13 research outputs found
A Toolbox for privacy preserving distributed data mining
Distributed structure of individual data makes it necessary for data holders to perform collaborative analysis over the collective database for better data mining results. However each site has to ensure the privacy of its individual data, which means no information is revealed about individual values. Privacy preserving distributed data mining is utilized for that purpose. In this study, we try to draw more attention to the topic of privacy preserving data mining by showing a model which is realistic for data mining, and allows for very efficient protocols. We give two protocols which are useful tools in data mining: a protocol for Yaoѫs millionaires problem, and a protocol for numerical distance. Our solution to Yaoѫs millionaires problem is of independent interest since it gives a solution which improves on known protocols with respect to both computation complexity and communication overhead. This protocol can be used for different purposes in privacy preserving data mining algorithms such as comparison and equality test of data records. Our numerical distance protocol is also applicable to variety of algorithms. In this study we applied our numerical distance protocol in a privacy preserving distributed clustering protocol for horizontally partitioned data. We show application of our protocol over different attribute types such as interval-scaled,binary, nominal, ordinal, ratio-scaled, and alphanumeric. We present proof of security of our protocol, and explain communication, and computation complexity analysis indetail
Public key cryptography based privacy preserving multi-context RFID infrastructure
In this paper, We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy as one of the most important design issues and show that an infrastructure for multi-purpose RFID tags to be used in different contexts can be implemented in a privacy preserving manner. We address security attacks such as cryptanalytic, impersonation, tracking, replay, and relay and show that the protocols used in the proposed infrastructure are secure against them. We also introduce a new angle to privacy in RFID systems by presenting spatio-temporal attacks as an important threat against privacy. We propose a methodology to thwart or alleviate these kinds of attacks. We develop our multi-context RFID infrastructure relying on usage of public key cryptography (PKC), which presents more scalable solutions in the sense that the backend servers can identify the tags approximately 57 times (est.) faster than the best symmetric cipher based systems when there are a million tags in the system. We demonstrate that our infrastructure is feasible even with passive class 2 RFID tags and that the requirements for PKC are comparable to those other cryptographic implementations based on symmetric ciphers proposed for RFID use
Natural β-chitin-protein complex film obtained from waste razor shells for transdermal capsaicin carrier
In the literature, the produced β-chitin samples are in powder or flake forms but there is no natural β-chitin
based film. Also, the commercially available transdermal patches are produced from synthetic polymers. In this
regard,we produced natural β-chitin-protein complex (CPC) film fromthewaste shells of Ensis spp. The obtained
natural filmwas characterized by FTIR, TGA and SEM. Additionally, swelling, thickness, contact angle and antioxidant
tests were done to learn more about the films. After production and characterization of the film, capsaicin,
which is commonly used for pain reliefwas loaded into the film. The loading capacitywas recorded as 5.79%. The
kineticmodelswere studied in three different pH, then the resultswere fittedwith Higuchimodelwith high correlation
at pH 7.4. After considering all the obtained results, the capsaicin loaded CPC film may be an alternative
candidate for transdermal patch instead of the synthetic ones.info:eu-repo/semantics/publishedVersio
Heavy Metal Analysis By Moss Species in the Black Sea Region of Turkey
KAYA, SELIM/0000-0001-7477-3522WOS: 000319178900016The heavy metal analysis of mosses in the Black Sea region of Turkey was determined using atomic absorption spectrometry method. The procedure was also validated by analysis of standard reference material (IAEA-336 Lichen). A qualitative analysis showed that the samples contained chromium, manganese, cobalt, nickel, copper, zinc, and lead. While the mean concentration values of Cr, Mn, Co, Ni, Cu, Zn, and Pb in the moss samples collected from city centers are 60.6, 820, 12.2, 18.8, 293, 181 and 39.8 mg.kg(-1), the mean concentration values in the moss samples collected from the city intervals are 43.8, 761, 11.0, 15.6, 242, 170 and 38.4 mg.kg(-1), respectively. Since this study was a heavy metal analysis along the highway, evaluation of these elements with their potential hazards for ecology and human was briefly discussed. A strong relationship was observed between Pb concentration and the traffic density.Foundation of Karadeniz Technical University, Trabzon, TurkeyKaradeniz Teknik UniversityThis research was supported by Foundation of Karadeniz Technical University, Trabzon, Turkey
Privacy preserving clustering on horizontally partitioned data
Data mining has been a popular research area for more than a decade due to its vast spectrum of applications. However, the popularity and wide availability of data mining tools also raised concerns about the privacy of individuals. The
aim of privacy preserving data mining researchers is to develop data mining techniques that could be applied on databases without violating the privacy of individuals. Privacy preserving techniques for various data mining models have been proposed, initially for classification on centralized data then for association rules in distributed environments. In this work, we
propose methods for constructing the dissimilarity matrix of objects from different sites in a privacy preserving manner which can be used for privacy preserving clustering as well as database joins, record linkage and other operations that require pair-wise comparison of individual private data objects horizontally distributed to multiple sites. We show communication and computation complexity of our protocol by conducting experiments over synthetically generated and real datasets. Each experiment is also performed for a baseline protocol, which has no privacy concern to show that the overhead
comes with security and privacy by comparing the baseline protocol and our protocol
A Multi-Center Study on the Efficacy of Eltrombopag in Management of Refractory Chronic Immune Thrombocytopenia
Objective: The aim of the present study was to evaluate the efficacy and safety of eltrombopag, an oral thrombopoietin receptor agonist, in patients with chronic immune thrombocytopenia (ITP). Materials and Methods: A total of 285 chronic ITP patients (187 women, 65.6%; 98 men, 34.4%) followed in 55 centers were enrolled in this retrospective cohort. Response to treatment was assessed according to platelet count (/mm3) and defined as complete (platelet count of >100,000/mm3), partial (30,000-100,000/mm3 or doubling of platelet count after treatment), or unresponsive (<30,000/mm3). Clinical findings, descriptive features, response to treatment, and side effects were recorded. Correlations between descriptive, clinical, and hematological parameters were analyzed. Results: The median age at diagnosis was 43.9±20.6 (range: 3-95) years and the duration of follow-up was 18.0±6.4 (range: 6-28.2) months. Overall response rate was 86.7% (n=247). Complete and partial responses were observed in 182 (63.8%) and 65 (22.8%) patients, respectively. Thirty-eight patients (13.4%) did not respond to eltrombopag treatment. For patients above 60 years old (n=68), overall response rate was 89.7% (n=61), and for those above 80 years old (n=12), overall response rate was 83% (n=10). Considering thrombocyte count before treatment, eltrombopag significantly increased platelet count at the 1st, 2nd, 3rd, 4th, and 8th weeks of treatment. As the time required for partial or complete response increased, response to treatment was significantly reduced. The time to reach the maximum platelet levels after treatment was quite variable (1-202 weeks). Notably, the higher the maximum platelet count after eltrombopag treatment, the more likely that side effects would occur. The most common side effects were headache (21.6%), weakness (13.7%), hepatotoxicity (11.8%), and thrombosis (5.9%). Conclusion: Results of the current study imply that eltrombopag is an effective therapeutic option even in elderly patients with chronic ITP. However, patients must be closely monitored for response and side effects during treatment. Since both response and side effects may be variable throughout the follow-up period, patients should be evaluated dynamically, especially in terms of thrombotic risk factors.PubMedWoSScopu
A Multi-Center Study on the Efficacy of Eltrombopag in Management of Refractory Chronic Immune Thrombocytopenia: A Real-Life Experience
Objective: The aim of the present study was to evaluate the efficacy and safety of eltrombopag, an oral thrombopoietin receptor agonist, in patients with chronic immune thrombocytopenia (ITP)