• 제목/요약/키워드: attribute

검색결과 3,332건 처리시간 0.034초

나이브 베이시안 학습에서 정보이론 기반의 속성값 가중치 계산방법 (An Information-theoretic Approach for Value-Based Weighting in Naive Bayesian Learning)

  • 이창환
    • 한국정보과학회논문지:데이타베이스
    • /
    • 제37권6호
    • /
    • pp.285-291
    • /
    • 2010
  • 본 연구에서는 나이브 베이시안 학습의 환경에서 속성의 가중치를 계산하는 새로운 방식을 제안한다. 기존 방법들이 속성에 가중치를 부여하는 방식인데 반하여 본 연구에서는 한걸음 더 나아가 속성의 값에 가중치를 부여하는 새로운 방식을 연구하였다. 이러한 속성값의 가중치를 계산하기 위하여 Kullback-Leibler 함수를 이용하여 가중치를 계산하는 방식을 제안하였고 이러한 가중치들의 특성을 분석하였다. 제안된 알고리즘은 다수의 데이터를 이용하여 속성 가중치 방식과 비교하였고 대부분의 경우에 더 좋은 성능을 제공함을 알 수 있었다.

Limiting Attribute Disclosure in Randomization Based Microdata Release

  • Guo, Ling;Ying, Xiaowei;Wu, Xintao
    • Journal of Computing Science and Engineering
    • /
    • 제5권3호
    • /
    • pp.169-182
    • /
    • 2011
  • Privacy preserving microdata publication has received wide attention. In this paper, we investigate the randomization approach and focus on attribute disclosure under linking attacks. We give efficient solutions to determine optimal distortion parameters, such that we can maximize utility preservation while still satisfying privacy requirements. We compare our randomization approach with l-diversity and anatomy in terms of utility preservation (under the same privacy requirements) from three aspects (reconstructed distributions, accuracy of answering queries, and preservation of correlations). Our empirical results show that randomization incurs significantly smaller utility loss.

ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION

  • Muller, Sascha;Katzenbeisser, Stefan;Eckert, Claudia
    • 대한수학회보
    • /
    • 제46권4호
    • /
    • pp.803-819
    • /
    • 2009
  • In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independent parties can be present to maintain attributes and their corresponding secret keys. We present a scheme for multi-authority CP-ABE, propose the first two constructions that fully implement the scheme, and prove their security against chosen plaintext attacks.

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

An Additive Quantitative Randomized Response Model by Cluster Sampling

  • Lee, Gi-Sung
    • 응용통계연구
    • /
    • 제25권3호
    • /
    • pp.447-456
    • /
    • 2012
  • For a sensitive survey in which the population is comprised of several clusters with a quantitative attribute, we present an additive quantitative randomized response model by cluster sampling that adapts a two-stage cluster sampling instead of a simple random sample based on Himmelfarb-Edgell's additive quantitative attribute model and Gjestvang-Singh's one. We also derive optimum values for the number of 1st stage clusters and the optimum values of observation units in a 2nd stage cluster under the condition of minimizing the variance given constant cost. We can see that Himmelfarb-Edgell's model is more efficient than Gjestvang-Singh's model under the condition of cluster sampling.

파괴검사(破壞檢査)에 있어서의 최소비용(最少費用) 샘플링 검사방식(檢査方式)의 결정(決定)에 관한 연구(硏究) - 계수파괴(計數破壞) 1회검사(回檢査)를 중심(中心)으로 - (A Study on the Determination of a Minimum Cost Sampling Inspection Plan for Destructive Testing)

  • 황의철;정영배
    • 품질경영학회지
    • /
    • 제8권2호
    • /
    • pp.15-22
    • /
    • 1980
  • This paper deals with the problem of determining a minimum cost sampling inspection plan for a single destructive testing by attribute. The cost for inspection lot is constructed by following three cost factors: (1) cost of inspection, (2) cost of accepted defective, (3) cost of rejected lot Using Hald's Bayesian approach in a single non-destructive testing, procedure's for finding the minimum cost single destructive sampling inspection plan by attribute are given. Assuming the uniform distribution as a prior-distribution and using numerical analysis by computer, a minimum cost single destructive sampling inspection plan by attribute for several lot sizes, unit cost, destructive testing cost, and salvage cost is given.

  • PDF

Periocular Recognition Using uMLBP and Attribute Features

  • Ali, Zahid;Park, Unsang;Nang, Jongho;Park, Jeong-Seon;Hong, Taehwa;Park, Sungjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6133-6151
    • /
    • 2017
  • The field of periocular biometrics has gained wide attention as an alternative or supplemental means to conventional biometric traits such as the iris or the face. Periocular biometrics provide intermediate resolution between the iris and the face, which enables it to support both. We have developed a periocular recognition system by using uniform Multiscale Local Binary Pattern (uMLBP) and attribute features. The proposed system has been evaluated in terms of major factors that need to be considered on a mobile platform (e.g., distance and facial pose) to assess the feasibility of the use of periocular biometrics on mobile devices. Experimental results showed 98.7% of rank-1 identification accuracy on a subset of the Face Recognition Grand Challenge (FRGC) database, which is the best performance among similar studies.

관광객 선호도에 미치는 음식 서비스의 영향 평가 (Measuring the Effect of Foodservice on Tourist Preference)

  • 이재곤
    • 한국조리학회지
    • /
    • 제13권3호
    • /
    • pp.33-43
    • /
    • 2007
  • The purpose of this study was to measure the importance of attributes: area, food quality, food type, price, service quality, which influence tourist preference of foodservice. It also identifies foodservice attributes' level combinations which confer the highest utility to tourists. Conjoint model was used for this study. The findings from this study were as follows. First, it was found that all tourists regarded food type and price as very important factors. Second, it was found that the foodservices with different attribute levels were preferred across cluster. Third, it was found that the most preferred foodservice was significantly different by cluster. Finally, the implications of the study and proposal of future study were outlined.

  • PDF

Optimized Entity Attribute Value Model: A Search Efficient Re-presentation of High Dimensional and Sparse Data

  • Paul, Razan;Latiful Hoque, Abu Sayed Md.
    • Interdisciplinary Bio Central
    • /
    • 제3권3호
    • /
    • pp.9.1-9.5
    • /
    • 2011
  • Entity Attribute Value (EAV) is the widely used solution to represent high dimensional and sparse data, but EAV is not search efficient for knowledge extraction. In this paper, we have proposed a search efficient data model: Optimized Entity Attribute Value (OEAV) for physical representation of high dimensional and sparse data as an alternative of widely used EAV. We have implemented both EAV and OEAV models in a data warehousing en-vironment and performed different relational and warehouse queries on both the models. The experimental results show that OEAV is dramatically search efficient and occupy less storage space compared to EAV.

임베디드 소프트웨어의 기민한 속성 주도 설계(Agile Attribute -Driven Design) 적용을 위한 통합 분석 기법 (Integrated Analysis Method for applying for The Agile Attribute-Driven Design of Embedded Software)

  • 안민찬
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 추계학술발표대회 및 정기총회
    • /
    • pp.377-380
    • /
    • 2005
  • 최근 다양한 분야에서 임베디드 소프트웨어의 비중이 증대함에 따라 품질 요구 사항이 증대 하였지만, 현실적인 개발 일정은 점점 줄어들고 있다. 이에 본 논문에서는 임베디드 소프트웨어의 기민한 속성 주도 설계(Agile Attribute-Driven Design)를 체계적으로 적용하기 위한 '통합 분석 기법'을 정의한다. 그리고 이를 통한 기민한 설계 접근법을 제안한다. '통합 분석 기법'은 임베디드 소프트웨어의 특성을 고려한 기능 분석과 동시에 '품질 속성 시나리오'를 분석할 수 있는 기법으로서 고품질의 아키텍처 구축을 목적으로 한다. 또한 본 논문에서는 개미 로봇 구현 사례를 통해 '통합 분석 기법'을 검증하고 효과를 확인한다.

  • PDF