• Title/Summary/Keyword: Traditional techniques

Search Result 1,692, Processing Time 0.029 seconds

Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms

  • Gunes, Ihsan;Bilge, Alper;Polat, Huseyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1272-1290
    • /
    • 2013
  • Privacy-preserving collaborative filtering schemes are becoming increasingly popular because they handle the information overload problem without jeopardizing privacy. However, they may be susceptible to shilling or profile injection attacks, similar to traditional recommender systems without privacy measures. Although researchers have proposed various privacy-preserving recommendation frameworks, it has not been shown that such schemes are resistant to profile injection attacks. In this study, we investigate two memory-based privacy-preserving collaborative filtering algorithms and analyze their robustness against several shilling attack strategies. We first design and apply formerly proposed shilling attack techniques to privately collected databases. We analyze their effectiveness in manipulating predicted recommendations by experimenting on real data-based benchmark data sets. We show that it is still possible to manipulate the predictions significantly on databases consisting of masked preferences even though a few of the attack strategies are not effective in a privacy-preserving environment.

Optimized Multiple Description Lattice Vector Quantization Coding for 3D Depth Image

  • Zhang, Huiwen;Bai, Huihui;Liu, Meiqin;Zhao, Yao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1140-1154
    • /
    • 2015
  • Multiple Description (MD) coding is a promising alternative for the robust transmission of information over error-prone channels. Lattice vector quantization (LVQ) is a significant version of MD techniques to design an MD image coder. However, different from the traditional 2D texture image, the 3D depth image has its own special characteristics, which should be taken into account for efficient compression. In this paper, an optimized MDLVQ scheme is proposed in view of the characteristics of 3D depth image. First, due to the sparsity of depth image, the image blocks can be classified into edge blocks and smooth blocks, which are encoded by different modes. Furthermore, according to the boundary contents in edge blocks, the step size of LVQ can be regulated adaptively for each block. Experimental results validate the effectiveness of the proposed scheme, which show better rate distortion performance compared with the conventional MDLVQ.

Microdissected Prefabricated Flap: An Evolution in Flap Prefabrication

  • Tas, Suleyman
    • Archives of Plastic Surgery
    • /
    • v.43 no.6
    • /
    • pp.599-603
    • /
    • 2016
  • When traditional flap techniques are not feasible, we apply flap prefabrication, which is more complicated and sophisticated but supplies large and thin flaps. There are some disadvantages to the technique that require improvement, such as venous congestion after flap transfer, which requires months for neoangiogenesis and necessitates a vascular carrier. Here, the author presents a new technique, called as 'microdissected prefabricated flap,' to successfully produce a safe, large, and thin flap. This technique is based on the microdissection of the perforators to the greatest extent possible, spreading them out into the subdermal level and using them as a carrier. The details and the application of this technique are presented and reported.

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

Process Control Techniques for Quality Assurance in the Product Liability Age (PL시대에 있어서 품질보증을 위한 공정관리기법)

  • 정영배;김연수
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.42
    • /
    • pp.73-85
    • /
    • 1997
  • In the product liability age the demand on quality is extremely high and inspection and test are automated. The process capability indices $C_p, {\;}C_{pk}$ and p control chart widely used to provide unitless measure of process performance and process control. Traditional process capability indices $C_p, {\;}C_{pk}$ do not represent the process variation from target value. The convention p chart for control of fraction nonconforming becomes inadequate when the fraction nonconforming becomes very small such as PPM level production system. This paper proposes process performance measure considering quadratic loss function and cumulative counts control chart for control of PPM level production system.

  • PDF

Real Time Modeling of Discrete Event Systems and Its Application (이산사건 시스템의 실시간 모델링 및 응용)

  • Jeong, Yong-Man;Hwang, Hyung-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.6
    • /
    • pp.91-98
    • /
    • 1998
  • A DEDS is a system whose stated change in response to the occurrence of events from a predefined event set. A major difficulty in developing analytical results for the system is the lack of appropriate modeling techniques. In this paper, we consider the modeling and control problem for Discrete Event Dynamic Systems(DEDS) in the Temporal Logic framework(TLF) which have been recently defined. The traditional TLF is enhanced with time functions for real time control of Discrete Event Dynamic Systems. A sequence of event which drive the system from a given initial state to a given final state is generated by pertinently operating the given plants. This paper proposes the use of Real-time Temporal Logic as a modeling tool for the analysis and control of DEDS. An given example of fixed-time traffic control problem is shown to illustrate our results with Real-time Temporal Logic Framework.

  • PDF

Path Following Control of Mobile Robot Using Lyapunov Techniques and PID Cntroller

  • Jin, Tae-Seok;Tack, Han-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.1
    • /
    • pp.49-53
    • /
    • 2011
  • Path following of the mobile robot is one research hot for the mobile robot navigation. For the control system of the wheeled mobile robot(WMR) being in nonhonolomic system and the complex relations among the control parameters, it is difficult to solve the problem based on traditional mathematics model. In this paper, we presents a simple and effective way of implementing an adaptive following controller based on the PID for mobile robot path following. The method uses a non-linear model of mobile robot kinematics and thus allows an accurate prediction of the future trajectories. The proposed controller has a parallel structure that consists of PID controller with a fixed gain. The control law is constructed on the basis of Lyapunov stability theory. Computer simulation for a differentially driven nonholonomic mobile robot is carried out in the velocity and orientation tracking control of the nonholonomic WMR. The simulation results of wheel type mobile robot platform are given to show the effectiveness of the proposed algorithm.

Hybrid Test Data Transportation Scheme for Advanced NoC-Based SoCs

  • Ansari, M. Adil;Kim, Dooyoung;Jung, Jihun;Park, Sungju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.1
    • /
    • pp.85-95
    • /
    • 2015
  • Network-on-chip (NoC) has evolved to overcome the issues of traditional bus-based on-chip interconnect. In NoC-reuse as TAM, the test schedulers are constrained with the topological position of cores and test access points, which may negatively affect the test time. This paper presents a scalable hybrid test data transportation scheme that allows to simultaneously test multiple heterogeneous cores of NoC-based SoCs, while reusing NoC as TAM. In the proposed test scheme, single test stimuli set of multiple CUTs is embedded into each flit of the test stimuli packets and those packets are multicast to the targeted CUTs. However, the test response packets of each CUT are unicast towards the tester. To reduce network load, a flit is filled with maximum possible test response sets before unicasting towards the tester. With the aid of Verilog and analytical simulations, the proposed scheme is proved effective and the results are compared with some recent techniques.

System Reliability Analysis for Nonnormal Distributions and Optimization Using Experimental Design Technique (실험계획법을 이용한 비정규 분포에 대한 신뢰도 계산 방법과 최적 설계에의 적용)

  • Seo, Hyun-Seok;Chang, Jin-Ho;Kwak, Byung-Man
    • Proceedings of the KSME Conference
    • /
    • 2001.06c
    • /
    • pp.327-332
    • /
    • 2001
  • An experimental design technique is developed for estimating the moments of system response functions. It is easy to implement and provides accurate results compared with other traditional methods. It is based on the work of Taguchi, later improved by D'Errico and Zaino. The existing experimental techniques, however, is applicable only for normally distributed cases. In this article the three-level Taguchi method is extended to obtain optimum choice for levels and weights to handle nonnormal distributions. A systematic procedure for reliability analysis is then proposed by using the Pearson system and the narrow system reliability bounds. Illustrative examples including a tolerance optimization problem are shown very accurate comparing with those by Monte-Carlo simulations and the first-order reliability method.

  • PDF

Relevance Feedback for Content Based Retrieval Using Fuzzy Integral (퍼지적분을 이용한 내용기반 검색 사용자 의견 반영시스템)

  • Young Sik Choi
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.89-96
    • /
    • 2000
  • Relevance feedback is a technique to learn the user's subjective perception of similarity between images, and has recently gained attention in Content Based Image Retrieval. Most relevance feedback methods assume that the individual features that are used in similarity judgments do not interact with each other. However, this assumption severely limits the types of similarity judgments that can be modeled In this paper, we explore a more sophisticated model for similarity judgments based on fuzzy measures and the Choquet Integral, and propose a suitable algorithm for relevance feedback, Experimental results show that the proposed method is preferable to traditional weighted- average techniques.

  • PDF