Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Autoencoders (1)
- Bidding lifecycle (1)
- Business Intelligence and Data Warehouse (1)
- Data Masking (1)
- Data Reduction (1)
-
- Data Security and Anonymization (1)
- Deep Learning (1)
- Edge Computing (1)
- Free exchange e-marketplace (1)
- Free strategic conduct (1)
- Health Data Privacy (1)
- Human Activity Recognition (1)
- IoT (1)
- Multiple quality GSP double auction (1)
- Rule-based bidding (1)
- Software Framework (1)
- Stable social efficiency (1)
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
A Free Exchange E-Marketplace For Digital Services, Wafa M. I. Ghonaim
A Free Exchange E-Marketplace For Digital Services, Wafa M. I. Ghonaim
Electronic Thesis and Dissertation Repository
The digital era is witnessing a remarkable evolution of digital services. While the prospects are countless, the e-marketplaces of digital services are encountering inherent game-theoretic and computational challenges that restrict the rational choices of bidders. Our work examines the limited bidding scope and the inefficiencies of present exchange e-marketplaces. To meet challenges, a free exchange e-marketplace is proposed that follows the free market economy. The free exchange model includes a new bidding language and a double auction mechanism. The rule-based bidding language enables the flexible expression of preferences and strategic conduct. The bidding message holds the attribute-valuations and bidding rules …