A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Babasaheb, Ghatage Trupti
- Enhancement of Discriminative Embedded Clustering for Clustering High Dimensional Data using Hub Concept
Authors
1 Department of Engineering, Bharati Vidyapeeth’s College of Engineering, Kolhapur, Maharashtra, IN
Source
Software Engineering, Vol 8, No 9 (2016), Pagination: 230-235Abstract
We often face very high dimensional data in many real applications. Many dimensions are not always helpful or may even affect the performance of the subsequent clustering algorithms. For dealing with this problem one way is to first reduce dimensionality and then apply clustering. But if we consider the requirement of dimensionality reduction during the process of clustering and vice versa then the performance of clustering can be improved. Discriminative Embedded Clustering (DEC) combines clustering and subspace learning. It has two main objective functions, first is dimensionality reduction and second is clustering.
In high dimensional data some data points are included in many more k-nearest-neighbor lists compared to other points. These points are called hubs. The tendency of high dimensional data to contain hubs is called hubness. Hubs are closer to all the other points as they are situated near cluster centeres. It is proved that major hubs can be effectively used as cluster prototypes. Use of hubness for clustering leads to enhancement over centroid-based approaches. Therefore, the aim of this paper is to design a system for clustering high dimensional data by using Discriminative Embedding Method and Hub based clustering.
Keywords
Clustering, High Dimensional Data, Subspace Learning, Hubs, Discriminative Embedded Clustering (DEC).- Sensitive Data Leakage Detection using Fuzzy Fingerprint Technique in Host-Assisted Mechanism
Authors
1 Department of Computer Science, Shivaji University, Bharati Vidyapeeth’s College of Engineering, and Kolhapur, Maharashtra, IN
Source
Biometrics and Bioinformatics, Vol 8, No 10 (2016), Pagination: 259-265Abstract
Statistics from security firms, government organizations and research institutions show that the numbers of data-leak instances have grown rapidly in recent years. Detecting and preventing data leaks requires a set of complementary solutions, which may include detection data-leak data confinement stealthy malware detection and policy enforcement. The designs, implement, and evaluate fuzzy fingerprint technique that enhances data privacy during data-leak detection operations. This is based on a fast and practical one-way computation on the sensitive data. The DLD provider computes fingerprints from network traffic and identifies by the potential leaks in them. To prevent the DLD provider from gathering exact knowledge about sensitive data, the collection of potential leaks is composed of real leaks and noises. It is the data owner, who post-processes sent back the potential leaks by the DLD provider and determines whether there is any real data leak. This supports detection operation delegation and ISPs can provide data-leak detection as an add-on service to their customers using this model.
Design the host-assisted mechanism for complete data-leak detection for large-scale organizations. The data owner computes a special set of digests or fingerprints from the sensitive data and then discloses only by small amount of them to the DLD provider. Fuzzy fingerprints are special sensitive data digests prepared by the data owner for release to the DLD provider. These results indicate high accuracy achieved by this underlying scheme with very low false positive rate. Data preparation and filtering steps can take considerable amount of processing time but once data preprocessing is done the data become more reliable and robust results are achieved. They have conducted experiments to validate the accuracy and privacy of these solutions.