• Title/Summary/Keyword: Novel data

Search Result 3,323, Processing Time 0.029 seconds

Novelty Detection using SOM-based Methods (자기구성지도 기반 방법을 이용한 이상 탐지)

  • Lee, Hyeong-Ju;Jo, Seong-Jun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.599-606
    • /
    • 2005
  • Novelty detection involves identifying novel patterns. They are not usually available during training. Even if they are, the data quantity imbalance leads to a low classification accuracy when a supervised learning scheme is employed. Thus, an unsupervised learning scheme is often employed ignoring those few novel patterns. In this paper, we propose two ways to make use of the few available novel patterns. First, a scheme to determine local thresholds for the Self Organizing Map boundary is proposed. Second, a modification of the Learning Vector Quantization learning rule is proposed so that allows one to keep codebook vectors as far from novel patterns as possible. Experimental results are quite promising.

  • PDF

A Survey on the Mobile Crowdsensing System life cycle: Task Allocation, Data Collection, and Data Aggregation

  • Xia Zhuoyue;Azween Abdullah;S.H. Kok
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.31-48
    • /
    • 2023
  • The popularization of smart devices and subsequent optimization of their sensing capacity has resulted in a novel mobile crowdsensing (MCS) pattern, which employs smart devices as sensing nodes by recruiting users to develop a sensing network for multiple-task performance. This technique has garnered much scholarly interest in terms of sensing range, cost, and integration. The MCS is prevalent in various fields, including environmental monitoring, noise monitoring, and road monitoring. A complete MCS life cycle entails task allocation, data collection, and data aggregation. Regardless, specific drawbacks remain unresolved in this study despite extensive research on this life cycle. This article mainly summarizes single-task, multi-task allocation, and space-time multi-task allocation at the task allocation stage. Meanwhile, the quality, safety, and efficiency of data collection are discussed at the data collection stage. Edge computing, which provides a novel development idea to derive data from the MCS system, is also highlighted. Furthermore, data aggregation security and quality are summarized at the data aggregation stage. The novel development of multi-modal data aggregation is also outlined following the diversity of data obtained from MCS. Overall, this article summarizes the three aspects of the MCS life cycle, analyzes the issues underlying this study, and offers developmental directions for future scholars' reference.

Immunoadjuvanticity of Novel CpG ODN (Oligodeoxynucleotide)

  • Park, Su-Jung;Cho, Hyeon-Cheol;Bae, Keum-Seok;Kim, Soo-Ki
    • Molecular & Cellular Toxicology
    • /
    • v.3 no.1
    • /
    • pp.46-52
    • /
    • 2007
  • In the course of novel TLR (Toll like receptor) 9 ligand, we found novel CpG ODN (Oligodeoxynucleotide) was active in augmenting antibody in mice. However, immune mechanism of new CpG ODNs is unclear. To clarify this, we examined immunoadjuvanticity by employing in vitro and in vivo immune profiles. In brief, in vitro treatment of novel CpG ODN upregulated the expression of TNF-$\alpha$, IL-6, and IL-12 mRNA in macrophages as well as that of IFN-$gamma$ mPNA in mouse splenocytes. In parallel, in vivo injection of novel CpG ODN directly activates macrophages and splenocytess, consequently upregulating MHC class II and CD86. Finally, we demonstrated anti-HBs antibody augmentation of novel CpG ODN. Collectively, this data indicates that novel CpG ODN is immunoadjuvant armed with Th1 typed immune machinery.

New Medical Image Fusion Approach with Coding Based on SCD in Wireless Sensor Network

  • Zhang, De-gan;Wang, Xiang;Song, Xiao-dong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.6
    • /
    • pp.2384-2392
    • /
    • 2015
  • The technical development and practical applications of big-data for health is one hot topic under the banner of big-data. Big-data medical image fusion is one of key problems. A new fusion approach with coding based on Spherical Coordinate Domain (SCD) in Wireless Sensor Network (WSN) for big-data medical image is proposed in this paper. In this approach, the three high-frequency coefficients in wavelet domain of medical image are pre-processed. This pre-processing strategy can reduce the redundant ratio of big-data medical image. Firstly, the high-frequency coefficients are transformed to the spherical coordinate domain to reduce the correlation in the same scale. Then, a multi-scale model product (MSMP) is used to control the shrinkage function so as to make the small wavelet coefficients and some noise removed. The high-frequency parts in spherical coordinate domain are coded by improved SPIHT algorithm. Finally, based on the multi-scale edge of medical image, it can be fused and reconstructed. Experimental results indicate the novel approach is effective and very useful for transmission of big-data medical image(especially, in the wireless environment).

Efficient Top-K Queries Computation for Encrypted Data in the Cloud (클라우드 환경에서의 암호화 데이터에 대한 효율적인 Top-K 질의 수행 기법)

  • Kim, Jong Wook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.8
    • /
    • pp.915-924
    • /
    • 2015
  • With growing popularity of cloud computing services, users can more easily manage massive amount of data by outsourcing them to the cloud, or more efficiently analyse large amount of data by leveraging IT infrastructure provided by the cloud. This, however, brings the security concerns of sensitive data. To provide data security, it is essential to encrypt sensitive data before uploading it to cloud computing services. Although data encryption helps provide data security, it negatively affects the performance of massive data analytics because it forbids the use of index and mathematical operation on encrypted data. Thus, in this paper, we propose a novel algorithm which enables to efficiently process a large amount of encrypted data. In particular, we propose a novel top-k processing algorithm on the massive amount of encrypted data in the cloud computing environments, and verify the performance of the proposed approach with real data experiments.

Design of a Novel Multi-Dimensional HCOC Multi-code Spread Spectrum System Using Pre-coding Technique for High Speed Data Transmission of DS-CDMA

  • Kong, Hyung-Yun;Lee, Dong-Un
    • Journal of electromagnetic engineering and science
    • /
    • v.7 no.1
    • /
    • pp.1-6
    • /
    • 2007
  • Recently, Mc(Multi-code) modulation/demodulation(modem) technique has been explored for high speed data transmission in wireless environment. The conventional Mc modem generates some side effects such as allocating Walsh codes, which motivates to propose a novel Mc modem method with sub-code. Our proposed system should expanded the size of sub-code to provide high-rate data transmission, which also affect adversely to the performance of the system with high PAPR(Peak to Average Power Ratio). Thus, in this paper, we propose a novel pre-coded Multi-Dimensional HCOC(High Capacity Orthogonal Code) Mc modem technique to reduce the high PAPR, which enables the performance improvement. This proposed system can be easily designed by concatenating HCOC Mc modem with the generic Mc modem. The pre-coding technique that is used in this paper is CAC(Constant Amplitude Coding), that helps the system maintain the constant transmission power and reduce the maximum transmission power.

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

A Novel Data Transmit Method Using Display Units of Mobile Devices (모바일 단말기의 디스플레이 장치를 이용한 새로운 데이터 전송방법)

  • Shin, Ho-Chul;Cho, Kyu-Min;Oh, Won-Seok;Kim, Hee-Jun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.193-195
    • /
    • 2004
  • This paper presents a novel data transmit method using display units of mobile devices. Mobile devices such as personal-digital-assistants (PDAs) and cellular phones have a display unit. The typical display unit is a liquid-crystal-display (LCD) with an back-light. Since the proposed data transmit method uses the LCD or back-light as a data transmitter, it is a kind of sightable light communication. Tn order to transmit the data, the display unit drived by an application program on the platform of mobile devices. In this paper, detailed data transmit scheme, specific data protocol are presented and discussed. Finally, with the experimental results, usefulness of the proposed data transmit method is verified.

  • PDF

A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation

  • Xing, Xiaomei;Zhu, Yuesheng;Mo, Zhiwei;Sun, Ziqiang;Liu, Zhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5058-5072
    • /
    • 2015
  • Quaternions have been commonly employed in color image processing, but when the existing pure quaternion representation for color images is used in perceptual hashing, it would degrade the robustness performance since it is sensitive to image manipulations. To improve the robustness in color image perceptual hashing, in this paper a full quaternion representation for color images is proposed by introducing the local image luminance variances. Based on this new representation, a novel Full Quaternion Discrete Cosine Transform (FQDCT)-based hashing is proposed, in which the Quaternion Discrete Cosine Transform (QDCT) is applied to the pseudo-randomly selected regions of the novel full quaternion image to construct two feature matrices. A new hash value in binary is generated from these two matrices. Our experimental results have validated the robustness improvement brought by the proposed full quaternion representation and demonstrated that better performance can be achieved in the proposed FQDCT-based hashing than that in other notable quaternion-based hashing schemes in terms of robustness and discriminability.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.