Дисертації з теми "SENSITIVE RULES"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-18 дисертацій для дослідження на тему "SENSITIVE RULES".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Повний текст джерелаDimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Повний текст джерелаMurphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Повний текст джерелаKeywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
Baladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Повний текст джерелаAljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Повний текст джерелаZhao, Mingjun. "Essays on model uncertainty in macroeconomics." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Повний текст джерелаOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Повний текст джерелаCredit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
Pinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Повний текст джерелаThis work is about family education, at the time when children’s status has changed. Thisnew status alters educational and authority relationships and questions the link betweenindividual and collectiv aspects of social life such as transmission. How do parents dealwith this sensitiv issue that is authority, torn between the democratic ideal and theconstraint that cannot be avoided in education ? How do they organize everyday life ? Isfamily organisation linked with children’s way to follow school rules ?Studying chilren and childhood representations, the issue of this work is to reveal thedynamics that contributed to family education evolution. Thus, the aim of this study is tounderstand the movement of family education while allowing to question educationnalauthority by combining family and school sociological approaches.The study focuses on parenting practices (parents’ daily organisation with their children)and educational values that parents promot. It reavels that they their organisation haschanged. Henceforth parenting practicises are structured by situational heterogeneity and« social class education » is less relevant to describe parenting practices unlike genderideologies. On the axiological level appears the educational homogenization that Fize(1990) predicted : parents massively join values promoted by privileged backgroundsfamilies (child’s personal development).Finally, with the notion of sensitivy to school form (students’ way to follow school rules),the thesis shows how, in education, dialogue and explication injonctions reinforceeducational difficulties. On the contrary, it reveals that most critical points in education areunspeakable and that the meaning of rules relies in their use
Yang, Jei-Hung, and 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Повний текст джерела中原大學
資訊工程研究所
98
As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
Kao, Tai-wei, and 高黛威. "Hiding dynamic sensitive association rules in incremental data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Повний текст джерела國立臺灣科技大學
資訊工程系
101
As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and policy. These both are the challenges for protecting sensitive association rules. Most exist technologies of hiding sensitive association rules cannot handle dynamic data and sensitive rules effectively. For solving these problems, this paper proposed a framework to protect dynamic sensitive association rules in incremental environment, HSAi and HDSA. HSAi is the algorithm to protect sensitive association rule in incremental data and we design the strategy to select appropriate victim transactions and items to delete them in order to hide sensitive association rules. HDSA is the algorithm for protecting dynamic sensitive rules, including adding and deleting. The mean of the deleting sensitive rule is the association rule that hidden can show again in the mining result. The goals of HSAi and HDSA are not only protecting sensitive rules but also producing least side effect from released dataset. Experiment results represent that the framework situation of incremental data and dynamic sensitive rules both can cause least side effects and maintain a desirable quality of sanitized database as well.
Wang, En-Tzu, and 王恩慈. "A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/70145166546301796919.
Повний текст джерела國立東華大學
資訊工程學系
93
In the researches of data mining, discovering frequent patterns from huge amounts of data is one of the most studied problems. The frequent patterns mined form databases can bring the users many commercial benefits. However, some sensitive patterns with security concerned may cause a threat to privacy. We investigate to find an appropriate balance between a need for privacy and information discovery on frequent patterns. In this thesis, a novel method for modifying databases to hide sensitive patterns is proposed. By multiplying the original database and a sanitization matrix together, a sanitized database with privacy concerns is obtained. Additionally, two probability policies are introduced to against the recovery of sensitive patterns and reduce the probability of hiding non-sensitive patterns in the sanitized database. The complexity analysis of our sanitization process is proved and a set of experiments is also performed to show the benefit of our approach.
"Cooperative Driving of Connected Autonomous Vehicles Using Responsibility Sensitive Safety Rules." Master's thesis, 2020. http://hdl.handle.net/2286/R.I.62658.
Повний текст джерелаDissertation/Thesis
Masters Thesis Computer Engineering 2020
VARSHNEY, PEEYUSH. "CLOUD FRAMEWORK FOR ASSOCIATION RULE HIDING." Thesis, 2017. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16143.
Повний текст джерелаЗалізняк, Олена Анатоліївна. "Гендерно чутлива журналістика як засіб стереотипізації в інтернет-медіа". Магістерська робота, 2020. https://dspace.znu.edu.ua/jspui/handle/12345/4521.
Повний текст джерелаUA : Магістерська робота «Гендерно чутлива журналістика як засіб стереотипізації в інтернет-медіа» – основний текст – 70 сторінок. Для виконання дипломної роботи опрацьовано 70 джерел. Об’єктом дослідження є два сайти відомих українських ЗМІ: «ТСН» та «УНІАН». Предметом дослідження є особливості функціонування гендерно чутливої журналістики в інтернет-ресурсах «ТСН» і «УНІАН». Мета дослідження: виявлення особливостей функціонування гендерно чутливої журналістики як засобу стереотипізація. Методи дослідження: У роботі використано поєднання наукових підходів та принципів, які дали змогу комплексно та всебічно дослідити проблему стереотипізація в межах гендерно чутливої журналістики. Застосовуючи системний підхід, вдалося проаналізувати механізми формування гендерних стереотипів через онлайн-медіа. Найбільш вагому роль у дослідженні має група лінгвістичних методів, серед яких головну позицію займає контент-аналіз, який дозволив визначити тональність текстів через використання емоційно забарвленої лексики. Також було використано методи опису та систематизації, узагальнення, соціологічний метод, за допомогою яких виявлені та описані особливості функціонування гендерно чутливої журналістики, а також зроблені висновки щодо використання гендерно чутливої журналістики як засобу стереотипізація. Для реалізації поставленої мети необхідно виконати такі завдання: 1. Вивчити дефініції понять «гендерна чутливість», «стереотип», «стереотипізація», «інтернет-медіа», а також дати вичерпне тлумачення терміна «гендерно чутлива журналістика». 2. Окреслити механізми виникнення й існування стереотипів у ЗМІ. 3. Описати основні види стереотипів у сучасних ЗМІ. 5 4. Виявити специфіку поширення гендерно чутливої журналістики в українських інтернет-медіа на прикладі онлайн-ресурсів «ТСН» та «УНІАН». 5. Розглянути основні види стереотипів та можливі способи їх руйнування у ЗМІ. Методологічну і теоретичну основу дослідження складають наукові розвідки про психологію ЗМІ та теорію стереотипів таких авторів, як В. Ліппмана, Г. Мельник, М. Скорика, Р. Харріса. Також були вивчені й проаналізовані праці вітчизняних і зарубіжних учених: Н. Аджихіної, Н. Акопяна, С. Кузіна та В. Попова та ін. Наукова новизна одержаних результатів полягає у всебічному аналізі основних понять за темою: «гендерна чутливість», «гендерно чутлива журналістика», «стереотипізація», а також у спробі детально дослідити функціонування гендерно чутливої журналістики, виявити особливості формування та руйнування стереотипів засобами журналістики. Сфера застосування: матеріали проведеного дослідження можуть бути використані у професійній діяльності телевізійників, продюсерів, стереотипізація. Ця робота може стати у нагоді громадським організаціям, які опікуються додержанням гендерних норм, а також може бути використана під час вивчення курсів телевізійної журналістики, соціальної проблематики ЗМІ у вишах.
EN : Master's thesis "Gender-sensitive journalism as a means stereotyping in online media "- main text - 70 pages. For 70 sources were processed. The object of the study are two sites of well-known Ukrainian media: "TSN" and "UNIAN". The subject of the study is the peculiarities of gender functioning sensitive journalism in the Internet resources "TSN" and "UNIAN". The purpose of the study: to identify the features of gender functioning sensitive journalism as a means of stereotyping. Research methods: The work uses a combination of scientific approaches and principles that allowed for a comprehensive and comprehensive study the problem of stereotyping within gender-sensitive journalism. Applying a systems approach, it was possible to analyze the mechanisms formation of gender stereotypes through online media. The most important role in the study has a group of linguistic methods, among which the main position takes content analysis, which allowed to determine the tone of the texts through use of emotionally colored vocabulary. Methods were also used description and systematization, generalization, sociological method, using which identified and described the features of the functioning of gender-sensitive journalism, as well as conclusions on gender use sensitive journalism as a means of stereotyping. To achieve this goal it is necessary to perform the following tasks: 1. To study the definitions of "gender sensitivity", "stereotype", "Stereotyping", "online media", as well as give a comprehensive interpretation the term "gender sensitive journalism". 2. Outline the mechanisms of emergence and existence of stereotypes in the media. 3. Describe the main types of stereotypes in modern media. 5 4. Identify the specifics of the spread of gender-sensitive journalism Ukrainian Internet media on the example of online resources "TSN" and "UNIAN". 5. Consider the main types of stereotypes and possible ways to do them destruction in the media. The methodological and theoretical basis of the study are scientific intelligence on the psychology of the media and the theory of stereotypes by authors such as W. Lippman, G. Melnik, M. Skoryk, R. Harris. Also studied analyzed the works of domestic and foreign scientists: N. Adzhikhina, N. Hakobyan, S. Kuzin and V. Popov and others. The scientific novelty of the obtained results lies in a comprehensive analysis basic concepts on the topic: "gender sensitivity", "gender sensitive" journalism "," stereotyping ", as well as in an attempt to investigate in detail functioning of gender-sensitive journalism, identify features formation and destruction of stereotypes by means of journalism. Scope: the materials of the study can be used in the professional activities of television, producers, stereotyping. This work can be useful to public organizations that take care of compliance with gender norms, and can also be used under time to study courses in television journalism, social issues of the media in universities.
Mao, Shao-Rui, and 毛紹睿. "Extracting cost sensitive rule from trained neural network." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/80768234739864999820.
Повний текст джерела國立成功大學
資訊管理研究所
92
Neural network is the technology used in solving data mining problem. Usually , its result has higher accuracy and handle well in noise data ,also the network architecture can present the complex relation between attributes .However its learning result is a black box .User can’t easily understand neural network’s learning result which limit the application of neural networl. This research try to explain the learning result of neural network by extracting rules from trained neural network . The extracting architecture can be used in various kind of neural network model .We put the effect of misclassification cost into consideration during the rule extracting process .The architecture of our research is based on PRISM which is proposed by Cendrowska.We combined the modified PRISM model with Adacost ,Metacost and Information cost function in our model to make the whole extracting architecture can consider the effect of misclassification cost .The architecture proposed in the research will compare the number of extracting rule ,accuracy of ruleset and misclassification cost with REFNE which is proposed by Zhou. The comparison is based on UCI-ML dataset .
Huang, Chin-Ping, and 黃金評. "Locality Sensitive Hashing for Sampling-based Algorithms in Association Rule Mining." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/29623819276817564232.
Повний текст джерела國立臺灣科技大學
資訊工程系
97
Association rule mining is one of the most important techniques for intelligent system design and has been widely applied in a vast number of real applications. However, when the database is too large, classical algorithms cannot reasonably complete in time. The sampling approach that processes a subset of the database is a viable alternative. However, using only a subset of the database makes it impossible to achieve perfectly accurate rule extraction because the statistical property of the sample is most certainly different from that of the original database. One approach to improve the accuracy is to remove “outliers” from an initial simple random sample to obtain a final sample whose statistical property is more similar to that of the original database. In this paper, we propose to apply data clustering techniques to the initial sample before outlier removal is performed on the resulting clusters, so that outliers are removed based on the statistical properties in individual clusters, instead of the initial sample as a whole. However, clustering transactional data with very high dimensions is a difficult problem by itself. We solve this problem by employing locality sensitive hashing (LSH) as a means for data clustering. LSH is used to divide the initial sample into multiple possibly overlapping set of clusters. we evaluate several algorithms based on this strategy, and find that our proposals exhibit better accuracy or execution time, or both, than previous algorithms
Chiang, Chia Ming, and 江家明. "A New Approach for Sensitive Rule Hiding by Considering Side Effects." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/96048877295787722429.
Повний текст джерела國立清華大學
資訊工程學系
91
As the growth of computer technology has been advanced, the amount of data has been increasing with an extremely fast rate. A variety of methods for knowledge discovery and data mining have been developed to help people digest the huge number of data. One of the popular data mining research issues is association rule mining. Based on the techniques for mining association rules, the correlations between data items can be identified. However, the misuses of these methods may bring undesired side effects to the people. Recently, researchers have made great efforts at hiding association rules. In this thesis, we develop a new approach that can hide the sensitive information without generating undesired side effects. Our approach consists of three steps corresponding to three possible problems. At first, we adopt the template concept to identify either the set of modifiable transactions or the set of probably affected association rules. For efficiency, we design indexing facilities for fast retrieval of the required information in the transaction database. Second, among the selected transactions for hiding sensitive rules, we further select the transactions that will not hide any of the non-sensitive rules. At the third step, we examine these selected transactions to avoid generating extra rules. Iteratively, sensitive rules can be hidden and the undesired side effects are avoided. In the experiments, we show the effectiveness of our approach according to the three conditions and analyze the performance of different methods for database modifications. Moreover, the results also show that our proposed approach has perfect scalability to the database size. Specifically, the time of the approach that considers all the three conditions is just a little bit slower than the time of the one that do not consider the two side effects.
Lai, Li-Jin, and 賴俐錦. "A Data Perturbation Method for Association Rule Mining without Disclosure of Sensitive Data." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/70583749232704082538.
Повний текст джерела