scholarly journals Novel User Level Data Leakage Detection Algorithm

Data leakage detection (DLD) is the most widely used detection technique in many applications such as etc. detecting data leakage by various data sources is an important research issue. Several researchers contributed to detect the data leakage by proposing various techniques. In the existing DLD techniques the performance metrics such as accuracy and time have been neglected. In this paper, we have proposed a new DLD algorithm and named it as novel user level data leakage detection algorithm (NULDLDA). In the proposed NULDLDA we have considered the user point of view to know the leakage of data by which agent among several existing agents. We have implemented and compared the NULDLDA with existing DLD. The experimental results indicate that proposed NULDLDA improved the performance over DLD with respect to time and accuracy.

2013 ◽  
Vol 2013 ◽  
pp. 1-8 ◽  
Author(s):  
Ming Xia ◽  
Peiliang Sun ◽  
Xiaoyan Wang ◽  
Yan Jin ◽  
Qingzhang Chen

Localization is a fundamental research issue in wireless sensor networks (WSNs). In most existing localization schemes, several beacons are used to determine the locations of sensor nodes. These localization mechanisms are frequently based on an assumption that the locations of beacons are known. Nevertheless, for many WSN systems deployed in unstable environments, beacons may be moved unexpectedly; that is, beacons are drifting, and their location information will no longer be reliable. As a result, the accuracy of localization will be greatly affected. In this paper, we propose a distributed beacon drifting detection algorithm to locate those accidentally moved beacons. In the proposed algorithm, we designed both beacon self-scoring and beacon-to-beacon negotiation mechanisms to improve detection accuracy while keeping the algorithm lightweight. Experimental results show that the algorithm achieves its designed goals.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Baocheng Huang ◽  
Guang Yu ◽  
Hamid Reza Karimi

It is valuable for the real world to find the opinion leaders. Because different data sources usually have different characteristics, there does not exist a standard algorithm to find and detect the opinion leaders in different data sources. Every data source has its own structural characteristics, and also has its own detection algorithm to find the opinion leaders. Experimental results show the opinion leaders and theirs characteristics can be found among the comments from the Weibo social network of China, which is like Facebook or Twitter in USA.


2017 ◽  
Vol 79 (7) ◽  
Author(s):  
Chayanan Nawapornanan ◽  
Sarun Intakosum ◽  
Veera Boonjing

The share frequent patterns mining is more practical than the traditional frequent patternset mining because it can reflect useful knowledge such as total costs and profits of patterns. Mining share-frequent patterns becomes one of the most important research issue in the data mining. However, previous algorithms extract a large number of candidate and spend a lot of time to generate and test a large number of useless candidate in the mining process. This paper proposes a new efficient method for discovering share-frequent patterns. The new method reduces a number of candidates by generating candidates from only high transaction-measure-value patterns. The downward closure property of transaction-measure-value patterns assures correctness of the proposed method. Experimental results on dense and sparse datasets show that the proposed method is very efficient in terms of execution time. Also, it decreases the number of generated useless candidates in the mining process by at least 70%.


Author(s):  
Salome James ◽  
T. Gowri ◽  
G.V. Ramesh Babu ◽  
P. Vasudeva Reddy

<p>Blind signature allows a user to obtain a signature on a message without revealing anything about the message to the signer. Blind signatures play an important role in many real world applications such as e-voting, e-cash system where anonymity is of great concern. Due to the rapid growth in popularity of both wireless communications and mobile devices, the design of secure schemes with low-bandwidth capability is an important research issue. In this paper, we present a new blind signature scheme with message recovery in the ID-based setting using bilinear pairings over elliptic curves. The proposed scheme is unforgeable with the assumption that the Computational Diffie-Hellman problem is hard. We compare our scheme with the related schemes in terms of computational and communicational point of view.</p>


Metahumaniora ◽  
2018 ◽  
Vol 8 (3) ◽  
pp. 300
Author(s):  
Tania Intan ◽  
Trisna Gumilar

AbstrakPenelitian ini bertujuan untuk (1) mendekripsikan tanggapan pembaca terhadap novel Le Petit Prince (2) mendeskripsikan horizon harapan pembaca terhadap novel Le Petit Prince, dan (3) mendeskripsikan faktor-faktor penyebab perbedaan tanggapan dan horizon harapan pembaca. Penelitian ini termasuk jenis penelitian deskriptif kualitatif. Data penelitian berupa teks yang memuat tanggapan pembaca novel Le Petit Princeyang terdiri dari 20 orang, sedangkan sumber datanya berupa artikel dan makalah yang dimuat di media massa cetak dan elektronik termasuk internet. Instrumen penelitian berupa seperangkat konsep tentang pembaca, tanggapan pembaca, dan horizon harapan. Teknik pengumpulan data dengan cara observasi dan data dianalisis dengan menggunakan teknik deskriptif kualitatif. Hasil penelitian yang didapat sebagai berikut. (1) Seluruh pembaca menanggapi atau menilai positif unsur tema, alur, tokoh, latar, sudut pandang, gaya bahasa, teknik penceritaan, bahasa, dan isi novel Le Petit Prince. (2) Harapan sebagian besar pembaca sebelum membaca novel Le Petit Prince sesuai dengan kenyataan ke sembilan unsur di dalam novel Le Petit Prince, sehingga pembaca dapat dengan mudah menerima dan memberikan pujian pada novel Le Petit Prince. (3) Faktor penyebab perbedaan tanggapan dan horizon harapan pembaca selain perbedaan stressing unsur yang ditanggapi juga karena perbedaan pengetahuan tentang sastra, pengetahuan tentang kehidupan, dan pengalaman membaca karya sastra.Kata kunci: tanggapan pembaca, horizon harapan, Le Petit PrinceAbstractThis study aims to (1) describe reader’s responses to the novel Le Petit Prince (2) to describe the reader's expectations horizon of Le Petit Prince's novel, and (3) to describe the factors causing differences in responses and the horizon of readers' expectations. This research is a descriptive qualitative research type. The research data consist of a set of paragraphs that contains readers' responses to Le Petit Prince's novel, while the data sources are articles and papers published in print and electronic mass media including the internet. The research instruments are a set of reader concepts, reader responses, and expectations horizon. The technique of collecting data is observation and data are analyzed by using qualitative descriptive technique. The results obtained are as follow: (1) All readers respond and valuethe theme elements,plots, characters, background, point of view, language, titles, storytelling techniques, language, and extrinsic novel Le Petit Prince positively. (2) The expectations of most readers before reading Le Petit Prince's novels are in accordance with the nine facts in Le Petit Prince's novel, so readers can easily accept and give prise to Le Petit Prince's novel. (3) Factors causing differences in responses and horizon of readers' expectations other than the stressing differences of the elements being addressed also due to the differences in knowledge of literature, knowledge of life and literary reading experience. Keywords: readers responses, expectations horizon, Le Petit Prince


2020 ◽  
Vol 8 (1) ◽  
pp. 33-41
Author(s):  
Dr. S. Sarika ◽  

Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1179
Author(s):  
Carolina Del-Valle-Soto ◽  
Carlos Mex-Perera ◽  
Juan Arturo Nolazco-Flores ◽  
Alma Rodríguez ◽  
Julio C. Rosas-Caro ◽  
...  

Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protocol and the nodes increase power consumption, which is detrimental to the network’s performance. In this work, a simple jamming detection algorithm is proposed based on an exhaustive study of performance metrics related to the routing protocol and a significant impact on node energy. With this approach, the proposed algorithm detects areas of affected nodes with minimal energy expenditure. Detection is evaluated for four known cluster-based protocols: PEGASIS, TEEN, LEACH, and HPAR. The experiments analyze the protocols’ performance through the metrics chosen for a jamming detection algorithm. Finally, we conducted real experimentation with the best performing wireless protocols currently used, such as Zigbee and LoRa.


2012 ◽  
Vol 605-607 ◽  
pp. 2117-2120
Author(s):  
Min Huang ◽  
Yang Zhang ◽  
Gang Chen ◽  
Guo Feng Yang

In target detection, “hole” phenomenon is present in the detection result, and the shadow is difficult to remove. To solve these problems, we propose a target detection algorithm based on principle of connectivity and texture gradient. Firstly, we use the connectivity principle to find the largest target prospects connection area to get a complete target contour, secondly we use target texture gradient information to further remove the shadow of the target. At last, the experimental results show that the algorithm can obtain a clear target profile and improve the accuracy of the moving target segmentation.


Author(s):  
Erik Kuhn

This article deals with the observed reactions of a lubricating grease to tribological stress. An attempt is made to find the driving forces describe that are responsible for the intrinsic response. From these considerations, a new research paradigm is derived that leaves the traditional observation point of view. The investigations are illustrated with experimental results.


2005 ◽  
Vol 19 (27) ◽  
pp. 1403-1410 ◽  
Author(s):  
E. ALLARIA ◽  
R. MEUCCI ◽  
D. MUGNAI ◽  
A. RANFAGNI ◽  
C. RANFAGNI

The question of the superluminal speed of information was stopped at crossroads in the last few years. According to one point of view, this speed must be limited to the light velocity in vacuum, whereas a different point of view is more open in this respect and, under specific conditions, this limit is considered surmountable. Very recently, a third approach (based on the hypothesis of a local broken Lorentz-invariance) was proposed and, if confirmed, would go beyond the controversy of the two points of view mentioned above. It is therefore worthwhile to recall attention to this problem, which is far from having a definite solution. The present paper reports some experimental results (similar to those of Ref. 1) which can contribute to these discussions, and also considers the fact that they seem to give some support to the aforesaid third approach, although revised in terms of decaying waves.


Sign in / Sign up

Export Citation Format

Share Document