Internet of Things (IoT) are creating many research challenging issues for the industry and academia, towards novel potential impacts on the monitoring, control and understanding of world, weather, social life, security, health, emergencies and so on. The solutions to these challenges are expected soon to provide an effective and scalable support for the computation, data storage, analysis and use of the data that will be created by the explosive adoption of the IoT and machine to machine communication in many contexts. Improvements in the area of IoT require new ways to transform Big Data into Smart Data since only Big Data is not enough.
Smart Data aims to filter out the noise and hold the valuable data, which can effectively support IoT for planning, operation, monitoring, control, and intelligent decision making. However, it is a challenging issue to acquire Smart Data from Big Data. A large number of computational intelligent technologies such as artificial neural networks, evolutionary computation and fuzzy logic have been developed to obtain smart data. The adoption of computational intelligence technologies and theories in handling Big Data and Smart Data could offer a number of advantages.
The main focus of this special issue will be on the adoption of Smart Data for Internet of Things. We welcome authors to present new techniques, methodologies and research directions unsolved issues. Topics of interest include, but are not limited to:
- Mobile Data analysis, management and processing for IoT
- Information fusion for mobile data for IoT
- Drill Smart Data from Big Data for IoT
- New Techniques in Smart Data for IoT
- Machine learning algorithms over Big Data for IoT
- Deep learning models, architectures and algorithms for Big Data for IoT
- Brain-inspired representations learning of Big Data for IoT
- Edge/for/cloud computing for Big Data and Smart Data for IoT
- Security, privacy and trust in Big Data and Smart Data for IoT
- Security, privacy and trust in Internet of Things
- Streaming data learning algorithms for IoT
- Intelligent decision-making systems for Big Data and Smart Data in IoT
- Prediction methods for Big Data and Smart Data applications in IoT
- Evolutionary computing in Big Data in IoT
- Swarm Intelligence and Big data for IoT
- Handling uncertainty and incompleteness in Big Data and Smart Data for IoT
- Applications of Fuzzy Set theory, Rough Set theory, and Soft Set theory in Smart Data for IoT
- Open issues for Smart Data in IoT
计算机体系结构,并行与分布式计算
Future Generation Computer Systems
Special Issue on Smart Technologies and Architectures enabling the Internet of Things
The future Internet is expected to interconnect and to make interoperable heterogeneous and smart objects in order to realize the vision of the Internet of Things (IoT). This will allow for implementing pervasive and living environments for the benefit of several applications, such as environmental monitoring, building automation, healthcare, smart cities, smart grid, logistics. There are key emerging hardware technologies and innovative software architectures and functionalities that still need to be developed to make it a reality, which should mostly introduce distributed intelligence for a reliable and effective processing of the information about the physical world that should provide a complete knowledge to the top running applications. With this special issue, we invite authors to submit original research and review articles mainly focused on technological, architectural and practical innovations in the field of smart technologies and architectures enabling the Internet of Things. Potential topics include, but are not limited to:
- Middleware and architecture for the IoT
- Semantic Web and Ontology in the IoT
- Mobile applications in the IoT
- Wearable solutions for smart sensing environments
- Embedded systems for the IoT
- Mobile and Pervasive/Ubiquitous Computing
- Rapid prototyping
- Innovative AAL systems
- Microservices Architectures
- Innovative solutions for Industry 4.0 based on ModBus and MQTT
- Big Data and Data Analytics
- Smart environments and Internet of Things
- Case studies, field trials, and industrial Applications
计算机体系结构,并行与分布式计算
Future Generation Computer Systems
Special Issue on Emerging Computing Paradigms for Business Process Management
Business Process Management (BPM) has been referred to as a "holistic management" approach to aligning an organization's business processes with the needs of users. It promotes business effectiveness and efficiency while striving for innovation, flexibility, and integration with technology. However, the challenge for large-scale business process management is the complexity in addressing both the dynamic execution environment and the elastic requirement of users. Over the last decade, many new computing paradigms including cloud computing, mobile computing, mobile-cloud computing, and recent edge and fog computing have significantly impacted the IT industry, especially how organizations are running their business applications. These computing paradigms bring both challenges and opportunities for business process management.
The goal of this special issue is to promote the role of emerging computing paradigms such as Mobile-Cloud Computing, Edge and Fog Computing in business process management by discussing (1) what are the opportunities these new computing paradigm and related technologies can bring to BPM, including business and scientific workflows; and (2) what are the challenges to BPM and workflow systems that brought by these emerging computing paradigms. We are looking for high quality research works targeting challenging technical issues and also successful prototypes and case studies like Fog computing based BPM and workflow systems.
Topics of interest include, but are not limited to:
1. Emerging Computing Paradigms based BPM/workflow concepts and theory, e.g.
- Architecture of Fog/Edge/Mobile-Cloud based BPM
- Fog/Edge/Mobile-Cloud based BPM and Workflow as a Service
- Conceptual modelling and reasoning for business process
- Security, privacy and trust in Fog/Edge/Mobile-Cloud based BPM
- Other socio-technical aspects of BPM in the Fog/Edge/Mobile-Cloud
2. Emerging Computing Paradigms based BPM/workflow applications, e.g.
- Business and scientific workflows in the Fog/Edge/Mobile-Cloud
- Decision support systems for Fog/Edge/Mobile-Cloud based BPM
- Fog/Edge/Mobile-Cloud based BPM/workflow for e-Health systems
- People-/knowledge-intensive workflows
- Crowdsourcing and social networks based workflows
3. Emerging Computing Paradigms based BPM/workflow design, execution and analytics, e.g.
- Quality-of-Service constraints for workflow design and verification
- Load balancing and scheduling of Fog/Edge/Mobile-Cloud workflows
- Workflow data placement in Fog/Edge/Mobile-Cloud
- Big data analytics for Fog/Edge/Mobile-Cloud based BPM
- Fog/Edge/Mobile-Cloud/Context-based process mining
数据库管理与信息检索
Information Sciences
Special Issue on Information Sciences On Big Data Privacy
The massive deployment of networking, communications and computing technologies has brought us into the era of big data. Huge volumes of data are today generated and collected due to humancomputer interation, device-device communications, data outsourcing, environment sensing and behavior monitoring. Many such data often encode privacy-sensitive information related to individuals and support the inference of a large variety of privacy-sensitive information through the use of data analytics, data mining and machine learning. Thus, preserving privacy in the context of big data is a critical requirement in cyber-space. Obviously, preserving privacy of big data is even more challenging when dealing with many emerging technologies, e.g., Internet of Things (IoT), cloud computing, edge computing, crowdsourcing and crowdsensing, social networking, and next generation communication systems. Although technologies and theories are widely studied and applied to ensure data privacy in recent years, existing solutions are still inefficient, especially for big data. Preserving privacy of big data introduces additional challenges with regard to computational complexity, efficiency, adaptability, personality, flexibility, fine-graininess and scalability. Big data privacy promises many novel solutions and at the same time, many challenges should also be overcome.
This special issue aims to bring together researchers and practitioners to discuss various aspects of big data privacy, explore key theories, investigate significant algorithms, protocols and schemes and innovate new solutions for overcoming major challenges in this significant research area.
Topics include but are not limited to:
- Theoretical aspects of big data privacy
- Privacy-preserving computing models and techniques
- Fine-grained and personalized privacy preservation
- Privacy auditing and provenance management on big data
- Adaptive privacy preservation on big data
- Scalability of big data privacy protection
- Big data privacy protection based on blockchain
- Secure big data computation and verification
- Privacy preserving big data search and query
- Privacy preservation in big data fusion
- Privacy-preserving machine learning and data mining
- Privacy digitalization and computation
- Economic studies on big data privacy
计算机综合与前沿
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
Contribute to our new ongoing research series "Bringing the best actionable insights on cybersecurity"
全文截稿: 2018-12-31
影响因子: 0.579
CCF分类: 无
中科院JCR分区:
• 大类 : 工程技术 - 4区
• 小类 : 计算机:信息系统 - 4区
• 小类 : 计算机:跨学科应用 - 4区
网址: http://www.tandfonline.com/toc/hoce20/current
I am delighted to inform you of a new and game-changing publishing initiative for bringing the best actionable insights on cybersecurity and related issues to readers. A team of highly accomplished business leaders and outstanding scholars has been assembled to review and provide feedback on submissions. The process will be very focused and efficient, and geared toward disseminating quality insights that will have positive impacts on our organizations and society. Accepted manuscripts will be made available to readers as soon as possible, being published in the JOCEC Cybersecurity Matters series.
The following questions are representative of the desired scope of coverage by papers in the series: - What are the key elements of a comprehensive and robust approach to defending against various forms of cyber attacks on public and private sector organizations and infrastructure? - What are the key current and emerging technologies or techniques that we can leverage to effectively identify and respond to attacks? - What methods or approaches can organizations introduce to provide better intelligence about attacks against their networks and systems (thinking internal threat intelligence and honeypots)? - What role should senior leadership play in ensuring effective and mature cybersecurity governance practices? - What does it take to get senior leadership actively committed and engaged in securing sensitive data and systems? - How and why does preparation for protecting against cyber attacks differ across industries and organization types? - How and why are some organizations better than others in effectively executing cybersecurity plans? - What insights from prior research can guide managerial actions to secure the enterprise and its value chain partners? - What are some key challenges and hurdles during the varied phases of the information security planning and implementation process? What are some effective coping strategies? - Should investments in cybersecurity receive strategic priority and significance? Why or why not?
数据库管理与信息检索
Information Sciences
Special Issue on Safety and Security for Ubiquitous Computing and Communications
Computers are now available anytime, anywhere, by any means, and distributed unobtrusively throughout everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Such "any" computers open tremendous opportunities to provide numerous novel services/applications in both real world and cyberspaces, and exist ubiquitously in our daily life, working, learning, traveling, entertainment, medicine, etc. Although it is yet unclear what exactly the real-cyber integrated worlds would be, there is no doubt that they must be safe and secure.
Inspired by this “You (must) be safe” vision, “UbiSafe” in short, Prof. Jianhua Ma (Hosei University, Japan), Prof. Laurence T. Yang (St. Francis Xavier University, Canada), et. al., started the “UbiSafe Computing” conference in 2007, in Niagara Falls, Canada. It aims at bringing together researchers and practitioners in the world working on theories and technologies for ubiquitous artifacts to function safely for different purposes; for ubiquitous systems to work safely in various situations; and for ubiquitous environments to behave safely with all people. We propose this Special Issue in the Information Sciences journal in order to present safety and security issues for ubiquitous computing and communications.
This Special Issue on Safety and Security for Ubiquitous Computing and Communications in the Information Sciences journal solicits topics as follows, but not limited to:
(1) Theoretical Fundamentals on Safety and Security for Ubiquitous Computing and Communications
(2) Key Technologies to Enable Safety and Security Aspects for Ubiquitous Computing and Communications
(3) Systems, Services and Applications to Implement Safety and Security for Ubiquitous Computing and Communications
(4) Measures and Assessments on Safety and Security Components for Ubiquitous Computing and Communications
(5) Human Factors and Social Issues related to Ubiquitous Computing and Communications