183 research outputs found
Privacy Protection by Anonymizing Based on Status of Provider and Community
When a user receives personal services from a service provider, the service can be of a higher quality if the user pro-vides more personal information. However, the risk of privacy violation could increase. Therefore, this paper proposes a privacy protection method that realizes avoidance of unwanted informa-tion disclosure by controlling disclosable attributes according to the results from monitoring two elements: user background in-formation of the provider and user community status. This is done before disclosing individual attributes corresponding to the privacy policy (i.e., the required anonymity level) by each user. The system architecture based on the aforementioned is also pro-posed. The validity of the proposed methods was confirmed by a desk model
ããŒãã§ã¹æ³ãçšãããšãŒãžã§ã³ãã·ãã¥ã¬ãŒã·ã§ã³ã«ããéèæ©é¢ã®å䜵ã«é¢ããã·ã¹ãããã¯ãªã¹ã¯ãžã®åœ±é¿åæ
ãªãŒãã³ã·ã§ãã¯ä»¥éïŒæ¬§å·ãäžå¿ã«ã€ã³ã¿ãŒãã³ã¯ãããã¯ãŒã¯äžã®éèæ©é¢ã®ã·ã¹ãããã¯ãªã¹ã¯ã«å¯ŸããŠé¢å¿ãé«ãŸã£ãŠããïŒæ¬ç 究ã§ã¯ïŒéèæ©é¢ã®ç Žç¶»ã®åœ±é¿ãã€ã³ã¿ãŒãã³ã¯ãããã¯ãŒã¯ã«ãããŠã©ã®ããã«äŒæãããã«ã€ããŠãšãŒãžã§ã³ãããŒã¹ã·ãã¥ã¬ãŒã·ã§ã³ãçšããŠåæããïŒã·ãã¥ã¬ãŒã·ã§ã³ã§ã¯ïŒ(1)åžå Žæ§è³ç£äŸ¡æ Œã®äžèœçãš(2)æ䟡蚌åžã«äžããæ害çãå€åããã2çš®é¡ã®ã·ããªãªãçšæãïŒéèæ©é¢ã®å䜵ã®æå¹æ§ã»ç Žç¶»ãªã¹ã¯ã®ã¢ãã«åãè©Šã¿ãïŒãã®çµæïŒ(1)éèæ©é¢ã®å䜵ãå®æœããå Žåã«ãããŠãïŒå€æ°è¡ã«ãããç Žç¶»ã®ãªã¹ã¯ã¯åæžã§ããªãïŒ(2)çæéã§æ䟡蚌åžã«æ害ãçºçããå ŽåïŒé·æéã«ããã£ãŠæ害ãçºçããç¶æ³ãããã·ã¹ãããã¯ãªã¹ã¯ã倧ãããªãããšãæããã«ãªã£ãïŒThe aim of the present study is to evaluate systemic risks by manipulating the declining rate of marketable asset price and damaging of securities due to merger of financial institutions. An agent-based simulation platform with purchase method of international accounting standard is developed and analyse the influence of the goodwill (Noren), produced by merging financial institutions. The research revealed the following two points: (1) merger of financial institutions cannot prevent the failures of many banks; (2) systemic risk is more increasing damaging of securities than declining rate of marketable asset price
A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning
In the modern world, several areas of our lives can be improved, in the form of diverse additional dimensions, in terms of quality, by machine learning. When building machine learning models, open data are often used. Although this trend is on the rise, the monetary losses since the attacks on machine learning models are also rising. Preparation is, thus, believed to be indispensable in terms of embarking upon machine learning. In this field of endeavor, machine learning models may be compromised in various ways, including poisoning attacks. Assaults of this nature involve the incorporation of injurious data into the training data rendering the models to be substantively less accurate. The circumstances of every individual case will determine the degree to which the impairment due to such intrusions can lead to extensive disruption. A modus operandi is proffered in this research as a safeguard for machine learning models in the face of the poisoning menace, envisaging a milieu in which machine learning models make use of data that emanate from numerous sources. The information in question will be presented as training data, and the diversity of sources will constitute a barrier to poisoning attacks in such circumstances. Every source is evaluated separately, with the weight of each data component assessed in terms of its ability to affect the precision of the machine learning model. An appraisal is also conducted on the basis of the theoretical effect of the use of corrupt data as from each source. The extent to which the subgroup of data in question can undermine overall accuracy depends on the estimated data removal rate associated with each of the sources described above. The exclusion of such isolated data based on this figure ensures that the standard data will not be tainted. To evaluate the efficacy of our suggested preventive measure, we evaluated it in comparison with the well-known standard techniques to assess the degree to which the model was providing accurate conclusions in the wake of the change. It was demonstrated during this test that when the innovative mode of appraisal was applied, in circumstances in which 17% of the training data are corrupt, the degree of precision offered by the model is 89%, in contrast to the figure of 83% acquired through the traditional technique. The corrective technique suggested by us thus boosted the resilience of the model against harmful intrusion
ãµãã«ãŒPKæŠã«ãããã²ãŒã çè«äžã®æé©æŠç¥ãšããã®æŠç¥ãšã®å·®ç°ã«é¢ããèå¯
人ãäŒæ¥ã¯æ§ã
ãªæ¡ä»¶äžã§æé©ãªè¡åãåãã®ã ãããïŒåããªãã®ã§ããã°ããã¯ãªããïŒãã®åå ãæ±ããããšã¯ïŒå®éã®å人ã»äŒæ¥çã®ç解ã倧ããå©ããïŒãŸãïŒã²ãŒã çè«ã¯ã¹ããŒããçµæžåŠãããŠãã®ä»ã®ç€ŸäŒç§åŠã®ç解ã«å€§ããé¢ãã£ãŠããïŒæ¬ç 究ã¯æ¯èŒçããŒã¿ãéããããæ··åæŠç¥ãé©çšã§ãããµãã«ãŒã®PKæŠã«æ³šç®ãïŒç¬èªã®ç¢ºçãèæ
®ããå©åŸè¡šãäœæããïŒãã®å©åŸè¡šãçšããŠPKæŠã«ãããããã«ãŒã®æé©æŠç¥ãæ±ãïŒæé©æŠç¥ãšå®éã®æŠç¥ãšã®ãºã¬ãæããã«ããïŒãã®ãºã¬ã®åå ãæ±ããçºã«ããŒã¿ã»ããå
ã®åããŒã¿é
ç®ã«ã€ããŠã®ç¢ºçååžãæ¯èŒãããšããã¢ãããŒããããïŒããŒã¿ã¯ã€ã³ã¿ãŒãããåç»ãµã€ãããåéããïŒããéžæã«ãã2001幎ã2017幎ã®éã®äžçååœã®PKæŠ150è©ŠåïŒèš1539人åïŒã䜿çšããïŒå®éšçµæãšããŠïŒæé©æŠç¥ãšå®éã®æŠç¥ãšã®éã«ãºã¬ãååšããããšãåãã£ãïŒãŸããã®ãºã¬ã«ã¯åœç±ã»ã¹ã³ã¢å·®ã®é¢äžã瀺åãããïŒãã®çµæããïŒãµãã«ãŒPKæŠã«ãããæé©æŠç¥ãšå®éã®æŠç¥ãšã®éã«ããããºã¬ã®åå ãæšå®ããïŒæ¬ææ³ã¯ã¹ããŒãåé以å€ãžã®å¿çšãæåŸ
ã§ãã
決å®æšåŠç¿ãå©çšããããžãã¹ããã»ã¹å®è¡ãã°æ€èšŒã®ããã®è«çåŒã®çæ
æ
å ±ã·ã¹ãã ã«ãã£ãŠèšé²ãããããžãã¹ããã»ã¹ã®å®è¡å±¥æŽãåæããããšã¯ããã»ã¹ãã€ãã³ã°ãšåŒã°ãïŒå®éã«è¡ãããããžãã¹ããã»ã¹ã®åé¡ãææ¡ããŠæ¹åãžç¹ããããã®éèŠãªæ段ã§ããïŒLTL checkerã¯ç·åœ¢æçžè«ç(LTL)ãããŒã¹ã«ãã圢åŒçãªèšèªãå©çšããŠããžãã¹ããã»ã¹ã«ãããŠæãç«ã€ã¹ãæ§è³ªãèšè¿°ãïŒæ€èšŒãè¡ãããã®ããŒã«ã§ããïŒããžãã¹ããã»ã¹ã®åæãè¡ãããã®æåãªæ段ãšããŠç¥ãããŠããïŒãããïŒå€ãã®ããžãã¹ã¢ããªã¹ãã¯LTLã®ãããªæ°åŠçãªèšæ³ã«ç²ŸéããŠããªãããïŒããžãã¹ããã»ã¹ã«ãããŠæ€èšŒãããæ§è³ªãèšè¿°ããéã«ïŒçã«æ€èšŒãã¹ãæ§è³ªãæ£ç¢ºã«èšè¿°ããããšã¯å°é£ã§ããïŒè«çåŒã誀ã£ãŠèšè¿°ããå Žåã¯åœç¶ã®ããšãªããæ¬æ¥æå³ããŠããæ€èšŒãè¡ãããšã¯ã§ããªãïŒããã§æ¬ç 究ã§ã¯æåž«ããæ©æ¢°åŠç¿ææ³ã®äžçš®ã§ãã決å®æšãçšããŠããžãã¹ããã»ã¹å®è¡ãã°ããã€ãã³ãã®å®è¡é åºé¢ä¿ã«çç®ããŠæœåºããç¹åŸŽéã«åºã¥ããŠåŠç¿ãè¡ãïŒè«çåŒãèªåçæããããšã§æ€èšŒãããæ§è³ªãèšè¿°ããææ³ãææ¡ããïŒæ¬ææ³ãçšããããšã§ïŒæ°åŠçãªææ³ã«ç²ŸéããŠããªãè
ã§ãæ€èšŒãã¹ãæ§è³ªãèšè¿°ããããšãã§ããïŒæ¬ææ³ã®åŠ¥åœæ§ã瀺ãããã«ïŒé»è©±ä¿®çããã»ã¹ã«å¯Ÿãææ¡ææ³ãé©çšãïŒæå¹æ§ã確èªããïŒProcess mining is a important means for analyzing business process and LTL checker is a famous tool for process mining. However, since many business analysts are not familiar with mathematical notation like LTL, it is difficult to describe exactly the property to be verified when describing the property to be verified in the business process is there. Therefore, in this study, learning is performed based on feature quantities extracted from the business process execution log using a decision tree, and a logical expression is automatically generated. We propose a method to describe properties to be verified
ãŠãŒã¶èæ¯æ å ±åã³ã³ãã¥ããã£ç¶æ³ãèæ ®ããå¿å床å¶åŸ¡ã«ãããã©ã€ãã·ä¿è·ãšãŒãžã§ã³ãã®ææ¡
ã©ã€ããã°ãªã©ã®å人æ
å ±ãæäŸãïŒãããã€ãããæ
å ±æšèŠãªã©ã®å人ãµãŒãã¹ãåããå ŽåïŒå€ãã®å人æ
å ±ãæäŸããããšã§æŽã«å質ã®é«ãå人ãµãŒãã¹ãåããããšãã§ããåé¢ïŒæ
å ±ã®æŒãããæµçšãªã©ã«ãããã©ã€ãã·äŸµå®³ã®å±éºæ§ãå¢ããïŒããã§æ¬è«æã§ã¯ïŒãŠãŒã¶ããšã«èšå®ããåžæå¿å床ã«å¯Ÿå¿ããå±æ§ãé瀺ããåã«ïŒå¿å床ã«åœ±é¿ãåãŒãäºã€ã®èŠçŽ ïŒ(1)ãããã€ãã®ãŠãŒã¶èæ¯æ
å ±ïŒ(2)ã³ãã¥ããã£ã®ç¶æ³ïŒããã§ãã¯ãå¿å床ã«åæ ãããããšã§é瀺å±æ§ã調æŽãïŒçµæïŒç¡çšãªæ
å ±é瀺ãé¿ããããšãç¹åŸŽãšãããã©ã€ãã·ä¿è·ãšãŒãžã§ã³ããææ¡ããïŒ(1)ïŒ(2)ããããã«ãããŠïŒèª²é¡ãåæãïŒè§£æ±ºãžã®ææ¡ææ³ã«ã€ããŠè¿°ã¹ïŒ(1)ã¯äºäŸã¢ãã«ã«ããå®éšçæºäžæ€èšŒïŒ(2)ã¯æ©è¡è
ã¢ãã«ãçšããã³ãã¥ããã£ãæ³å®ãæºäžæ€èšŒã«ããïŒææ¡ææ³ã®åŠ¥åœæ§ãšæå¹æ§ã確èªããïŒWhen a user receives personal services from a service provider, the service can be of a higher quality if the user provides more personal information. However, the risk of privacy violation could increase. Therefore, this paper proposes a privacy preserving agent that realizes avoidance of unwanted information disclosure by controlling disclosable attributes according to the results from monitoring two elements: user background information of the provider and user community status. This is done before disclosing individual attributes corresponding to the privacy policy (required anonymity) by each user. The validity of the proposed methods was confirmed by a desk model
ã¢ãã€ã«ãšãŒãžã§ã³ãã¢ããªã±ãŒã·ã§ã³ã®ããã®ä»æ§èšè¿°èšèªPigeon
ã¢ãã€ã«ãšãŒãžã§ã³ãæè¡ãæ®åããã«ã€ããŠïŒå®é©çšã«ãããïŒäŸãã°éæŸåã®ãããã¯ãŒã¯äžãåãåãããåäœã®ææ¡ãå°é£ã§ããããšãïŒã»ãã¥ãªãã£ã®ç¢ºä¿ãåŸæ¥ã®ã·ã¹ãã ã«æ¯ã¹ãŠé£ãããªã©ïŒå€ãã®åé¡ãæµ®ãã³äžãã£ãŠããŠããïŒãã®ãããªåé¡ã解決ããæ段ãšããŠïŒåœ¢åŒä»æ§æè¡ã泚ç®ãããŠããïŒã¢ãã€ã«ãšãŒãžã§ã³ãåãã®ä»æ§èšè¿°èšèªãïŒãã®ããã®çè«çåºç€ãšãªãèšç®ã¢ãã«ãããã€ãææ¡ãããŠããïŒãããïŒã¢ãã€ã«ãšãŒãžã§ã³ãã¢ããªã±ãŒã·ã§ã³ã®ä»æ§ãå¹æçã«èšè¿°ã»å©çšããããã«ã¯ïŒãã®èšè¿°èšèªã«ãã«ã¹ã¿ãã€ãºæ©èœãé«åºŠãªèšè¿°èœåãèŠæ±ããããïŒåŸæ¥ã®èšèªã§ã¯å¯Ÿå¿ããŠããªãïŒããã§æ¬è«æã§ã¯ïŒã¢ãã€ã«ãšãŒãžã§ã³ãã¢ããªã±ãŒã·ã§ã³ã®ä»æ§èšè¿°ã«å¿
èŠãªïŒã«ã¹ã¿ãã€ãºæ©èœãé«åºŠãªèšè¿°èœåãå®çŸããèšèªPigeonãææ¡ããïŒPigeonã¯ïŒä»æ§èšè¿°èšèªãšããŠïŒåäœä»æ§ãšèŠæ±ä»æ§ã®åé¢ãïŒåè
ããåŸè
ã®äœç³»ãžã®ã¢ãã«åãå€æŽå¯èœãšããããšã«ããïŒã«ã¹ã¿ãã€ãºæ©èœãå®çŸããïŒãŸãïŒãªãã¬ã¯ã·ã§ã³æ©èœã«ããïŒé«åºŠãªèšè¿°èœåãå®çŸããïŒãŸãæ¬è«æã§ã¯ïŒPigeonãé»åã«ã¿ãã°ã¢ããªã±ãŒã·ã§ã³ã«é©çšãïŒæŽã«ä»ã®èšèªãšæ¯èŒããããšã«ããïŒPigeonã®è©äŸ¡ãè¡ã
Studies on Functional Bacteria of Indonesian Tropical Forest Plants for Biorehabilitation of Degraded Lands
Forest degradations have left vast amount of damaged and abandoned lands in Indonesia. In this paper, we present our approaches in rehabilitation of adverse soils using functional bacteria isolated from plant species of Indonesian tropical rain forests. For these purposes, we collected bacteria from various bio-geo-climatically different forests and conducted bioassays to test these bacterial abilities in improving plant growth. Repeated seedling-based studies on Shorea spp., Alstonia scholaris, Acacia crassicarpa, and Agathis lorantifolia have revealed that many bacteria were able to promote plant growth at early stage in the nursery. Various plant responses towards inoculations suggested that although forest soils maintain highly diverse and potent bacteria, it is necessary to select appropriate approaches to obtain optimum benefits from these plant-bacteria interactions. Our ideas and futures studies for further management of these plant- bacteria interactions for biorehabilitation are also discussed
Linked Dataãçšãã俯ç°çãªå€è¢éžæåŒåé¡èªåçæææ³ã®ææ¡
è¿å¹ŽïŒæç§å
šäœãç§ç®å
å
šäœã§ä¿¯ç°çãªåŠç¿ãæ±ããããŠããïŒç¹ã«æç§ã»ç§ç®éã®é¢é£ãå³ã£ã暪æçãªåŠç¿ãå¿
èŠãšãããŠããããšïŒå€è¢éžæåŒåé¡ã倧éãã€åºç¯å²ã®åºé¡ã«åããŠããå€åéã®åºé¡ã«å¯Ÿå¿ãã圢åŒã§ããããšããïŒåŠç¿è
ãšåºé¡è
ã®åæ¹ã«ãšã£ãŠä¿¯ç°çãªå€è¢éžæåŒåé¡ãæçšã§ãããšèããããïŒâ俯ç°çãªåé¡âãšã¯ïŒå¹
åºãé¢é£æ
å ±ãå«ã¿å
šäœåããšããããããããªå
容ã§ããïŒäžæ¹ïŒä¿¯ç°çãªåé¡ã人æã§çæã»åéããããšã¯ã³ã¹ãããããïŒããã§æ¬ç 究ã§ã¯ïŒåºé¡æã«å¹
åºãé¢é£æ
å ±ãæ瀺ããããšã§ä¿¯ç°çãªèŠç¹ã§åé¡ããšããããããããªïŒå€è¢éžæåŒåé¡ã®èªåçæææ³ãææ¡ããïŒæ¬ææ³ã§ã¯ïŒå€è¢éžæåŒåé¡ãæ§æããåé¡ãšéžæè¢ã«å¯ŸããŠããããèŠä»¶ãèšå®ãïŒLinked Dataãå©çšããèªååé¡çæã¢ãããŒããèæ¡ããïŒLinked Dataãšã¯ïŒæ§é åãããããŒã¿ã©ããããªã³ã¯ãããããšãã§ããã°ã©ãããŒã¿ã§ããïŒåºé¡åœ¢åŒãšããŠïŒåäžã®æ£è§£ãååšããåæ°åç圢åŒïŒè€æ°ã®æ£è§£ãååšããè€æ°åç圢åŒïŒè€æ°ã®åé¡ã«å¯ŸããŠåäžã®æ£è§£ã®çµåããååšããçµåãåç圢åŒã®3çš®é¡ã®çæã¢ã«ãŽãªãºã ãææ¡ããïŒçæåé¡ã«å¯Ÿããè©äŸ¡ã§ã¯ïŒè¢«éšè
ãšããŠæè·å
èš±ç¶ææè
ãšåŠçã«åºé¡ããããã§ïŒèŠä»¶ã«å¯Ÿå¿ããŠèšå®ããè©äŸ¡é
ç®ãæºããããšã確ãããïŒIn recent years, just about all subjects require students to learn in a broad perspective. Because the need exists for cross-curriculum learning aimed at relating subject areas, it is useful for multiple choice questions to include panoramic information for learners. Panoramic information means comprehensive information that gives us macro-perspective; through which us look down at the whole learning subjects. A question including panoramic information refers to content that includes transverse related information and makes respondents grasp the whole knowledge. However, it is costly to manually generate and collect appropriate multiple-choice questions for learners and exam preparers. Therefore, in this research, we propose a method for automatic generation of multiple choice questions including panoramic information using Linked Data. Linked Data is graphical data that can link structured data, and it is used as a technology for data integration and utilization. In this paper, we aim to realize a system for automatically generating three types of multiple choice questions by implementing an approach to generating questions and choices. An evaluation method for the generation of questions and choices involves setting indicators for each evaluation item, such as validity and the degree of the inclusion of panoramic information
- âŠ