Outliers are data with anomalous behaviors to other datasets. There are three different types of outliers, namely point anomaly, collective anomaly, and conditional anomaly. Different density-, clustering-, distance-,...
详细信息
ISBN:
(纸本)9781728108728
Outliers are data with anomalous behaviors to other datasets. There are three different types of outliers, namely point anomaly, collective anomaly, and conditional anomaly. Different density-, clustering-, distance-, and distribution-based methods are used to detect outliers. It is obvious that before testing detection algorithms, a dataset that encompasses different types of outliers is required. In this paper an intelligent clustering algorithm is presented to produce a dataset consisting of different outliers. The other important point in this paper is the probability of two uninvestigated types of collective data among datasets that the anomalies are called type I and II. Results show that the proposed algorithm is capable of producing a dataset including different types of outliers. This dataset can be used in all outlier detection techniques. In addition to detection of point anomalies, it can detect all collective anomalies.
Finding the number of clusters in a data set is considered as one of the fundamental problems in cluster analysis. This paper integrates maximum clustering similarity (MCS), for finding the optimal number of clusters,...
详细信息
Aiming at the shortcomings of current intrusion detection, a SOM neural network method based on clustering and network level is proposed in this paper. Through the identification of easy-to-use network intrusion type,...
详细信息
ISBN:
(纸本)9781728118468
Aiming at the shortcomings of current intrusion detection, a SOM neural network method based on clustering and network level is proposed in this paper. Through the identification of easy-to-use network intrusion type, the network intrusion data is cleaned and analyzed in a targeted manner and the multi-layer adaptive network intrusion detection clustering model is established. Network intrusion detection clustering result based on this model is compared with result based on other methods. The results show that this model has higher accuracy and equilibrium and the validity and feasibility of the method is further verified.
Codebook design is a core technology in limited feedback multiple-input multiple-output (MIMO) communication system. However, conventional codebook designs usually assume that the channel vectors obey a uniform distri...
详细信息
ISBN:
(纸本)9781728107325
Codebook design is a core technology in limited feedback multiple-input multiple-output (MIMO) communication system. However, conventional codebook designs usually assume that the channel vectors obey a uniform distribution. Motivated by the excellent classification and analysis abilities of clustering algorithms, we propose a self-organizing map (SOM) clustering based codebook design method that can adaptively learn an arbitrary propagation environment. By utilizing the statistical distribution of cumulative channel samples to construct quantized codewords, the proposed method is able to update the codebook adaptively according to the instantaneous channel state information. Simulation results are consistent with theoretical analysis, and demonstrate that the proposed codebook design method can achieve a significant performance improvement in the achievable rate region compared with the conventional one, especially in non-uniform channel distribution scenarios.
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. The exponent blinding is the main countermeasure which resists the classical forms of side-channel attacks. Horizontal side-ch...
详细信息
ISBN:
(纸本)9781728125831
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. The exponent blinding is the main countermeasure which resists the classical forms of side-channel attacks. Horizontal side-channel analysis is an effective method to overcome this kind of countermeasures and recover the secret key through the analysis of a single trace. However, it is very difficult to exploit leakage from a single trace in practice, because the segment borders of crucial operation are hard to find and the single execution possibly contains a lot of noise in a real application environment. In this paper, a framework for systematic approach is presented to overcome these drawbacks. Firstly, we propose a method to use the Hilbert-Huang transform for the segment borders detection and the noise reduction. Then, an effective clustering method is used to recover the private key. The proposed horizontal clustering approach is applied to a protected implementation on embedded devices. The results show that the success rate of the key recovery could be up to 98%. Finally, we analyze the mechanism of leakage exploration.
Higher education plays a vital role in community development and provides indicators of national strength in all aspects of life. Moreover, it is able to achieve the desired economic growth. Therefore, measurement per...
详细信息
ISBN:
(纸本)9781728130101
Higher education plays a vital role in community development and provides indicators of national strength in all aspects of life. Moreover, it is able to achieve the desired economic growth. Therefore, measurement performance of decision-making units is a vital process in this issue. Higher education institutions are multi-input and output institutions and this type of institutions is difficult to be evaluated using traditional economic methods. This study aims to evaluate the efficiency and quality of higher education institutions based on Data Envelopment Analysis (DEA). Furthermore, we also aim to find solutions and proposals for universities with low efficiency values (or inefficient) by identifying weaknesses in the resources of these universities. The DEA assumes that all Decision Making Units (DMUs) are homogenous in their environments while the DEA process is not enough to compare universities' performances. So, our work proposes to use an unsupervised data mining technique such as k-means algorithm to group universities with similar characteristics. Then, the DEA is utilized for each cluster separately. The result shows a better improvements and a fair comparison of performance between universities.
In the past decades,Collision Avoidance System has grown to a level more developed than it has ever been,actively and significantly improving the safety of passengers of ***,it only focused on the period of time when ...
详细信息
In the past decades,Collision Avoidance System has grown to a level more developed than it has ever been,actively and significantly improving the safety of passengers of ***,it only focused on the period of time when the vehicles are driving,and ignored the moment when passengers are most vulnerable – when they are getting off the car as their attention to the surrounding drops and are no longer protected by the structure of the ***,in this paper,an additional system is proposed to warn the passengers to open the doors and get off with caution,and even interfere to stop them getting off temporarily.
The Product Line Architecture (PLA) is one of the most important artifacts of a Software Product Line (SPL). PLA design can be formulated as an optimization problem with many factors. In this context, the MOA4PLA appr...
详细信息
ISBN:
(纸本)9781728126074
The Product Line Architecture (PLA) is one of the most important artifacts of a Software Product Line (SPL). PLA design can be formulated as an optimization problem with many factors. In this context, the MOA4PLA approach was proposed to optimize PLA design using search algorithms and metrics specific to the context. MOA4PLA treats the PLA design as a multi-objective optimization problem. At the end of the search process several PLA design alternatives are presented to the decision maker, difficulting the decision about which PLA alternative best fits with his/her needs. In this sense, this work proposes the usage of clustering algorithms to group PLAs design alternatives, according to their characteristics and assist the decision maker in the choice of one PLA design for the SPL. For this purpose, an empirical study was carried out, involving quantitative and qualitative experiments. Such an study integrated the K-Means++ and DBSCAN clustering algorithms in the MOA4PLA approach. The results of the experiments were promising, since an appropriate grouping of the solutions can be quantitatively observed, and also, qualitatively, the suitability of the solutions to the decision makers needs was verified.
Insurance coverage recommendation problem (ICRP) in which the most suitable coverage for customers is suggested is an essential issue for an insurance company. ICRP helps insurance companies to give suitable services ...
详细信息
Insurance coverage recommendation problem (ICRP) in which the most suitable coverage for customers is suggested is an essential issue for an insurance company. ICRP helps insurance companies to give suitable services to their customers. In ICRP, the insurance company tried to mine the features and records of data associated with the customers to suggest them the most economic and fitted insurance plan. The insurance companies have large databases which are considered as a proper infrastructure to analyze, model and predict the customer behavior. In this paper, a two-stage clustering-classification model is proposed to suggest suitable insurance coverage for customers. The first stage addresses a data pre-screening phase and clustering of customers based on the record of insurance coverage. Well-known clustering algorithms are employed. The superior clustering algorithm is selected based on Davies-Bouldin metric. In the second stage, several filter and wrapper methods are implemented to select proper features. The selected features are assumed as inputs of K-nearest neighbor classification algorithm. The proposed approach is applied in a real case study for clustering the customers and recommend insurance coverage. The results show that the model is capable of suggesting suitable insurance coverage based on customers' characteristics. [GRAPHICS] .
In this paper, we proposed an approach to clustering based on bio-inspired behaviour and distributed energy efficient model. The motivation to propose this clustering approach is due to the challenge of performance in...
详细信息
ISBN:
(纸本)9781728126258
In this paper, we proposed an approach to clustering based on bio-inspired behaviour and distributed energy efficient model. The motivation to propose this clustering approach is due to the challenge of performance in terms of finding an efficient way to send data packets to base stations and to maintain the lifetime performance of wireless sensor networks. The bio-inspired approach adopted the behaviour of a bird called Kestrel. This behaviour is expressed using mathematical formulation and then translated into an algorithm. The bio-inspired algorithm is combined with the distributed energy efficient model for clustering to ensure efficient energy optimization. The proposed clustering approach, referred to as DEEC-KSA, is evaluated through simulation and compared with benchmarked clustering algorithms. The result of simulation showed that the performance of DEEC-KSA is efficient among the comparative clustering algorithms for energy optimization in terms of stability period, network lifetime and network throughput. Additionally, the proposed DEEC-KSA has the optimal time (in seconds) to send packets to base station successfully.
暂无评论