84,487 research outputs found

    Privacy Preserving Utility Mining: A Survey

    Full text link
    In big data era, the collected data usually contains rich information and hidden knowledge. Utility-oriented pattern mining and analytics have shown a powerful ability to explore these ubiquitous data, which may be collected from various fields and applications, such as market basket analysis, retail, click-stream analysis, medical analysis, and bioinformatics. However, analysis of these data with sensitive private information raises privacy concerns. To achieve better trade-off between utility maximizing and privacy preserving, Privacy-Preserving Utility Mining (PPUM) has become a critical issue in recent years. In this paper, we provide a comprehensive overview of PPUM. We first present the background of utility mining, privacy-preserving data mining and PPUM, then introduce the related preliminaries and problem formulation of PPUM, as well as some key evaluation criteria for PPUM. In particular, we present and discuss the current state-of-the-art PPUM algorithms, as well as their advantages and deficiencies in detail. Finally, we highlight and discuss some technical challenges and open directions for future research on PPUM.Comment: 2018 IEEE International Conference on Big Data, 10 page

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Full text link
    Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals under consideration of different requirements. On the basis of experimental results, our design approaches are compared, and introduced into a protocol engineering approach for micro protocols.Comment: 20 pages, 7 figures, 4 table

    Assessing the suitable habitat for reintroduction of brown trout (Salmo trutta forma fario) in a lowland river : a modeling approach

    Get PDF
    Huge efforts have been made during the past decades to improve the water quality and to restore the physical habitat of rivers and streams in western Europe. This has led to an improvement in biological water quality and an increase in fish stocks in many countries. However, several rheophilic fish species such as brown trout are still categorized as vulnerable in lowland streams in Flanders (Belgium). In order to support cost-efficient restoration programs, habitat suitability modeling can be used. In this study, we developed an ensemble of habitat suitability models using metaheuristic algorithms to explore the importance of a large number of environmental variables, including chemical, physical, and hydromorphological characteristics to determine the suitable habitat for reintroduction of brown trout in the Zwalm River basin (Flanders, Belgium), which is included in the Habitats Directive. Mean stream velocity, water temperature, hiding opportunities, and presence of pools or riffles were identified as the most important variables determining the habitat suitability. Brown trout mainly preferred streams with a relatively high mean reach stream velocity (0.2-1m/s), a low water temperature (7-15 degrees C), and the presence of pools. The ensemble of models indicated that most of the tributaries and headwaters were suitable for the species. Synthesis and applications. Our results indicate that this modeling approach can be used to support river management, not only for brown trout but also for other species in similar geographical regions. Specifically for the Zwalm River basin, future restoration of the physical habitat, removal of the remaining migration barriers and the development of suitable spawning grounds could promote the successful restoration of brown trout

    Developing computational thinking in the classroom: a framework

    No full text
    Computational thinking sits at the heart of the new statutory programme of study for Computing: “A high quality computing education equips pupils to use computational thinking and creativity to understand and change the world” (Department for Education, 2013, p. 188). This document aims to support teachers to teach computational thinking. It describes a framework that helps explain what computational thinking is, describes pedagogic approaches for teaching it and gives ways to assess it. Pupil progression with the previous ICT curriculum was often demonstrated through ‘how’ (for example, a software usage skill) or ‘what’ the pupil produced (for example, a poster). This was partly due to the needs of the business world for office skills. Such use of precious curriculum time however has several weaknesses. Firstly, the country’s economy depends on technological innovation not just on use of technology. Secondly, the pace of technology and organisational change is fast in that the ICT skills learnt are out of date before a pupil leaves school. Thirdly, technology invades all aspects of our life and the typically taught office practice is only a small part of technology use today

    A research review of quality assessment for software

    Get PDF
    Measures were recommended to assess the quality of software submitted to the AdaNet program. The quality factors that are important to software reuse are explored and methods of evaluating those factors are discussed. Quality factors important to software reuse are: correctness, reliability, verifiability, understandability, modifiability, and certifiability. Certifiability is included because the documentation of many factors about a software component such as its efficiency, portability, and development history, constitute a class for factors important to some users, not important at all to other, and impossible for AdaNet to distinguish between a priori. The quality factors may be assessed in different ways. There are a few quantitative measures which have been shown to indicate software quality. However, it is believed that there exists many factors that indicate quality and have not been empirically validated due to their subjective nature. These subjective factors are characterized by the way in which they support the software engineering principles of abstraction, information hiding, modularity, localization, confirmability, uniformity, and completeness
    • 

    corecore