sharing and publishing policedata through private or public cloud infrastructure are still faced with tremendously potential threats and challenges recently: (1) with little constant vigilance of data privacy, neither data curators nor insiders of police department pay adequate attention on the process of data publishing, holding the mind that policedata can be published, transferred, data-mined and shared within inner network safely as well as conveniently. (2) multi-sourced policedata from social media, such as tabular data and web pages, result in high complexity of privacy preserving data publishing. (3) privacy preservation in policedata is still problematic and vulnerable in the complex situation of multi-level data publishing. Unfortunately, existing researches regarding privacy preserving data publishing (PPDP) fail to cope with the aforementioned problems. Our work aims to propose a systematic multi-level privacy preserving data publishing (ML-PPDP) architecture. Moreover, a personalized multi-level privacy preserving (pML-PPDP) mechanism that developed from the combination of the state-of-the-art methods including k-anonymity, l-diversity, t-closeness and differential privacy is designed for policedata publishing. Our solution authorized users with different privileges to different privacy-preserving levels. Experimental results of pML-PPDP mechanism on datasets collected from policedata website are implemented under our proposed ML-PPDP architecture with satisfactory trade-off between privacy and utility.
Keywords: Social media policedata; Privacy preserving data publishing; Attribute-based Encryption; k-anonymity; l-diversity; t-closeness; Differential privacy.
The spread pattern on Ebola and the control schemes
by Jiangjie Sun
Abstract: This paper aims to study a reasonable system that includes viral transmission and disease cure of Ebola. Firstly, we utilize the logistic model to simulate the change of number of patients. Secondly, we establish the infection dynamics model to evaluate the probability of the outbreak of related region according to some close-related indexes. Finally, we make use of nonlinear programming and 0-1 integer programming to achieve the maximum efficiency for the whole system in spite of the minimum costs.
Keywords: Reasonable system; logistic model; 0-1 integer programming.