Search results for "Data mining"

showing 10 items of 907 documents

A Dynamic Attribute-Based Authentication Scheme

2015

Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…

Scheme (programming language)AuthenticationComputer scienceComputerApplications_COMPUTERSINOTHERSYSTEMSConstruct (python library)computer.software_genreSignature (logic)Authentication protocolLightweight Extensible Authentication ProtocolData miningChallenge–response authenticationcomputerData Authentication Algorithmcomputer.programming_language
researchProduct

Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.

2008

Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…

Scheme (programming language)Computer sciencemedia_common.quotation_subjectHash functionHealth Informaticscomputer.software_genreEncryption01 natural sciencesField (computer science)Patient identificationPublic-key cryptography010104 statistics & probability03 medical and health sciences0302 clinical medicineHealth Information ManagementOriginality030212 general & internal medicine0101 mathematicscomputer.programming_languagemedia_commonAdvanced and Specialized Nursingbusiness.industryData CollectionEpidemiologic StudiesIdentity (object-oriented programming)Data miningbusinesscomputerAlgorithmsConfidentialityMethods of information in medicine
researchProduct

Modelling Dependencies Between Classifiers in Mobile Masquerader Detection

2004

The unauthorised use of mobile terminals may result in an abuse of sensitive information kept locally on the terminals or accessible over the network. Therefore, there is a need for security means capable of detecting the cases when the legitimate user of the terminal is substituted. The problem of user substitution detection is considered in the paper as a problem of classifying the behaviour of the person interacting with the terminal as originating from the user or someone else. Different aspects of behaviour are analysed by designated one-class classifiers whose classifications are subsequently combined. A modification of majority voting that takes into account some of the dependencies …

Scheme (programming language)Majority ruleComputer sciencebusiness.industrySubstitution (logic)Base (topology)Machine learningcomputer.software_genreInformation sensitivityTerminal (electronics)Artificial intelligenceData miningbusinesscomputercomputer.programming_language
researchProduct

A Forecasting Support System Based on Exponential Smoothing

2010

This chapter presents a forecasting support system based on the exponential smoothing scheme to forecast time-series data. Exponential smoothing methods are simple to apply, which facilitates computation and considerably reduces data storage requirements. Consequently, they are widely used as forecasting techniques in inventory systems and business planning. After selecting the most adequate model to replicate patterns of the time series under study, the system provides accurate forecasts which can play decisive roles in organizational planning, budgeting and performance monitoring.

Scheme (programming language)Mathematical optimizationSeries (mathematics)Computer sciencebusiness.industryComputationExponential smoothingPrediction intervalReplicatecomputer.software_genreComputer data storageData miningAutoregressive integrated moving averagebusinesscomputercomputer.programming_language
researchProduct

A symbolic distributed event detection scheme for Wireless Sensor Networks

2016

Due to the possibility of extensive and pervasive deployment of many tiny sensor devices in the area of interest, Wireless Sensor Networks (WSNs) result particularly suitable to detect significant events and to react accordingly in industrial and home scenarios. In this context, fuzzy inference systems for event detection in WSNs have proved to be accurate enough in treating imprecise sensory readings to decrease the number of false alarms. Besides reacting to event occurrences, the whole network may infer more information to enrich the event semantics resulting from reasoning processes carried out on the individual nodes. Contextual knowledge, including spatial and temporal relationships, …

Scheme (programming language)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceProcess (engineering)Event (computing)020208 electrical & electronic engineeringEvent DetectionForth020206 networking & telecommunicationsContext (language use)02 engineering and technologySymbolic Processingcomputer.software_genreDistributed SystemSoftware deployment0202 electrical engineering electronic engineering information engineeringData miningWireless sensor networkcomputerWireless Sensor Networkcomputer.programming_language
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct

A hybrid multi-objective optimization algorithm for content based image retrieval

2013

Abstract Relevance feedback methods in CBIR (Content Based Image Retrieval) iteratively use relevance information from the user to search the space for other relevant samples. As several regions of interest may be scattered through the space, an effective search algorithm should balance the exploration of the space to find new potential regions of interest and the exploitation of areas around samples which are known relevant. However, many algorithms concentrate the search on areas which are close to the images that the user has marked as relevant, according to a distance function in the (possibly deformed) multidimensional feature space. This maximizes the number of relevant images retriev…

Search algorithmFeature vectorGenetic algorithmRelevance feedbackRelevance (information retrieval)Data miningPrecision and recallcomputer.software_genreContent-based image retrievalcomputerImage retrievalSoftwareMathematicsApplied Soft Computing
researchProduct

A neural multi-agent based system for smart html pages retrieval

2003

A neural based multi-agent system for smart HTML page retrieval is presented. The system is based on the EalphaNet architecture, a neural network capable of learning the activation function of its hidden units and having good generalization capabilities. System goal is to retrieve documents satisfying a query and dealing with a specific topic. The system has been developed using the basic features supplied by the Jade platform for agent creation, coordination and control. The system is composed of four agents: the trainer agent, the neural classifier mobile agent, the interface agent, and the librarian agent. The sub-symbolic knowledge of the neural classifier mobile agent is automatically …

Search engineArtificial neural networkComputer scienceMulti-agent systemActivation functionMobile agentData miningDocument retrievalDigital librarycomputer.software_genrecomputerClassifier (UML)
researchProduct

Ad-Hoc Segmentation Pipeline for Microarray Image Analysis

2006

Microarray is a new class of biotechnologies able to help biologist researches to extrapolate new knowledge from biological experiments. Image Analysis is devoted to extrapolate, process and visualize image information. For this reason it has found application also in Microarray, where it is a crucial step of this technology (e.g. segmentation). In this paper we describe MISP (Microarray Image Segmentation Pipeline), a new segmentation pipeline for Microarray Image Analysis. The pipeline uses a recent segmentation algorithm based on statistical analysis coupled with K-Means algorithm. The Spot masks produced by MISP are used to determinate spots information and quality measures. A software …

Segmentation-based object categorizationComputer scienceScale-space segmentationSegmentationImage processingImage segmentationData miningcomputer.software_genrePipeline (software)computerImage Analysis Microarray Image Segmentation BioinformaticsVisualization
researchProduct

Mortality associated with the use of inappropiate drugs according Beers Criteria: a systematic review

2013

The aims of this systematic review are to identify and analyse the scientist literature available evidence about the use of potentially inappropriate medications, according to the Beers Criteria, that is associated with mortality in the elderly people.It have been made a search of publications in most traditional electronic databases among the scientific community (Pubmed / Medline, EMBASE and Web of Science) and it have been selected publications that obey the criteria of 'observational study', 'elderly' and 'Beers Criteria' and that they had as a result the mortality of the study population. After publications selection it proceeded to dump data by two researchers independently to avoid s…

Selection biasPolypharmacymedicine.medical_specialtyFarmacologiabusiness.industrymedia_common.quotation_subjectMEDLINEBeers CriteriaGeneral MedicineEvidence-based medicinecomputer.software_genreChecklistInfermeriaFamily medicineMeta-analysismedicineObservational studyData miningbusinesscomputermedia_common
researchProduct