Search results for "Data mining"
showing 10 items of 907 documents
A Dynamic Attribute-Based Authentication Scheme
2015
Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…
Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.
2008
Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection
2004
The unauthorised use of mobile terminals may result in an abuse of sensitive information kept locally on the terminals or accessible over the network. Therefore, there is a need for security means capable of detecting the cases when the legitimate user of the terminal is substituted. The problem of user substitution detection is considered in the paper as a problem of classifying the behaviour of the person interacting with the terminal as originating from the user or someone else. Different aspects of behaviour are analysed by designated one-class classifiers whose classifications are subsequently combined. A modification of majority voting that takes into account some of the dependencies …
A Forecasting Support System Based on Exponential Smoothing
2010
This chapter presents a forecasting support system based on the exponential smoothing scheme to forecast time-series data. Exponential smoothing methods are simple to apply, which facilitates computation and considerably reduces data storage requirements. Consequently, they are widely used as forecasting techniques in inventory systems and business planning. After selecting the most adequate model to replicate patterns of the time series under study, the system provides accurate forecasts which can play decisive roles in organizational planning, budgeting and performance monitoring.
A symbolic distributed event detection scheme for Wireless Sensor Networks
2016
Due to the possibility of extensive and pervasive deployment of many tiny sensor devices in the area of interest, Wireless Sensor Networks (WSNs) result particularly suitable to detect significant events and to react accordingly in industrial and home scenarios. In this context, fuzzy inference systems for event detection in WSNs have proved to be accurate enough in treating imprecise sensory readings to decrease the number of false alarms. Besides reacting to event occurrences, the whole network may infer more information to enrich the event semantics resulting from reasoning processes carried out on the individual nodes. Contextual knowledge, including spatial and temporal relationships, …
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…
A hybrid multi-objective optimization algorithm for content based image retrieval
2013
Abstract Relevance feedback methods in CBIR (Content Based Image Retrieval) iteratively use relevance information from the user to search the space for other relevant samples. As several regions of interest may be scattered through the space, an effective search algorithm should balance the exploration of the space to find new potential regions of interest and the exploitation of areas around samples which are known relevant. However, many algorithms concentrate the search on areas which are close to the images that the user has marked as relevant, according to a distance function in the (possibly deformed) multidimensional feature space. This maximizes the number of relevant images retriev…
A neural multi-agent based system for smart html pages retrieval
2003
A neural based multi-agent system for smart HTML page retrieval is presented. The system is based on the EalphaNet architecture, a neural network capable of learning the activation function of its hidden units and having good generalization capabilities. System goal is to retrieve documents satisfying a query and dealing with a specific topic. The system has been developed using the basic features supplied by the Jade platform for agent creation, coordination and control. The system is composed of four agents: the trainer agent, the neural classifier mobile agent, the interface agent, and the librarian agent. The sub-symbolic knowledge of the neural classifier mobile agent is automatically …
Ad-Hoc Segmentation Pipeline for Microarray Image Analysis
2006
Microarray is a new class of biotechnologies able to help biologist researches to extrapolate new knowledge from biological experiments. Image Analysis is devoted to extrapolate, process and visualize image information. For this reason it has found application also in Microarray, where it is a crucial step of this technology (e.g. segmentation). In this paper we describe MISP (Microarray Image Segmentation Pipeline), a new segmentation pipeline for Microarray Image Analysis. The pipeline uses a recent segmentation algorithm based on statistical analysis coupled with K-Means algorithm. The Spot masks produced by MISP are used to determinate spots information and quality measures. A software …
Mortality associated with the use of inappropiate drugs according Beers Criteria: a systematic review
2013
The aims of this systematic review are to identify and analyse the scientist literature available evidence about the use of potentially inappropriate medications, according to the Beers Criteria, that is associated with mortality in the elderly people.It have been made a search of publications in most traditional electronic databases among the scientific community (Pubmed / Medline, EMBASE and Web of Science) and it have been selected publications that obey the criteria of 'observational study', 'elderly' and 'Beers Criteria' and that they had as a result the mortality of the study population. After publications selection it proceeded to dump data by two researchers independently to avoid s…