Cooperative Methodology to Generate a New Scheme for Cryptography

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 503

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICTCK03_051

تاریخ نمایه سازی: 10 تیر 1396

چکیده مقاله:

In this paper, a novel method named as Frequency Pattern-Knowledge Constructions (FP-KC) is developed. This method attempts to develop Frequency Pattern (FP) Growth data mining algorithm using several knowledge constructions to find the association rules and minimize the shared information ( i.e. fined frequent item set), FP-KC combines the criteria of Principal Component Analysis (PCA) with FP-Growth techniques. These criteria include eigenvalues, cumulative variability and scree plot. There are several reasons for developing the FP-Growth data mining algorithm to build up a novel FP-KC technique that can find the association rules, including: (a) the size of an FP-tree is typically smaller than the size of the uncompressed data because many records in a dataset often have a few items (b) to give the best result in the case that all the records have the same set of items; (c) FP-Growth is an efficient algorithm because it illustrates how a compact representation of the transaction dataset helps to efficiently generate frequent item sets; and (d) The run-time performance of FP-Growth depends on the compaction factor of the dataset, while the enhanced algorithm in Subliminal Channel (SC) depends on both the position of a character in the alphabet and its position in the plain rule word (i.e. rules resulting from association rules FP-KC), with a specific function to determine the cipher rule character. To evaluate the efficiency of the proposed method, four case studies were used. Based on the results, the proposed method can be considered as an efficient technique for secure mining of association rules of partitioned data compared with the traditional method.

کلیدواژه ها:

Data Mining – Subliminal Cryptography – Association Rules ، Constructions ، Principle Component Analysis

نویسندگان

Samaher Al-Janabi

Department of Computer Science, Faculty of Science for Women (SCIW), University of Babylon, Babylon, Iraq

Ibrahim Al-Shourbaji

Computer Network Department, Computer Science and Information System College University of Jazan, Saudi Arabia

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • _ _ Al-Shonurhaii. I. (20161 A _ of Cvber ...
  • _ Awarenesss in _ Fn vironment in the _ _ ...
  • Iain. .). Khatri.P. Soni. R. Charasia. 9. K (2012 1Hilin ...
  • sensitive askociation rlek withont alterins the snnnort of «ensitive iterm ...
  • I .. H. Ma. Y. 7hans. F. ! i. M. ...
  • Design (CSCWD), pp. 265 -270 ...
  • C ommunication and Knowledge (ICTCK), pp. 1-8. ...
  • نمایش کامل مراجع