The railway industry generates large data but there are few researches on railway data analysis. The paper presented an exploratory study and application of datamining from railway alarm data. The railway alarm data ...
详细信息
With the advancements in Internet technologies and Wireless Sensor Networks (WSN), a new era of the Internet of Things (IoT) is being realized. IoT produces a lot of information which can be used to improve the effici...
详细信息
ISBN:
(纸本)9781538652060
With the advancements in Internet technologies and Wireless Sensor Networks (WSN), a new era of the Internet of Things (IoT) is being realized. IoT produces a lot of information which can be used to improve the efficiency of our daily lives and provides advanced services in a wide range of application domains. However, the privacy and the data fusing problems remain major challenges, mainly due to the massive scale and distributed nature of IoT networks and the amount of data collected from IoT increasing at an exponential rate. Thus, a privacy-protected and inter-cloud data fusing platform is needed to the demand for datamining and analytic activities in IoT. In this paper, we propose such a platform based on JointCloud Blockchain and study a novel case of smart traveling based on the proposed platform.
As a major social problem in Atlanta, one of the cities with high criminal rates in United States, crime has been threatening public security for a long time. Many researches proposed that crime events have characteri...
详细信息
ISBN:
(纸本)9781728123264
As a major social problem in Atlanta, one of the cities with high criminal rates in United States, crime has been threatening public security for a long time. Many researches proposed that crime events have characteristics of spatial aggregation and temporal dependence. Therefore, criminal events are predictable, and criminal analysis and prediction is very helpful for law enforcement agencies to more efficiently allocate the limited police forces. In this paper, we use the real crime data set in Atlanta area from 2009 to 2016 to obtain the criminal spatiotemporal distribution features, and make spatiotemporal statistics and visualizations. To predict the daily occurrences of Atlanta crime events, we choose LSTM (long-short term memory) to capture the dependence in time lag and spatial distribution of criminal events. In addition, we discuss the effects of different spatiotemporal scales on the accuracy of crime prediction. When the input time series length is 50 days and the spatial cell size is 0.05 degree, the correlation coefficient R value between the predicted value and the observed records reaches over 0.87. The results provide references for citizens or travelers to avoid hazardous locations, and help law enforcement agencies to allocate resources appropriately.
In the present era, Internet is a well-developed technology that supports most of the social media analysis for various businesses such as marketing of a product, analysis of opinions of different customers, and adver...
详细信息
ISBN:
(纸本)9789811052729;9789811052712
In the present era, Internet is a well-developed technology that supports most of the social media analysis for various businesses such as marketing of a product, analysis of opinions of different customers, and advertising most of the brands. This gathered huge popularity among different users with a fresh way of interaction and sharing the thoughts about the things and materials. Hence, social media comprises of huge data that categorizes the attributes of Big data, namely volume, velocity, and variety. This leads to the research work of this huge data related to different organizations and enterprise firms. To analyze the demands, customer's efficient datamining techniques are required. Nowadays, twitter is the one among the social networks which is dealing with millions of people posting millions of tweets. This paper exemplifies the datamining with machine learning techniques such as TF-TDF and clustering algorithms such as hierarchical clustering, k-means clustering, k-medoid clustering, and consensus clustering along with their efficiencies.
Finding top-k hot items in a data stream is a critical problem in big data management. It can benefit various kinds of applications, such as datamining, databases, network traffic measurement, security, etc. However,...
详细信息
ISBN:
(纸本)9781538636497
Finding top-k hot items in a data stream is a critical problem in big data management. It can benefit various kinds of applications, such as datamining, databases, network traffic measurement, security, etc. However, as the speed of data streams become increasingly large, it becomes more and more challenging to design an accurate and fast algorithm for this problem. There are several existing algorithms, including Space-Saving, Frequent, Lossy counting, with Space-Saving being the most widely used among them. Unfortunately, all these existing algorithms cannot achieve high memory efficiency and high accuracy at the same time. In this paper, we propose an enhanced algorithm based on Space-Saving, named Scoreboard Space-Saving (SSS), which not only achieves much higher accuracy, but also works at fast and constant speed. The key idea of SSS is to predict whether each incoming item is a hot item or not by scoring. Experimental results show that SSS algorithm achieves up to 62.4 times higher accuracy than Space-Saving. The source code of SSS is available at GitHub [1].
Cloud computing has emerged as a de-facto standard that aims at delivering computing as a service. Due to significant ease of access advantages using cloud computing, organizations stored their sensitive data into clo...
详细信息
The applications of instance-intensive workflow are widely used in e-commerce, advanced manufacturing, etc. However, existing studies normally do not consider the problem of reducing energy consumption by utilizing th...
详细信息
mining electronic health records (EHRs) has been considered as a major decision-making tool for clinical diagnosis. In fact, it is difficult to extract the valuable information from EHRs due to free-text writing, inco...
详细信息
ISBN:
(纸本)9781538680346
mining electronic health records (EHRs) has been considered as a major decision-making tool for clinical diagnosis. In fact, it is difficult to extract the valuable information from EHRs due to free-text writing, incomplete description, and high variabilities of diseases. Especially for pediatric EHRs, the shortage of experienced pediatricians as well as complex environmental factors such as seasonal variations, cross infections from kindergartens, make it extremely challenging to conduct a precise diagnosis. To address those challenges, we proposed DeepDiagnosis, a novel deep neural network-based diagnosis prediction algorithm by mining massive pediatric EHRs. First, we pre-process the unstructured EHRs dataset in Chinese and transfer them into sentence vectors by natural language processing technologies. Second, we construct the bidirectional recurrent neural networks (BiRNN) model to catch the patients' clinical symptoms as well as their interaction. Finally, we train and evaluate our model using a real-world dataset containing 81,476 pediatric EHRs. Experimental results show that the proposed method outperforms many baseline methods.
The proceedings contain 22 papers. The special focus in this conference is on Cloud computing. The topics include: Generalized Format-Preserving Encryption for Character data;data Sharing with Fine-Grained Access Cont...
ISBN:
(纸本)9783319696041
The proceedings contain 22 papers. The special focus in this conference is on Cloud computing. The topics include: Generalized Format-Preserving Encryption for Character data;data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System;ring Signature Scheme from Multilinear Maps in the Standard Model;a Revocable Outsourcing Attribute-Based Encryption Scheme;operational-Behavior Auditing in Cloud Storage;efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted data in the Cloud;secure Searchable Public-Key Encryption for Cloud Storage;Adaptive Algorithm Based on Reversible data Hiding Method for JPEG Images;efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks;efficient Graph mining on Heterogeneous Platforms in the Cloud;DMSD-FPE: data Masking System for database Based on Format-Preserving Encryption;delay-Tolerant Network Based Secure Transmission System Design;An Internal Waves Detection Method Based on PCANet for Images Captured from UAV;correlation-Aware Virtual Machine Placement in data Center Networks;Connectivity-Aware Virtual Machine Placement in 60 GHz Wireless Cloud Centers;ethical Trust in Cloud computing Using Fuzzy Logic;answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users;mobile Cloud Platform: Architecture, Deployment and Big data Applications;Research on Algorithm and Model of Hand Gestures Recognition Based on HMM;Question Recommendation Based on User Model in CQA.
data security is a major concern in cloud computing. It must satisfy the three goals of security in computing-integrity, confidentiality, and availability. Homomorphic encryption is a technique in which user or cloud ...
详细信息
ISBN:
(纸本)9789811068720;9789811068713
data security is a major concern in cloud computing. It must satisfy the three goals of security in computing-integrity, confidentiality, and availability. Homomorphic encryption is a technique in which user or cloud service provider (CSP) can perform operations on cloud data without performing decryption. Many algorithms are available for homomorphic encryption. But these algorithms generate large size ciphertext. This paper focuses on homomorphic encryption which generates small size ciphertext. It is a variant of scheme proposed by Dijk et al. In an experimentation of this scheme, encrypted data are stored in DynamoDB of Amazon Web service (AWS) public cloud. When user requires data, it can be downloaded on users machine and then decrypted.
暂无评论