scholarly journals A New Mining and Protection Method Based on Sensitive Data

2018 ◽  
Vol 2018 ◽  
pp. 1-7
Author(s):  
Xiaoyao Zheng ◽  
Yuqing Liu ◽  
Hao You ◽  
Liangmin Guo ◽  
Chuanxin Zhao

The traditional method of sensitive data identification for data stream has a large amount of calculation and does not reflect the impact of time on the data value, and the mining accuracy is not high. In view of the above problems we firstly adopt the sliding window mechanism to divide the data flow according to time and delay the dataset according to the characteristics of the data flow in the sliding window to achieve the purpose of saving time and space. At the same time, threshold sensitivity analysis is used to find out the optimal threshold. Finally, a K-anonymous algorithm based on dynamic rounding function is employed to achieve the protection of sensitive data. Theoretical analysis and experimental results show that the algorithm can effectively mine the sensitive data in the data stream and can effectively protect the sensitive data.

2013 ◽  
Vol 427-429 ◽  
pp. 2094-2098
Author(s):  
Yang Li

According to the application of the computer network multimedia is more and more widely, and is also correspondingly strong shock by the network media and informatization for network communication and other requirements, progress and development of society constantly threatened by the impact of network multimedia communication. The paper theory-based with network multimedia communication to analysis the characteristics and performance requirements of network multimedia communication, combining to relevant material of the data flow, research and analyze the data flow of the mining technology, to carries on system analysis of the data flow, construct system model based on the network multimedia communication data stream, in order to better guide the dynamic analysis to network multimedia communication data flow, to master the multimedia communication data fusion and decision, so as to understand the users needs to network multimedia communication, to better guide the sustainable development of the network multimedia communication.


2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Chao Liu ◽  
Jing Yang ◽  
Weinan Zhao ◽  
Yining Zhang ◽  
Jingyou Li ◽  
...  

As an information carrier, face images contain abundant sensitive information. Due to its natural weak privacy, direct publishing may divulge privacy. Anonymization Technology and Data Encryption Technology are limited by the background knowledge and attack means of attackers, which cannot completely content the needs of face image privacy protection. Therefore, this paper proposes a face image publishing SWP (sliding window publication) algorithm, which satisfies the differential privacy. Firstly, the SWP translates the image gray matrix into a one-dimensional ordered data stream by using image segmentation technology. The purpose of this step is to transform the image privacy protection problem into the data stream privacy protection problem. Then, the sliding window model is used to model the data flow. By comparing the similarity of data in adjacent sliding windows, the privacy budget is dynamically allocated, and Laplace noise is added. In SWP, the data in the sliding window comes from the image. To present the image features contained in the data more comprehensively and use the privacy budget more reasonably, this paper proposes a fusion similarity measurement EM (exact mechanism) mechanism and a dynamic privacy budget allocation DA (dynamic allocation) mechanism. Also, for further improving the usability of human face images and reducing the impact of noise, a sort-SWP algorithm based on the SWP method is proposed in the paper. Through the analysis, it can be seen that ordered input can further improve the usability of the SWP algorithm, but direct sorting of data will destroy the ε -differential privacy. Therefore, this paper proposes a sorting method-SAS method, which satisfies the ε -differential privacy; SAS obtain an initial sort by using an exponential mechanism firstly. And then an approximate correct sort is obtained by using the Annealing algorithm to optimize the initial sort. Compared with LAP algorithm and SWP algorithm, the average accuracy rate of sort-SWP algorithm in ORL, Yale is increased by 56.63% and 21.55%, the recall rate is increased by 6.85% and 3.32%, and F1-sroce is improved by 55.62% and 16.55%.


2013 ◽  
Vol 1 (2) ◽  
pp. 209-234 ◽  
Author(s):  
Pengyuan Wang ◽  
Mikhail Traskin ◽  
Dylan S. Small

AbstractThe before-and-after study with multiple unaffected control groups is widely applied to study treatment effects. The current methods usually assume that the control groups’ differences between the before and after periods, i.e. the group time effects, follow a normal distribution. However, there is usually no strong a priori evidence for the normality assumption, and there are not enough control groups to check the assumption. We propose to use a flexible skew-t distribution family to model group time effects, and consider a range of plausible skew-t distributions. Based on the skew-t distribution assumption, we propose a robust-t method to guarantee nominal significance level under a wide range of skew-t distributions, and hence make the inference robust to misspecification of the distribution of group time effects. We also propose a two-stage approach, which has lower power compared to the robust-t method, but provides an opportunity to conduct sensitivity analysis. Hence, the overall method of analysis is to use the robust-t method to test for the overall hypothesized range of shapes of group variation; if the test fails to reject, use the two-stage method to conduct a sensitivity analysis to see if there is a subset of group variation parameters for which we can be confident that there is a treatment effect. We apply the proposed methods to two datasets. One dataset is from the Current Population Survey (CPS) to study the impact of the Mariel Boatlift on Miami unemployment rates between 1979 and 1982.The other dataset contains the student enrollment and grade repeating data in West Germany in the 1960s with which we study the impact of the short school year in 1966–1967 on grade repeating rates.


Proceedings ◽  
2020 ◽  
Vol 58 (1) ◽  
pp. 31
Author(s):  
Jeremy Arancio ◽  
Ahmed Ould El Moctar ◽  
Minh Nguyen Tuan ◽  
Faradj Tayat ◽  
Jean-Philippe Roques

In the race for energy production, supplier companies are concerned by the thermal rating of offshore cables installed in a J-tube, not covered by IEC 60287 standards, and are now looking for solutions to optimize this type of system. This paper presents a numerical model capable of calculating temperature fields of a power transmission cable installed in a J-tube, based on the lumped element method. This model is validated against the existing literature. A sensitivity analysis performed using Sobol indices is then presented in order to understand the impact of the different parameters involved in the heating of the cable. This analysis provides an understanding of the thermal phenomena in the J-tube and paves the way for potential technical and economic solutions to increase the ampacity of offshore cables installed in a J-tube.


2019 ◽  
Vol 70 (1) ◽  
pp. 26-29 ◽  
Author(s):  
Tinevimbo Shiri ◽  
Angela Loyse ◽  
Lawrence Mwenge ◽  
Tao Chen ◽  
Shabir Lakhi ◽  
...  

Abstract Background Mortality from cryptococcal meningitis remains very high in Africa. In the Advancing Cryptococcal Meningitis Treatment for Africa (ACTA) trial, 2 weeks of fluconazole (FLU) plus flucytosine (5FC) was as effective and less costly than 2 weeks of amphotericin-based regimens. However, many African settings treat with FLU monotherapy, and the cost-effectiveness of adding 5FC to FLU is uncertain. Methods The effectiveness and costs of FLU+5FC were taken from ACTA, which included a costing analysis at the Zambian site. The effectiveness of FLU was derived from cohorts of consecutively enrolled patients, managed in respects other than drug therapy, as were participants in ACTA. FLU costs were derived from costs of FLU+5FC in ACTA, by subtracting 5FC drug and monitoring costs. The cost-effectiveness of FLU+5FC vs FLU alone was measured as the incremental cost-effectiveness ratio (ICER). A probabilistic sensitivity analysis assessed uncertainties and a bivariate deterministic sensitivity analysis examined the impact of varying mortality and 5FC drug costs on the ICER. Results The mean costs per patient were US $847 (95% confidence interval [CI] $776–927) for FLU+5FC, and US $628 (95% CI $557–709) for FLU. The 10-week mortality rate was 35.1% (95% CI 28.9–41.7%) with FLU+5FC and 53.8% (95% CI 43.1–64.1%) with FLU. At the current 5FC price of US $1.30 per 500 mg tablet, the ICER of 5FC+FLU versus FLU alone was US $65 (95% CI $28–208) per life-year saved. Reducing the 5FC cost to between US $0.80 and US $0.40 per 500 mg resulted in an ICER between US $44 and US $28 per life-year saved. Conclusions The addition of 5FC to FLU is cost-effective for cryptococcal meningitis treatment in Africa and, if made available widely, could substantially reduce mortality rates among human immunodeficiency virus–infected persons in Africa.


2014 ◽  
Vol 986-987 ◽  
pp. 377-382 ◽  
Author(s):  
Hui Min Gao ◽  
Jian Min Zhang ◽  
Chen Xi Wu

Heuristic methods by first order sensitivity analysis are often used to determine location of capacitors of distribution power system. The selected nodes by first order sensitivity analysis often have virtual high by first order sensitivities, which could not obtain the optimal results. This paper presents an effective method to optimally determine the location and capacities of capacitors of distribution systems, based on an innovative approach by the second order sensitivity analysis and hierarchical clustering. The approach determines the location by the second order sensitivity analysis. Comparing with the traditional method, the new method considers the nonlinear factor of power flow equation and the impact of the latter selected compensation nodes on the previously selected compensation location. This method is tested on a 28-bus distribution system. Digital simulation results show that the reactive power optimization plan with the proposed method is more economic while maintaining the same level of effectiveness.


Author(s):  
Annalaura Carducci ◽  
Gabriele Donzelli ◽  
Lorenzo Cioni ◽  
Ileana Federigi ◽  
Roberto Lombardi ◽  
...  

Biological risk assessment in occupational settings currently is based on either qualitative or semiquantitative analysis. In this study, a quantitative microbial risk assessment (QMRA) has been applied to estimate the human adenovirus (HAdV) health risk due to bioaerosol exposure in a wastewater treatment plant (WWTP). A stochastic QMRA model was developed considering HAdV as the index pathogen, using its concentrations in different areas and published dose–response relationship for inhalation. A sensitivity analysis was employed to examine the impact of input parameters on health risk. The QMRA estimated a higher average risk in sewage influent and biological oxidation tanks (15.64% and 12.73% for an exposure of 3 min). Sensitivity analysis indicated HAdV concentration as a predominant factor in the estimated risk. QMRA results were used to calculate the exposure limits considering four different risk levels (one illness case per 100, 1.000, 10.000, and 100.000 workers): for 3 min exposures, we obtained 565, 170, 54, and 6 GC/m3 of HAdV. We also calculated the maximum time of exposure for each level for different areas. Our findings can be useful to better define the effectiveness of control measures, which would thus reduce the virus concentration or the exposure time.


Sign in / Sign up

Export Citation Format

Share Document