Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396055
A. Sachan
Dark Web analysis is an important aspect in field of counter terrorism (CT). In the present scenario terrorist attacks are biggest problem for the mankind and whole world is under constant threat from these well-planned, sophisticated and coordinated terrorist operations. Terrorists anonymously set up various web sites embedded in the public Internet, exchanging ideology, spreading propaganda, and recruiting new members. Dark web is a hotspot where terrorists are communicating and spreading their messages. Now every country is focusing for CT. Dark web analysis can be an efficient proactive method for CT by detecting and avoiding terrorist threats/attacks. In this paper we have proposed dark web analysis model that analyzes dark web forums for CT and connecting the dots to prevent the country from terrorist attacks.
{"title":"Countering terrorism through dark web analysis","authors":"A. Sachan","doi":"10.1109/ICCCNT.2012.6396055","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396055","url":null,"abstract":"Dark Web analysis is an important aspect in field of counter terrorism (CT). In the present scenario terrorist attacks are biggest problem for the mankind and whole world is under constant threat from these well-planned, sophisticated and coordinated terrorist operations. Terrorists anonymously set up various web sites embedded in the public Internet, exchanging ideology, spreading propaganda, and recruiting new members. Dark web is a hotspot where terrorists are communicating and spreading their messages. Now every country is focusing for CT. Dark web analysis can be an efficient proactive method for CT by detecting and avoiding terrorist threats/attacks. In this paper we have proposed dark web analysis model that analyzes dark web forums for CT and connecting the dots to prevent the country from terrorist attacks.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116737426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6479590
M. Gomathisankaran, K. Namuduri, A. Tyagi
With the increase in computation power and communication bandwidth it has become cheaper to aggregate the computation capabilities. This new model of computation is known as cloud computing. The security of cloud computing model will determine its universal applicability. In this paper we propose a novel homomorphic encryption system which can become a building block of securing the computations performed by cloud. We introduce the notion of semi-perfect secrecy and prove that our system is secure under this setup.
{"title":"HORNS: A semi-perfectly secret homomorphic encryption system","authors":"M. Gomathisankaran, K. Namuduri, A. Tyagi","doi":"10.1109/ICCCNT.2012.6479590","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6479590","url":null,"abstract":"With the increase in computation power and communication bandwidth it has become cheaper to aggregate the computation capabilities. This new model of computation is known as cloud computing. The security of cloud computing model will determine its universal applicability. In this paper we propose a novel homomorphic encryption system which can become a building block of securing the computations performed by cloud. We introduce the notion of semi-perfect secrecy and prove that our system is secure under this setup.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396001
A. Routh, Sourav Das, Saptarshi Das, Indranil Pan
Stabilizing state feedback controller has been designed in this paper for a switched DC motor plant, controlled over communication network. The switched system formulation for the networked control system (NCS) with additional switching in a plant parameter along with the switching due to random packet losses, have been formulated as few set of non-strict Linear Matrix Inequalities (LMIs). In order to solve non-strict LMIs using standard LMI solver and to design the stabilizing state feedback controller, the Cone Complementary Linearization (CCL) technique has been adopted. Simulation studies have been carried out for a DC motor plant, operating at two different sampling times with random switching in the moment of inertia, representing sudden jerks.
{"title":"Stabilization based networked predictive controller design for switched plants","authors":"A. Routh, Sourav Das, Saptarshi Das, Indranil Pan","doi":"10.1109/ICCCNT.2012.6396001","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396001","url":null,"abstract":"Stabilizing state feedback controller has been designed in this paper for a switched DC motor plant, controlled over communication network. The switched system formulation for the networked control system (NCS) with additional switching in a plant parameter along with the switching due to random packet losses, have been formulated as few set of non-strict Linear Matrix Inequalities (LMIs). In order to solve non-strict LMIs using standard LMI solver and to design the stabilizing state feedback controller, the Cone Complementary Linearization (CCL) technique has been adopted. Simulation studies have been carried out for a DC motor plant, operating at two different sampling times with random switching in the moment of inertia, representing sudden jerks.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396045
J. A. Shajahan, J. Sushmita Jain, C. Joseph, A. Amodkumar, V. Chauhan, G. Keerthipriya, P. C. Kishore Raja
In this paper, a new method of defence system using image processing has been implemented. It is mainly focussed on bringing out the best target tracking technology. The defence humanoid is designed to overcome foreign attacks at the country border. The defence system consists of two modules- control unit and humanoid unit. The control unit has a laptop in which Graphical User Interface (GUI) using MATLAB has been implemented. Image processing is done and the control signal is transmitted. The humanoid unit receives the signal from the control unit, at a remote location and responds according to the processed control signal. The control signal has been processed by image processing technique. The humanoid does image processing by the combination of edge detection, scale space analysis, thermal image processing and virtual 3D sizing in 2D image processing and colour detection. The humanoid, works in three modes- (1) Auto Targeting and Auto Shooting (Fully Autonomous).(2)Auto Targeting and Manual Shooting.(Semi-Autonomous).(3)Manual Targeting and Manual Shooting (User Oriented).
{"title":"Target detecting defence humanoid sniper","authors":"J. A. Shajahan, J. Sushmita Jain, C. Joseph, A. Amodkumar, V. Chauhan, G. Keerthipriya, P. C. Kishore Raja","doi":"10.1109/ICCCNT.2012.6396045","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396045","url":null,"abstract":"In this paper, a new method of defence system using image processing has been implemented. It is mainly focussed on bringing out the best target tracking technology. The defence humanoid is designed to overcome foreign attacks at the country border. The defence system consists of two modules- control unit and humanoid unit. The control unit has a laptop in which Graphical User Interface (GUI) using MATLAB has been implemented. Image processing is done and the control signal is transmitted. The humanoid unit receives the signal from the control unit, at a remote location and responds according to the processed control signal. The control signal has been processed by image processing technique. The humanoid does image processing by the combination of edge detection, scale space analysis, thermal image processing and virtual 3D sizing in 2D image processing and colour detection. The humanoid, works in three modes- (1) Auto Targeting and Auto Shooting (Fully Autonomous).(2)Auto Targeting and Manual Shooting.(Semi-Autonomous).(3)Manual Targeting and Manual Shooting (User Oriented).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128454262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395896
I. S, A. P
As domino logic design offers smaller area and higher speed than complementary CMOS design, it has been very commonly used for high-performance processors; however, the average power consumption of the domino circuits is larger than that of the static circuit. This power dissipation problem needs to be solved for the domino circuits. The power consumption of conventional CMOS circuits is composed of dynamic and static parts. The static (leakage) power of domino logic increases exponentially with the scaling of the threshold voltage (Vt) and gate oxide thickness (tox), the dual threshold voltage technique (DTV) is one of most popular techniques to suppress leakage power. Dynamic power of the circuit is greatly reduced by Voltage Scaling (VS) technique. By merging the above techniques a new technique called Dual Threshold Voltage - Voltage Scaling (DTVS) technique which further reduces total power consumption of domino circuits. To verify the above technique, the basic gates and adder circuit has been implemented with DTVS, with DTV alone and without any technique. The power consumption was analyzed by implementing the circuit in UMC 90nm CMOS technology. The 67% of power reduction is possible with DTVS technique. Mentor Graphics ELDO and EZ-wave are used for simulations.
{"title":"A low-power dual threshold voltage-voltage scaling technique for domino logic circuits","authors":"I. S, A. P","doi":"10.1109/ICCCNT.2012.6395896","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395896","url":null,"abstract":"As domino logic design offers smaller area and higher speed than complementary CMOS design, it has been very commonly used for high-performance processors; however, the average power consumption of the domino circuits is larger than that of the static circuit. This power dissipation problem needs to be solved for the domino circuits. The power consumption of conventional CMOS circuits is composed of dynamic and static parts. The static (leakage) power of domino logic increases exponentially with the scaling of the threshold voltage (Vt) and gate oxide thickness (tox), the dual threshold voltage technique (DTV) is one of most popular techniques to suppress leakage power. Dynamic power of the circuit is greatly reduced by Voltage Scaling (VS) technique. By merging the above techniques a new technique called Dual Threshold Voltage - Voltage Scaling (DTVS) technique which further reduces total power consumption of domino circuits. To verify the above technique, the basic gates and adder circuit has been implemented with DTVS, with DTV alone and without any technique. The power consumption was analyzed by implementing the circuit in UMC 90nm CMOS technology. The 67% of power reduction is possible with DTVS technique. Mentor Graphics ELDO and EZ-wave are used for simulations.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128474026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396025
Abijith Rajan, S. Logeshwaran, S. P. Kumar, Geethanjali
Doppler Ultrasound has been widely used in the measurement of blood flow parameters such as blood velocity, blood pressure etc. Success of the automated quantification algorithms for these variables depends on the interference or noise free strength of the signal and position of the base line with respect to zero. Preprocessing and baseline correction techniques suitable for accurate measurement of these parameters are compared in this work. A 1 KHz calibration signal from the vascular Doppler recorder is used as a reference signal for this purpose. Performances of Butterworth low pass filters with different orders and detrending methods employing different wavelets are compared in terms of mean square error (MSE) in this paper. This has resulted in successful measurements of blood velocity of brachial, DorsalisPedis and post tibial vein.
{"title":"Lab VIEW based noise removal and baseline correction for doppler ultrasound blood flow applications","authors":"Abijith Rajan, S. Logeshwaran, S. P. Kumar, Geethanjali","doi":"10.1109/ICCCNT.2012.6396025","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396025","url":null,"abstract":"Doppler Ultrasound has been widely used in the measurement of blood flow parameters such as blood velocity, blood pressure etc. Success of the automated quantification algorithms for these variables depends on the interference or noise free strength of the signal and position of the base line with respect to zero. Preprocessing and baseline correction techniques suitable for accurate measurement of these parameters are compared in this work. A 1 KHz calibration signal from the vascular Doppler recorder is used as a reference signal for this purpose. Performances of Butterworth low pass filters with different orders and detrending methods employing different wavelets are compared in terms of mean square error (MSE) in this paper. This has resulted in successful measurements of blood velocity of brachial, DorsalisPedis and post tibial vein.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128796826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395921
T. Kumar, S. Sivanandam
Deployment of effective surveillance and security measures is important in these days. The system must be able to provide access and track movement of different types of vehicles and people entering the secured premises, to avoid any mishap from happening.The paper proposes a system that recognizes the car with 3 different features namely license plate, logo and colour of the car. Existing systems perform recognition mainly by using license plate alone. Addition of features will increase the security of the system. Initially car region is extracted using frame subtraction method. On the extracted car region, License plate search and logo identification is being performed. Average colour of the car forms the third feature that helps in classification of cars. Finally with the extracted features, classification of cars into two categories is performed i.e. Authenticated and Non Authenticated The spatial segmentation and the temporal segmentation yields the moving objects. However, in practice, a moving object may suddenly cease motion or moves very slowly during several frames, which results in its corresponding intensity differences to be insignificant. Object in video are tracked and detected using particle filter. The particle filter is a Bayesian sequential importance sampling technique. It consists of essentially two steps: prediction and update. The paper analyzes applying of particle filter for tracking the object. The approach can further be combined with the training model developed using features for detecting and tracking cars in real time.
{"title":"Object detection and tracking in video using particle filter","authors":"T. Kumar, S. Sivanandam","doi":"10.1109/ICCCNT.2012.6395921","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395921","url":null,"abstract":"Deployment of effective surveillance and security measures is important in these days. The system must be able to provide access and track movement of different types of vehicles and people entering the secured premises, to avoid any mishap from happening.The paper proposes a system that recognizes the car with 3 different features namely license plate, logo and colour of the car. Existing systems perform recognition mainly by using license plate alone. Addition of features will increase the security of the system. Initially car region is extracted using frame subtraction method. On the extracted car region, License plate search and logo identification is being performed. Average colour of the car forms the third feature that helps in classification of cars. Finally with the extracted features, classification of cars into two categories is performed i.e. Authenticated and Non Authenticated The spatial segmentation and the temporal segmentation yields the moving objects. However, in practice, a moving object may suddenly cease motion or moves very slowly during several frames, which results in its corresponding intensity differences to be insignificant. Object in video are tracked and detected using particle filter. The particle filter is a Bayesian sequential importance sampling technique. It consists of essentially two steps: prediction and update. The paper analyzes applying of particle filter for tracking the object. The approach can further be combined with the training model developed using features for detecting and tracking cars in real time.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128668507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395866
P. S. Sunil Kumar, L. Jenkins
In a cyber physical system like vehicles number of signals to be communicated in a network system has an increasing trend. More and more mechanical and hydraulic parts are replaced by electronic control units and infotainment and multimedia applications has increased in vehicles. Safety critical hard real time messages and aperiodic messages communicated between electronic control units have been increased in recent times. Flexray is a high bandwidth protocol consisting of static segment for supporting hard real time messages and a dynamic segment for transmitting soft and non real time messages. In this paper, a method to obtain the stability region for the random arrival of messages in each electronic control units which is scheduled in the dynamic segment of Flexray protocol is presented. Number of mini slots available in the dynamic segment of Flexray restricts the arrival rate of tasks to the micro controllers or the number of micro controllers connected to the Flexray bus. Stability region of mathematical model of the system is compared with the Flexray protocol simulation results.
{"title":"Stability analysis of aperiodic messages scheduled in the dynamic segment of Flexray protocol","authors":"P. S. Sunil Kumar, L. Jenkins","doi":"10.1109/ICCCNT.2012.6395866","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395866","url":null,"abstract":"In a cyber physical system like vehicles number of signals to be communicated in a network system has an increasing trend. More and more mechanical and hydraulic parts are replaced by electronic control units and infotainment and multimedia applications has increased in vehicles. Safety critical hard real time messages and aperiodic messages communicated between electronic control units have been increased in recent times. Flexray is a high bandwidth protocol consisting of static segment for supporting hard real time messages and a dynamic segment for transmitting soft and non real time messages. In this paper, a method to obtain the stability region for the random arrival of messages in each electronic control units which is scheduled in the dynamic segment of Flexray protocol is presented. Number of mini slots available in the dynamic segment of Flexray restricts the arrival rate of tasks to the micro controllers or the number of micro controllers connected to the Flexray bus. Stability region of mathematical model of the system is compared with the Flexray protocol simulation results.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"8 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130357015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395886
K. Uma Rani, M. Holi
The characteristics of speech and voice in neurological diseases, such as, Parkinson's disease (PD), cerebellar demyelination, senile disease and stroke, have a realistic potential to provide information for early detection of onset, progression, and severity of these diseases. There are no risks involved in capturing and analysis of voice signals as it is noninvasive by nature and in carefully controlled circumstances, it can provide a large amount of meaningful data. The data collected in the present work consist of 136 sustained vowel phonations (/ah/), among them 83 phonations are from patients suffering from different neurological diseases and 53 phonations from controlled subjects including both male and female subjects. A total of 16 features were extracted from the voice data and significant differences between the two group `means' were evaluated using student's t-test. Significant findings in measurements were found in all types of shimmers and jitters features, except in measures of pitch. Further, all the 16 features were used as input to the artificial neural network (ANN) for classification. Two types of ANN are used for classification, the multilayer perceptron (MLP) network and radial basis function (RBF) network. 112 phonations were used to train the network and 24 phonations for testing. The RBF network gave a better classification with 90.12% for training set and 87.5% for test set compared to MLP with 86.66% for training set and 83.33% for test set.
{"title":"Analysis of speech characteristics of neurological diseases and their classification","authors":"K. Uma Rani, M. Holi","doi":"10.1109/ICCCNT.2012.6395886","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395886","url":null,"abstract":"The characteristics of speech and voice in neurological diseases, such as, Parkinson's disease (PD), cerebellar demyelination, senile disease and stroke, have a realistic potential to provide information for early detection of onset, progression, and severity of these diseases. There are no risks involved in capturing and analysis of voice signals as it is noninvasive by nature and in carefully controlled circumstances, it can provide a large amount of meaningful data. The data collected in the present work consist of 136 sustained vowel phonations (/ah/), among them 83 phonations are from patients suffering from different neurological diseases and 53 phonations from controlled subjects including both male and female subjects. A total of 16 features were extracted from the voice data and significant differences between the two group `means' were evaluated using student's t-test. Significant findings in measurements were found in all types of shimmers and jitters features, except in measures of pitch. Further, all the 16 features were used as input to the artificial neural network (ANN) for classification. Two types of ANN are used for classification, the multilayer perceptron (MLP) network and radial basis function (RBF) network. 112 phonations were used to train the network and 24 phonations for testing. The RBF network gave a better classification with 90.12% for training set and 87.5% for test set compared to MLP with 86.66% for training set and 83.33% for test set.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126890289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396017
M. Prakash, G. Singaravel
Data Mining and Knowledge Discovery is an indispensable technology for business and researches in many fields such as statistics, machine learning, pattern recognition, databases and high performance computing. In which Privacy Preserving Data Mining has the potential to increase the reach and benefits of data mining technology. This allows publishing a microdata without disclosing private information. Publishing data about individuals without revealing sensitive information about them is an important problem. k-anonymity and l-Diversity has been proposed as a mechanism for protecting privacy in microdata publishing. But both the mechanisms are insufficient to protect the privacy issues like Homogeneity attack, Skewness Attack, Similarity attack and Background Knowledge Attack. A new privacy measure called “(n, t)-proximity” is proposed which is more flexible model. Here first introduction about data mining is presented, and then research challenges are given. Followed by privacy preservation measures and problems with k-anonymity and l-Diversity are discussed. The rest of the paper is organised as (n, t)-proximity model, experimental results and analysis followed by conclusion.
{"title":"A new model for privacy preserving sensitive Data Mining","authors":"M. Prakash, G. Singaravel","doi":"10.1109/ICCCNT.2012.6396017","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396017","url":null,"abstract":"Data Mining and Knowledge Discovery is an indispensable technology for business and researches in many fields such as statistics, machine learning, pattern recognition, databases and high performance computing. In which Privacy Preserving Data Mining has the potential to increase the reach and benefits of data mining technology. This allows publishing a microdata without disclosing private information. Publishing data about individuals without revealing sensitive information about them is an important problem. k-anonymity and l-Diversity has been proposed as a mechanism for protecting privacy in microdata publishing. But both the mechanisms are insufficient to protect the privacy issues like Homogeneity attack, Skewness Attack, Similarity attack and Background Knowledge Attack. A new privacy measure called “(n, t)-proximity” is proposed which is more flexible model. Here first introduction about data mining is presented, and then research challenges are given. Followed by privacy preservation measures and problems with k-anonymity and l-Diversity are discussed. The rest of the paper is organised as (n, t)-proximity model, experimental results and analysis followed by conclusion.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}