• Title/Summary/Keyword: order preserving

Search Result 360, Processing Time 0.037 seconds

ON WEAKLY GRADED POSETS OF ORDER-PRESERVING MAPS UNDER THE NATURAL PARTIAL ORDER

  • Jitjankarn, Phichet
    • Communications of the Korean Mathematical Society
    • /
    • v.35 no.2
    • /
    • pp.347-358
    • /
    • 2020
  • In this paper, we simplify the natural partial ordering ≼ on the semigroup 𝒪([n]) under composition of all order-preserving maps on [n] = {1, …, n}, and describe its maximal elements. Also, we show that the poset (𝒪([n]), ≼) is weakly graded and determine when (𝒪([n]), ≼) has a structure of (i + 1)-avoidance.

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data

  • Lee, Hyunjo;Song, Youngho;Chang, Jae-Woo
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1087-1101
    • /
    • 2018
  • As cloud computing has become a widespread technology, malicious attackers can obtain the private information of users that has leaked from the service provider in the outsourced databases. To resolve the problem, it is necessary to encrypt the database prior to outsourcing it to the service provider. However, the most existing data encryption schemes cannot process a query without decrypting the encrypted databases. Moreover, because the amount of the data is large, it takes too much time to decrypt all the data. For this, Programmable Order-Preserving Secure Index Scheme (POPIS) was proposed to hide the original data while performing query processing without decryption. However, POPIS is weak to both order matching attacks and data count attacks. To overcome the limitations, we propose a group order-preserving data encryption scheme (GOPES) that can support efficient query processing over the encrypted data. Since GOPES can preserve the order of each data group by generating the signatures of the encrypted data, it can provide a high degree of data privacy protection. Finally, it is shown that GOPES is better than the existing POPIS, with respect to both order matching attacks and data count attacks.

Study on Application of the Preserving Valuation Index for Environmental Management of a Stack Room (서고환경관리를 위한 보존성 평가지수 활용에 관한 연구)

  • Yoon, Dai-Hyun;Shin, Hyun-Chang
    • The Korean Journal of Archival Studies
    • /
    • no.31
    • /
    • pp.139-161
    • /
    • 2012
  • Donald K. Sebera model can quantitatively compare the preserving environment by calculating the preserving valuation index with changing only the temperature and humidity. In this study, Donald K. Sebera model was used in order to compare and evaluate the preserving valuation index on the best condition and the worst condition in the temperature and humidity range of public records management act. As the results, the preserving valuation index in the best conditions was larger 2.47 times than the worst conditions within the preserving environment permitted in public records management act. Also, the influence of the humidity on the preserving valuation index of a paper archives as decreasing the activation energy for the hydrolysis reaction was larger rather than temperature. Thus the preserving valuation index can easily evaluate the suitability of the temperature and humidity conditions for preserving a archives. Therefore it can be used as useful tool for preservation of archives on change of the temperature and humidity.

ADDITIVE OPERATORS PRESERVING RANK-ADDITIVITY ON SYMMETRY MATRIX SPACES

  • Tang, Xiao-Min;Cao, Chong-Guang
    • Journal of applied mathematics & informatics
    • /
    • v.14 no.1_2
    • /
    • pp.115-122
    • /
    • 2004
  • We characterize the additive operators preserving rank-additivity on symmetry matrix spaces. Let $S_{n}(F)$ be the space of all $n\;\times\;n$ symmetry matrices over a field F with 2, $3\;\in\;F^{*}$, then T is an additive injective operator preserving rank-additivity on $S_{n}(F)$ if and only if there exists an invertible matrix $U\;\in\;M_n(F)$ and an injective field homomorphism $\phi$ of F to itself such that $T(X)\;=\;cUX{\phi}U^{T},\;\forallX\;=\;(x_{ij)\;\in\;S_n(F)$ where $c\;\in;F^{*},\;X^{\phi}\;=\;(\phi(x_{ij}))$. As applications, we determine the additive operators preserving minus-order on $S_{n}(F)$ over the field F.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Generalized singular perturbation approximation preserving positive real property of discrete system (이산시스템의 positive real 특성을 유지하는 일반화된 특이 섭동 근사화)

  • 오도창;김재권;방경호;박홍배
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.9
    • /
    • pp.50-59
    • /
    • 1997
  • This paper is on the generalized singular perturbation approximation (GSPA) preserving the discrete positive real property. We transform the discrete positive real(PR) system into a stochastically banlanced system and get the reduced order discrete system from the GSPA of the full order stochastically balanced system. eSPECIALLY, WHEN THE FREE PARAMETER OF THE gspa IS .+-.1, we show that the reduced order discrete system retains stability, minimality, and positive real and stochstically balancing properties. And we derived the .inf.-norm error bound with the reduced order discrete strictly positive real(SPR) system by the proposed method. Finally, we give an example to ascertain the properties of the proposed reduced order discrete system and to compare with the conventional methods.

  • PDF

Privacy-Preserving Clustering on Time-Series Data Using Fourier Magnitudes (시계열 데이타 클러스터링에서 푸리에 진폭 기반의 프라이버시 보호)

  • Kim, Hea-Suk;Moon, Yang-Sae
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.481-494
    • /
    • 2008
  • In this paper we propose Fourier magnitudes based privacy preserving clustering on time-series data. The previous privacy-preserving method, called DFT coefficient method, has a critical problem in privacy-preservation itself since the original time-series data may be reconstructed from privacy-preserved data. In contrast, the proposed DFT magnitude method has an excellent characteristic that reconstructing the original data is almost impossible since it uses only DFT magnitudes except DFT phases. In this paper, we first explain why the reconstruction is easy in the DFT coefficient method, and why it is difficult in the DFT magnitude method. We then propose a notion of distance-order preservation which can be used both in estimating clustering accuracy and in selecting DFT magnitudes. Degree of distance-order preservation means how many time-series preserve their relative distance orders before and after privacy-preserving. Using this degree of distance-order preservation we present greedy strategies for selecting magnitudes in the DFT magnitude method. That is, those greedy strategies select DFT magnitudes to maximize the degree of distance-order preservation, and eventually we can achieve the relatively high clustering accuracy in the DFT magnitude method. Finally, we empirically show that the degree of distance-order preservation is an excellent measure that well reflects the clustering accuracy. In addition, experimental results show that our greedy strategies of the DFT magnitude method are comparable with the DFT coefficient method in the clustering accuracy. These results indicate that, compared with the DFT coefficient method, our DFT magnitude method provides the excellent degree of privacy-preservation as well as the comparable clustering accuracy.

Enhancement of noisy image sequence using order statistic-adaptive weighted average hybrid filters (순서 통계형-적응 가중평균 혼성필터를 이용한 잡음화된 영상열의 향상)

  • 박순영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.1
    • /
    • pp.193-204
    • /
    • 1997
  • In this research we propose the design of the Order Statistic-Adaptive Weighted Average Hybrid(OS-AWAH) filter which can suppress noise from the corrupted image sequence effectively while preserving the image structure. The proposed filter combines the desirable properties of the order static based spatial filter which can preserve the image structure while reducing noise and the adaptive weighted average based temporal filter which can adapt the filtering weights according to the amount of motion without motion estimation. Performance characteristics of the OS-AWAH filter in noisy sequences containing moving step edges are investigated throuth computer simulations and compared with the median based filters such as 3-D WM(weighted median) filter, MMF (multistage median filter), ADCWM(adaptive directional center weighted median) filter. The visual evaluations are also carried out by applyin gthe filters to the real images. The statistical analysis and experimental reslts show that the OS-AWAH filter is effective in preserving image structures while suppressing noise effectively without motion compensation preprocessing.

  • PDF

Order preserving matching with k mismatches (k개의 오차를 허용하는 순위 패턴 매칭)

  • Lee, Inbok
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.33-38
    • /
    • 2020
  • Order preserving matching refers to the problem of reporting substrings of a given text where there exists order isomorphism with the pattern. In this paper, we propose a new algorithm based on filtering and evaluation. The proposed algorithm is simple and easy to implement, and runs in linear time on average. Experimental results show that it works efficiently with real world data.

Edge-Preserving Image Restoration Using Block-Based Edge Classification (블록기반의 윤곽선 분류를 이용한 윤곽선 보존 영상복원 기법)

  • 이상광;호요성
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06a
    • /
    • pp.33-36
    • /
    • 1998
  • Most image restoration problems are ill-posed and need to e regularized. A difficult task in image regularization is to avoid smoothing of image edges. In this paper, were proposed an edge-preserving image restoration algorithm using block-based edge classification. In order to exploit the local image characteristics, we classify image blocks into edge and no-edge blocks. We then apply an adaptive constrained least squares (CLS) algorithm to eliminate noise around the edges. Experimental results demonstrate that the proposed algorithm can preserve image edges during the regularization process.

  • PDF