期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Distributed anonymous data perturbation method for privacy-preserving data mining 被引量:4
1
作者 Feng LI Jin MA Jian-hua LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期952-963,共12页
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed s... Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment. 展开更多
关键词 Privacy-preserving data mining (PPDM) distributed data mining Data perturbation
原文传递
A Distributed Data Mining System Based on Multi-agent Technology 被引量:1
2
作者 郭黎明 张艳珍 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期80-83,共4页
Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data... Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data mining have been developed, but only a few of them make use of intelligent agents. This paper provides the reason for applying Multi-Agent Technology in Distributed Data Mining and presents a Distributed Data Mining System based on Multi-Agent Technology that deals with heterogeneity in such environment. Based on the advantages of both the CS model and agent-based model, the system is being able to address the specific concern of increasing scalability and enhancing performance. 展开更多
关键词 distributed Data mining MULTI-AGENT CORBA Client/Server.
在线阅读 下载PDF
An Adaptive Privacy Preserving Framework for Distributed Association Rule Mining in Healthcare Databases
3
作者 Hasanien K.Kuba Mustafa A.Azzawi +2 位作者 Saad M.Darwish Oday A.Hassen Ansam A.Abdulhussein 《Computers, Materials & Continua》 SCIE EI 2023年第2期4119-4133,共15页
It is crucial,while using healthcare data,to assess the advantages of data privacy against the possible drawbacks.Data from several sources must be combined for use in many data mining applications.The medical practit... It is crucial,while using healthcare data,to assess the advantages of data privacy against the possible drawbacks.Data from several sources must be combined for use in many data mining applications.The medical practitioner may use the results of association rule mining performed on this aggregated data to better personalize patient care and implement preventive measures.Historically,numerous heuristics(e.g.,greedy search)and metaheuristics-based techniques(e.g.,evolutionary algorithm)have been created for the positive association rule in privacy preserving data mining(PPDM).When it comes to connecting seemingly unrelated diseases and drugs,negative association rules may be more informative than their positive counterparts.It is well-known that during negative association rules mining,a large number of uninteresting rules are formed,making this a difficult problem to tackle.In this research,we offer an adaptive method for negative association rule mining in vertically partitioned healthcare datasets that respects users’privacy.The applied approach dynamically determines the transactions to be interrupted for information hiding,as opposed to predefining them.This study introduces a novel method for addressing the problem of negative association rules in healthcare data mining,one that is based on the Tabu-genetic optimization paradigm.Tabu search is advantageous since it removes a huge number of unnecessary rules and item sets.Experiments using benchmark healthcare datasets prove that the discussed scheme outperforms state-of-the-art solutions in terms of decreasing side effects and data distortions,as measured by the indicator of hiding failure. 展开更多
关键词 distributed data mining evolutionary computation sanitization process healthcare informatics
在线阅读 下载PDF
A Fast Distributed Algorithm for Association Rule Mining Based on Binary Coding Mapping Relation
4
作者 CHEN Geng NI Wei-wei +1 位作者 ZHU Yu-quan SUN Zhi-hui 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期27-30,共4页
Association rule mining is an important issue in data mining. The paper proposed an binary system based method to generate candidate frequent itemsets and corresponding supporting counts efficiently, which needs only ... Association rule mining is an important issue in data mining. The paper proposed an binary system based method to generate candidate frequent itemsets and corresponding supporting counts efficiently, which needs only some operations such as "and", "or" and "xor". Applying this idea in the existed distributed association rule mining al gorithm FDM, the improved algorithm BFDM is proposed. The theoretical analysis and experiment testify that BFDM is effective and efficient. 展开更多
关键词 frequent itemsets distributed association rule mining relation of itemsets-binary data
在线阅读 下载PDF
Production analysis of functionally distributed machines for underground mining
5
作者 Fukui Rui Kusaka Kouhei +3 位作者 Nakao Masayuki Kodama Yuichi Uetake Masaaki Kawai Kazunari 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2016年第3期477-485,共9页
Recent years, underground mining method is becoming popular because of its potentially high productivity and efficiency. In this method, a mining machinery; load haul dump(LHD), is used as both an excavator and a tran... Recent years, underground mining method is becoming popular because of its potentially high productivity and efficiency. In this method, a mining machinery; load haul dump(LHD), is used as both an excavator and a transporter of ore. This paper proposes a distributed system that realizes the excavation and transport functions with separated vehicles, an excavator and a transporter. In addition, this research proposes a mining map and configurations suitable for the proposed distributed system. To evaluate the productivity of the proposed system, a simulation environment has been developed. Analysis using the simulator reveals what performance factors of the excavator and the transporter have large impacts on the productivity. Simulation results also demonstrate the difference of potential between LHD system and the distributed system that can be explained based on their functions allocation. 展开更多
关键词 Underground mining mining machinery Autonomous system design distributed system System configuration
在线阅读 下载PDF
A Novel Framework for Biomedical Text Mining
6
作者 Janyl Jumadinova Oliver Bonham-Carter +2 位作者 Hanzhong Zheng Michael Camara Dejie Shi 《Journal on Big Data》 2020年第4期145-155,共11页
Text mining has emerged as an effective method of handling and extracting useful information from the exponentially growing biomedical literature and biomedical databases.We developed a novel biomedical text mining mo... Text mining has emerged as an effective method of handling and extracting useful information from the exponentially growing biomedical literature and biomedical databases.We developed a novel biomedical text mining model implemented by a multi-agent system and distributed computing mechanism.Our distributed system,TextMed,comprises of several software agents,where each agent uses a reinforcement learning method to update the sentiment of relevant text from a particular set of research articles related to specific keywords.TextMed can also operate on different physical machines to expedite its knowledge extraction by utilizing a clustering technique.We collected the biomedical textual data from PubMed and then assigned to a multi-agent biomedical text mining system,where each agent directly communicates with each other collaboratively to determine the relevant information inside the textual data.Our experimental results indicate that TexMed parallels and distributes the learning process into individual agents and appropriately learn the sentiment score of specific keywords,and efficiently find connections in biomedical information through text mining paradigm. 展开更多
关键词 Biomedical text mining reinforcement learning MULTI-AGENT distributed text mining CLUSTER
在线阅读 下载PDF
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining 被引量:2
7
作者 Jianlin Xu Yifan Yu +4 位作者 Zhen Chen Bin Cao Wenyu Dong Yu Guo Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期418-427,共10页
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Int... With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage. 展开更多
关键词 Android platform mobile malware detection cloud computing forensic analysis machine learning redis key-value store big data hadoop distributed file system data mining
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部