652 research outputs found

    Protecting big data mining association rules using fuzzy system

    Get PDF
    Recently, big data is granted to be the solution to opening the subsequent large fluctuations of increase in fertility. Along with the growth, it is facing some of the challenges. One of the significant problems is data security. While people use data mining methods to identify valuable information following massive database, people further hold the necessary to maintain any knowledge so while not to be worked out, like delicate common itemsets, practices, taxonomy tree and the like Association rule mining can make a possible warning approaching the secrecy of information. So, association rule hiding methods are applied to evade the hazard of delicate information misuse. Various kinds of investigation already prepared on association rule protecting. However, maximum of them concentrate on introducing methods with a limited view outcome for inactive databases (with only existing information), while presently the researchers facing the problem with continuous information. Moreover, in the era of big data, this is essential to optimize current systems to be suited concerning the big data. This paper proposes the framework is achieving the data anonymization by using fuzzy logic by supporting big data mining. The fuzzy logic grouping the sensitivity of the association rules with a suitable association level. Moreover, parallelization methods which are inserted in the present framework will support fast data mining process

    Novel source coding methods for optimising real time video codecs.

    Get PDF
    The quality of the decoded video is affected by errors occurring in the various layers of the protocol stack. In this thesis, disjoint errors occurring in different layers of the protocol stack are investigated with the primary objective of demonstrating the flexibility of the source coding layer. In the first part of the thesis, the errors occurring in the editing layer, due to the coexistence of different video standards in the broadcast market, are addressed. The problems investigated are ‘Field Reversal’ and ‘Mixed Pulldown’. Field Reversal is caused when the interlaced video fields are not shown in the same order as they were captured. This results in a shaky video display, as the fields are not displayed in chronological order. Additionally, Mixed Pulldown occurs when the video frame-rate is up-sampled and down-sampled, when digitised film material is being standardised to suit standard televisions. Novel image processing algorithms are proposed to solve these problems from the source coding layer. In the second part of the thesis, the errors occurring in the transmission layer due to data corruption are addressed. The usage of block level source error-resilient methods over bit level channel coding methods are investigated and improvements are suggested. The secondary objective of the thesis is to optimise the proposed algorithm’s architecture for real-time implementation, since the problems are of a commercial nature. The Field Reversal and Mixed Pulldown algorithms were tested in real time at MTV (Music Television) and are made available commercially through ‘Cerify’, a Linux-based media testing box manufactured by Tektronix Plc. The channel error-resilient algorithms were tested in a laboratory environment using Matlab and performance improvements are obtained

    Deteção de ataques de negação de serviços distribuídos na origem

    Get PDF
    From year to year new records of the amount of traffic in an attack are established, which demonstrate not only the constant presence of distributed denialof-service attacks, but also its evolution, demarcating itself from the other network threats. The increasing importance of resource availability alongside the security debate on network devices and infrastructures is continuous, given the preponderant role in both the home and corporate domains. In the face of the constant threat, the latest network security systems have been applying pattern recognition techniques to infer, detect, and react more quickly and assertively. This dissertation proposes methodologies to infer network activities patterns, based on their traffic: follows a behavior previously defined as normal, or if there are deviations that raise suspicions about the normality of the action in the network. It seems that the future of network defense systems continues in this direction, not only by increasing amount of traffic, but also by the diversity of actions, services and entities that reflect different patterns, thus contributing to the detection of anomalous activities on the network. The methodologies propose the collection of metadata, up to the transport layer of the osi model, which will then be processed by the machien learning algorithms in order to classify the underlying action. Intending to contribute beyond denial-of-service attacks and the network domain, the methodologies were described in a generic way, in order to be applied in other scenarios of greater or less complexity. The third chapter presents a proof of concept with attack vectors that marked the history and a few evaluation metrics that allows to compare the different classifiers as to their success rate, given the various activities in the network and inherent dynamics. The various tests show flexibility, speed and accuracy of the various classification algorithms, setting the bar between 90 and 99 percent.De ano para ano são estabelecidos novos recordes de quantidade de tráfego num ataque, que demonstram não só a presença constante de ataques de negação de serviço distribuídos, como também a sua evolução, demarcando-se das outras ameaças de rede. A crescente importância da disponibilidade de recursos a par do debate sobre a segurança nos dispositivos e infraestruturas de rede é contínuo, dado o papel preponderante tanto no dominio doméstico como no corporativo. Face à constante ameaça, os sistemas de segurança de rede mais recentes têm vindo a aplicar técnicas de reconhecimento de padrões para inferir, detetar e reagir de forma mais rápida e assertiva. Esta dissertação propõe metodologias para inferir padrões de atividades na rede, tendo por base o seu tráfego: se segue um comportamento previamente definido como normal, ou se existem desvios que levantam suspeitas sobre normalidade da ação na rede. Tudo indica que o futuro dos sistemas de defesa de rede continuará neste sentido, servindo-se não só do crescente aumento da quantidade de tráfego, como também da diversidade de ações, serviços e entidades que refletem padrões distintos contribuindo assim para a deteção de atividades anómalas na rede. As metodologias propõem a recolha de metadados, até á camada de transporte, que seguidamente serão processados pelos algoritmos de aprendizagem automática com o objectivo de classificar a ação subjacente. Pretendendo que o contributo fosse além dos ataques de negação de serviço e do dominio de rede, as metodologias foram descritas de forma tendencialmente genérica, de forma a serem aplicadas noutros cenários de maior ou menos complexidade. No quarto capítulo é apresentada uma prova de conceito com vetores de ataques que marcaram a história e, algumas métricas de avaliação que permitem comparar os diferentes classificadores quanto à sua taxa de sucesso, face às várias atividades na rede e inerentes dinâmicas. Os vários testes mostram flexibilidade, rapidez e precisão dos vários algoritmos de classificação, estabelecendo a fasquia entre os 90 e os 99 por cento.Mestrado em Engenharia de Computadores e Telemátic

    Static Web content distribution and request routing in a P2P overlay

    Get PDF
    The significance of collaboration over the Internet has become a corner-stone of modern computing, as the essence of information processing and content management has shifted to networked and Webbased systems. As a result, the effective and reliable access to networked resources has become a critical commodity in any modern infrastructure. In order to cope with the limitations introduced by the traditional client-server networking model, most of the popular Web-based services have employed separate Content Delivery Networks (CDN) to distribute the server-side resource consumption. Since the Web applications are often latency-critical, the CDNs are additionally being adopted for optimizing the content delivery latencies perceived by the Web clients. Because of the prevalent connection model, the Web content delivery has grown to a notable industry. The rapid growth in the amount of mobile devices further contributes to the amount of resources required from the originating server, as the content is also accessible on the go. While the Web has become one of the most utilized sources of information and digital content, the openness of the Internet is simultaneously being reduced by organizations and governments preventing access to any undesired resources. The access to information may be regulated or altered to suit any political interests or organizational benefits, thus conflicting with the initial design principle of an unrestricted and independent information network. This thesis contributes to the development of more efficient and open Internet by combining a feasibility study and a preliminary design of a peer-to-peer based Web content distribution and request routing mechanism. The suggested design addresses both the challenges related to effectiveness of current client-server networking model and the openness of information distributed over the Internet. Based on the properties of existing peer-to-peer implementations, the suggested overlay design is intended to provide low-latency access to any Web content without sacrificing the end-user privacy. The overlay is additionally designed to increase the cost of censorship by forcing a successful blockade to isolate the censored network from the rest of the Internet

    Final report on the evaluation of RRM/CRRM algorithms

    Get PDF
    Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin

    Draft Programmatic Environmental Impact Statement for the Mechanical Creation and Maintenance of Emergent Sandbar Habitat in the Riverine Segments of the Upper Missouri River, Vol. 1 and 2

    Get PDF
    This Draft Programmatic Environmental Impact Statement (PEIS) analyzes the potential environmental consequences of implementing the Emergent Sandbar Habitat (ESH) program on the Upper Missouri River. The purpose of the ESH program is to support least tern and piping plover populations on the Missouri River by supplementing natural habitat through the mechanical creation and replacement of ESH. The PEIS allows the public, cooperating agencies (the U.S. Fish and Wildlife Service (USFWS) and the National Park Service (NPS)), and Corps decision makers to compare impacts among a range of alternatives. The PEIS is meant to inform the selection of a preferred alternative that allows for the support of tern and plover populations on the Missouri River through creation and replacement of sufficient habitat in a safe, efficient and cost-effective manner, that minimizes negative environmental consequences. The ESH program is a part of the Corps’ Missouri River Recovery Program (MRRP). The PEIS is tiered from the Final EIS and Record of Decision for the Master Water Control Manual Review and Update (March 2004). The Corps has identified an Adaptive Management Implementation Process (AMIP) as the preferred alternative. The key concept to the AMIP is that rather than selecting a specific acreage alternative, actions would be progressively implemented until the desired biological response is attained and sustained. While the exact number of acres needed to be constructed and replaced is uncertain at this time, this document discloses the impacts associated with constructing and replacing up to the acreage of Alternative 3.5 (4,370 acres). As the level of habitats created reach lesser alternative acreages, an assessment of the biological response will be completed to determine if it indicates that adequate habitat is in place to support the species. If the desired tern and plover population and productivity levels are being met and sustained at lower acreage levels, these acreages would be maintained and biological metrics would continue to be monitored to ensure project success. The preferred AMIP alternative provides a flexible approach to meeting the biological metrics for the least tern and piping plover identified in the 2003 BiOp Amendment. The success of the preferred alternative in meeting the needs of the species will be evaluated annually and refined through monitoring, assessment and the use of predictive models through a formal Adaptive Management process. The Corps will be coordinating with the Cooperating Agencies (USFWS and NPS) on an ongoing basis to establish and refine the timeline to meet benchmark acres. The alternatives considered represent a range of ESH acreage goals from Alternative 1 (11,886 acres) through Alternative 5 (1,315 acres). Two “no action” alternatives are considered: 1) the implementation of the ESH Program at current levels of construction, approximately 150 acres per year (Existing Program), and 2) the environmental impacts of not implementing any construction program for ESH (No Program). The “no action” alternatives are consistent with the two definitions provided by the Council on Environmental Quality (CEQ) of “continuing with the present course of action” and “taking no action”, respectively [46 Fed. Reg. 18026 (March 23, 1981), as amended]. Neither of these levels of implementation meets the purpose and need for the project. As part of consultation with USFWS under the Endangered Species Act (ESA), the Corps has made a commitment to work within its authorities to contribute to species recovery. Specifically addressed in this PEIS is the commitment to promote the recovery of the species in segments of the Missouri River identified in the 2000 BiOp, as amended (2003). However, “recovery” in the sense of de-listing the species from endangered or threatened status is outside of the scope of this document because the action area is just one portion of each of the birds’ ranges. Only Alternative 1 would fully meet proposed acreage recommendations for habitat goals of RPA IV(b)3 (11,886 acres); however, based on more recent monitoring data, the five remaining alternatives could reasonably meet biological metrics for the least tern and piping plover. In addition, all of the action alternatives require the creation of habitat within the 39-mile and 59-mile Districts of the Missouri National Recreational River (MNRR), potentially affecting the outstandingly remarkable values for which these Districts were originally designated for protection. The National Park Service (NPS) has expressed concerns that implementing the program within the MNRR may create unacceptably significant and permanent effects to the MNRR. The displayed alternatives provide a broad range of alternatives to evaluate the environmental consequences of, and benefits from, different acreage goals juxtaposed with the potentially conflicting agency missions. The lesser acreage alternatives minimize or avoid environmental impacts associated with implementation of the ESH program. This approach, in addition to being consistent with the CEQ’s guidance on reasonable alternatives currently outside an agency’s jurisdiction to implement, also allows the program to be developed in an Adaptive Management context where the flexibility to consider new information is an essential component for program implementation

    Combining SOA and BPM Technologies for Cross-System Process Automation

    Get PDF
    This paper summarizes the results of an industry case study that introduced a cross-system business process automation solution based on a combination of SOA and BPM standard technologies (i.e., BPMN, BPEL, WSDL). Besides discussing major weaknesses of the existing, custom-built, solution and comparing them against experiences with the developed prototype, the paper presents a course of action for transforming the current solution into the proposed solution. This includes a general approach, consisting of four distinct steps, as well as specific action items that are to be performed for every step. The discussion also covers language and tool support and challenges arising from the transformation
    corecore