Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Ei Chaw Htoon"'
Publikováno v:
2020 International Conference on Advanced Information Technologies (ICAIT).
Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy Attributes-Based Encryption (CP-ABE) is observed for the cloud environment. Beca
Publikováno v:
2020 International Conference on Advanced Information Technologies (ICAIT).
Hyperledger Fabric is a private blockchain intended to be confidentiality, security, scalability, transparency, and access control service to the enterprise. The impact of the configuration factors influences the performance of Hyperledger Fabric bec
Publikováno v:
2020 International Conference on Advanced Information Technologies (ICAIT).
Heterogeneity problem (data model, schema and semantics) is the one of the challenges of data integration from different big data stores. In order to overcome that problem in big data integration, semantic conceptual layer is constructed as an interm
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811533792
ACIIDS (Companion)
ACIIDS (Companion)
A key-value store is the primary architecture of data centers. Most modern data stores tend to be distributed and to enable the scaling of the replicas and data across multiple instances of commodity hardware. Defining static replica placement mechan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::277c30e2edd29738fc11dfa284012b50
https://doi.org/10.1007/978-981-15-3380-8_33
https://doi.org/10.1007/978-981-15-3380-8_33
Publikováno v:
2019 International Conference on Advanced Information Technologies (ICAIT).
When the amount of data is increasing, most of the distributed key-value storage systems use the quorum based consistent replica selection algorithms for fault-tolerance and load balancing. These algorithms allow higher consistency because the quorum
Publikováno v:
2019 International Conference on Advanced Information Technologies (ICAIT).
Ciphertext-policy Attributes-based Encryption (CP-ABE) is an encouraging cryptographic mechanism. It behaves an access control mechanism for data security. A ciphertext and secret key of user are dependent upon attributes. As a nature of CP-ABE, the
Autor:
Ei Chaw Htoon, Phoo Pyae Pyae Linn
Publikováno v:
2019 International Conference on Advanced Information Technologies (ICAIT).
Biometric authentication is more and more popular these days. Among authentication techniques, face recognition is the most widely used technique. Face anti-spoofing is the core of the biometric system. Face Anti-spoofing is about prevention of spoof
Publikováno v:
2019 International Conference on Advanced Information Technologies (ICAIT).
Big Data is a massive volume of both unstructured and structured data. It is crucial to efficiently represent big data as knowledge for data management. Ontologies provide knowledge as a formal description of a domain of interest. Therefore, the onto
Autor:
Ei Chaw Htoon, Mi Swe Zar Thu
Publikováno v:
ISKE
Smart mobile devices are essential for technology trend of modern lifestyles. Mobile applications are getting more diverse and complex with an increasing use of mobile devices. At mobile environment, resource limitation is irresistible extremely; it
Publikováno v:
2019 International Conference on Advanced Information Technologies (ICAIT).
Student records (SR) are needed to be regularly protected for safe access and security control. The blockchain system can support security, confidentiality, unchangeable, transparency and access control service. Although Hyperledger Fabric blockchain