Rethinking Concepts of the Dendritic Cell Algorithm for Multiple Data Stream Analysis

نویسنده

  • Chris J. Musselle
چکیده

This paper begins by stating that the underlying concepts of signals and antigen used by the Dendritic Cell Algorithm are too abstract and arbitrary to be of use in real world applications as they stand. To address this, these concepts are more explicitly defined within a specific application area, namely that of data stream analysis. These new definitions are based around the outputs of the Change Point Detecting Subspace Tracker (CD-ST), a recently developed algorithm for detecting key change points across multiple data streams. Preliminary results demonstrate the utility of this new definition for antigen. The paper concludes by laying the theoretical groundwork for a novel anomaly detection framework for use in data streaming applications. The underlying methodology is to perform anomaly detection via the detection and classification of key change points that occur across the multiple data streams monitored.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Qabusnama of Persian Architecture: Rethinking the history of making Gunbad-i Qābus

This study aims to investigate the origins, concepts, and symbolic and formal functions of the Gunbad-i Qābus tomb-tower based on interpretation of its inscription.  This hermeneutic analysis addresses the historical context of the building formation, rethinking the concepts presented in its ten-piece inscription using philological methods, and compares it with the inscriptions of some other to...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

The grounded theory qualitative of the managerial behavior components for formulate of model for Iran's higher education system

The present study is accomplished with the aim of identification of the managerial behavior components for formulate of model for Iran's higher education system, in qualitative type and in grounded theory method- Strauss and Corbin's objectivist approach by appling paradigmatic logic. By using theoretical sampling method, 38 participating people in the study who were expert in relation with the...

متن کامل

The grounded theory qualitative of the managerial behavior components for formulate of model for Iran's higher education system

The present study is accomplished with the aim of identification of the managerial behavior components for formulate of model for Iran's higher education system, in qualitative type and in grounded theory method- Strauss and Corbin's objectivist approach by appling paradigmatic logic. By using theoretical sampling method, 38 participating people in the study who were expert in relation with the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012