Rethinking Concepts of the Dendritic Cell Algorithm for Multiple Data Stream Analysis
نویسنده
چکیده
This paper begins by stating that the underlying concepts of signals and antigen used by the Dendritic Cell Algorithm are too abstract and arbitrary to be of use in real world applications as they stand. To address this, these concepts are more explicitly defined within a specific application area, namely that of data stream analysis. These new definitions are based around the outputs of the Change Point Detecting Subspace Tracker (CD-ST), a recently developed algorithm for detecting key change points across multiple data streams. Preliminary results demonstrate the utility of this new definition for antigen. The paper concludes by laying the theoretical groundwork for a novel anomaly detection framework for use in data streaming applications. The underlying methodology is to perform anomaly detection via the detection and classification of key change points that occur across the multiple data streams monitored.
منابع مشابه
Qabusnama of Persian Architecture: Rethinking the history of making Gunbad-i Qābus
This study aims to investigate the origins, concepts, and symbolic and formal functions of the Gunbad-i Qābus tomb-tower based on interpretation of its inscription. This hermeneutic analysis addresses the historical context of the building formation, rethinking the concepts presented in its ten-piece inscription using philological methods, and compares it with the inscriptions of some other to...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملThe grounded theory qualitative of the managerial behavior components for formulate of model for Iran's higher education system
The present study is accomplished with the aim of identification of the managerial behavior components for formulate of model for Iran's higher education system, in qualitative type and in grounded theory method- Strauss and Corbin's objectivist approach by appling paradigmatic logic. By using theoretical sampling method, 38 participating people in the study who were expert in relation with the...
متن کاملThe grounded theory qualitative of the managerial behavior components for formulate of model for Iran's higher education system
The present study is accomplished with the aim of identification of the managerial behavior components for formulate of model for Iran's higher education system, in qualitative type and in grounded theory method- Strauss and Corbin's objectivist approach by appling paradigmatic logic. By using theoretical sampling method, 38 participating people in the study who were expert in relation with the...
متن کامل