• Title/Summary/Keyword: tradeoff analysis

Search Result 107, Processing Time 0.028 seconds

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

Event Trigger Generator for Gravitational-Wave Data based on Hilbert-Huang Transform

  • Son, Edwin J.;Chu, Hyoungseok;Kim, Young-Min;Kim, Hwansun;Oh, John J.;Oh, Sang Hoon;Blackburn, Lindy;Hayama, Kazuhiro;Robinet, Florent
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.2
    • /
    • pp.55.4-56
    • /
    • 2015
  • The Hilbert-Huang Transform (HHT) is composed of the Empirical Mode Decomposition (EMD) and the Hilbert Spectral Analysis (HSA). The EMD decomposes any time series data into a small number of components called the Intrinsic Mode Functions (IMFs), compared to the Discrete Fourier Transform which decomposes a data into a large number of harmonic functions. Each IMF has varying amplitude and frequency with respect to time, which can be obtained by HSA. The time resolution of the modes in HHT is the same as that of the given time series, while in the Wavelet Transform, Constant Q Transform and Short-Time Fourier Transform, there is a tradeoff between the resolutions in frequency and time. Based on the time-dependent amplitudes of IMFs, we develop an Event Trigger Generator and demonstrate its efficiency by applying it to gravitational-wave data.

  • PDF

Optimum Design of Water Distribution Network with a Reliability Measure of Expected Shortage (부족량기대치를 이용한 배수관망의 신뢰최적설계)

  • Park, Hee-Kyung;Hyun, In-Hwan;Park, Chung-Hyun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.11 no.1
    • /
    • pp.21-32
    • /
    • 1997
  • Optimum design of water distribution network(WDN) in many times means just reducing redundancy. Given only a few situations are taken into consideration for such design, WDN deprived of inherited redundancy may not work properly in some unconsidered cases. Quantifying redundancy and incorporating it into the optimal design process will be a way of overcoming just reduction of redundancy. Expected shortage is developed as a reliability surrogate in WDN. It is an indicator of the frequency, duration and severity of failure. Using this surrogate, Expected Shortage Optimization Model (ESOM) is developed. ESOM is tested with an example network and results are analyzed and compared with those from other reliability models. The analysis results indicate that expected shortage is a quantitative surrogate measure, especially, good in comparing different designs and obtaining tradeoff between cost and. reliability. In addition, compared other models, ESOM is also proved useful in optimizing WDN with reliability and powerful in controlling reliability directly in the optimization process, even if computational burden is high. Future studies are suggested which focus on how to increase applicability and flexibility of ESOM.

  • PDF

New variable adaptive coefficient algorithm for variable circumstances (가변환경에 적합한 새로운 가변 적응 계수에 관한 연구)

  • 오신범;이채욱
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.3
    • /
    • pp.79-88
    • /
    • 1999
  • One of the most popular algorithm in adaptive signal processing is the least mean square(LMS) algorithm. The majority of these papers examine the LMS algorithm with a constant step size. The choice of the step size reflects a tradeoff between misadjustment and the speed of adaptation. Subsequent works have discussed the issue of optimization of the step size or methods of varying the step size to improve performance. However there is as yet no detailed analysis of a variable step size algorithm that is capable of giving both the speed of adaptation and convergence. In this paper we propose a new variable step size algorithm where the step size adjustment is controlled by square of the prediction error. The simulation results obtained using the new algorithm about noise canceller system and system identification are described. They are compared to the results obtained for other variable step size algorithm. function.

  • PDF

Optimum maintenance scenario generation for existing steel-girder bridges based on lifetime performance and cost

  • Park, Kyung Hoon;Lee, Sang Yoon;Yoon, Jung Hyun;Cho, Hyo Nam;Kong, Jung Sik
    • Smart Structures and Systems
    • /
    • v.4 no.5
    • /
    • pp.641-653
    • /
    • 2008
  • This paper proposes a practical and realistic method to establish an optimal lifetime maintenance strategy for deteriorating bridges by considering the life-cycle performance as well as the life-cycle cost. The proposed method offers a set of optimal tradeoff maintenance scenarios among other conflicting objectives, such as minimizing cost and maximizing performance. A genetic algorithm is used to generate a set of maintenance scenarios that is a multi-objective combinatorial optimization problem related to the lifetime performance and the life-cycle cost as separate objective functions. A computer program, which generates optimal maintenance scenarios, was developed based on the proposed method using the life-cycle costs and the performance of bridges. The subordinate relation between bridge members has been considered to decide optimal maintenance sequence and a corresponding algorithm has been implemented into the program. The developed program has been used to present a procedure for finding an optimal maintenance scenario for steel-girder bridges on the Korean National Road. Through this bridge maintenance scenario analysis, it is expected that the developed method and program can be effectively used to allow bridge managers an optimal maintenance strategy satisfying various constraints and requirements.

Analysis of Joint Transmit and Receive Antenna Selection in CPM MIMO Systems

  • Lei, Guowei;Liu, Yuanan;Xiao, Xuefang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1425-1440
    • /
    • 2017
  • In wireless communications, antenna selection (AS) is a widely used method for reducing comparable cost of multiple RF chains in MIMO systems. As is well known, most of literatures on combining AS with MIMO techniques concern linear modulations such as phase shift keying (PSK) and quadrature amplitude modulation (QAM). The combination of CPM and MIMO has been considered an optimal choice that can improve its capacity without loss of power and spectrum efficiency. The aim of this paper is to investigate joint transmit and receive antenna selection (JTRAS) in CPM MIMO systems. Specifically, modified incremental and decremental JTRAS algorithms are proposed to adapt to arbitrary number of selected transmit or receive antennas. The computational complexity of several JTRAS algorithms is analyzed from the perspective of channel capacity. As a comparison, the performances of bit error rate (BER) and spectral efficiency are evaluated via simulations. Moreover, computational complexity of the JTRAS algorithms is simulated in the end. It is inferred from discussions that both incremental JTRAS and decremental JTRAS perform close to optimal JTRAS in BER and spectral efficiency. In the sense of practical scenarios, adaptive JTRAS can be employed to well tradeoff performance and computational complexity.

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

Performance Comparison of Orthogonal and Non-orthogonal AF Protocols in Cooperative Relay Systems

  • Bae, Young-Taek;Jung, Sung-Kyu;Lee, Jung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1026-1040
    • /
    • 2012
  • For a single relay channel, we compare the capacity of two different amplify-and-forward (AF) protocols, which are orthogonal AF (OAF) and non-orthogonal AF (NAF). The NAF protocol has been proposed to overcome a significant loss of performance of OAF in the high spectral efficiency region, and it was also theoretically proved that NAF performs better than OAF in terms of the diversity-multiplexing tradeoff. However, existing results have been evaluated at the asymptotically high signal to noise ratio (SNR), thus the power allocation problem between the source and the relay was neglected. We examine which protocol has better performance in a practical system operating at a finite SNR. We also study where a relay should be located if we consider the power allocation problem. A notable conclusion is that the capacity performance depends on both SNR and power allocation ratio, which indicates OAF may perform better than NAF in a certain environment.

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.

Mobile Energy Efficiency Study using Cloud Computing in LTE (LTE에서 클라우드 컴퓨팅을 이용한 모바일 에너지 효율 연구)

  • Jo, Bokyun;Suh, Doug Young
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.24-30
    • /
    • 2014
  • This study investigates computing offloading effect of cloud in real-time video personal broadcast service, whose server is mobile device. Mobile device does not have enough computing resource for encoding video. The computing burden is offloaded to cloud, which has abundant resources in terms of computing, power, and storage compared to mobile device. By reducing computing burden, computation energy can be saved while transmission data amount increases because of decreasing compression efficiency. This study shows that the optimal operation point can be found adaptively to time-varying LTE communication condition result of tradeoff analysis between offloaded computation burden and increase in amount of transmitted data.