oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 2 )

2019 ( 16 )

2018 ( 14 )

2017 ( 12 )

Custom range...

Search Results: 1 - 10 of 2198 matches for " Kato Mivule "
All listed articles are free for downloading (OA Articles)
Page 1 /2198
Display every page Item
Web Search Query Privacy, an End-User Perspective  [PDF]
Kato Mivule
Journal of Information Security (JIS) , 2017, DOI: 10.4236/jis.2017.81005
Abstract: While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although such capabilities might provide enhanced personalized search results, the confidentiality of user intent remains uncertain. Even with web search query obfuscation techniques, another challenge remains, namely, reusing the same obfuscation methods is problematic, given that search engines have enormous computation and storage resources for query disambiguation. A number of web search query privacy procedures involve the cooperation of the search engine, a non-trusted entity in such cases, making query obfuscation even more challenging. In this study, we provide a review on how search engines work in regards to web search queries and user intent. Secondly, this study reviews material in a manner accessible to those outside computer science with the intent to introduce knowledge of web search engines to enable non-computer scientists to approach web search query privacy innovatively. As a contribution, we identify and highlight areas open for further investigative and innovative research in regards to end-user personalized web search privacy—that is methods that can be executed on the user side without third party involvement such as, search engines. The goal is to motivate future web search obfuscation heuristics that give users control over their personal search privacy.
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
Kato Mivule
Computer Science , 2014,
Abstract: Genomic data provides clinical researchers with vast opportunities to study various patient ailments. Yet the same data contains revealing information, some of which a patient might want to remain concealed. The question then arises: how can an entity transact in full DNA data while concealing certain sensitive pieces of information in the genome sequence, and maintain DNA data utility? As a response to this question, we propose a codon frequency obfuscation heuristic, in which a redistribution of codon frequency values with highly expressed genes is done in the same amino acid group, generating an obfuscated DNA sequence. Our preliminary results show that it might be possible to publish an obfuscated DNA sequence with a desired level of similarity (utility) to the original DNA sequence.
SIED, a Data Privacy Engineering Framework
Kato Mivule
Computer Science , 2013,
Abstract: While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holistic approach to the data privacy engineering procedure by looking at the specifications, implementation, evaluation, and finally, dissemination of the privatized data sets.
Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule
Computer Science , 2013,
Abstract: The internet is increasingly becoming a standard for both the production and consumption of data while at the same time cyber-crime involving the theft of private data is growing. Therefore in efforts to securely transact in data, privacy and security concerns must be taken into account to ensure that the confidentiality of individuals and entities involved is not compromised, and that the data published is compliant to privacy laws. In this paper, we take a look at noise addition as one of the data privacy providing techniques. Our endeavor in this overview is to give a foundational perspective on noise addition data privacy techniques, provide statistical consideration for noise addition techniques and look at the current state of the art in the field, while outlining future areas of research.
Applying Data Privacy Techniques on Tabular Data in Uganda
Kato Mivule,Claude Turner
Computer Science , 2011,
Abstract: The growth of Information Technology(IT) in Africa has led to an increase in the utilization of communication networks for data transaction across the continent. A growing number of entities in the private sector, academia, and government, have deployed the Internet as a medium to transact in data, routinely posting statistical and non statistical data online and thereby making many in Africa increasingly dependent on the Internet for data transactions. In the country of Uganda, exponential growth in data transaction has presented a new challenge: What is the most efficient way to implement data privacy. This article discusses data privacy challenges faced by the country of Uganda and implementation of data privacy techniques for published tabular data. We make the case for data privacy, survey concepts of data privacy, and implementations that could be employed to provide data privacy in Uganda.
An Investigation of Data Privacy and Utility Preservation using KNN Classification as a Gauge
Kato Mivule,Claude Turner
Computer Science , 2013,
Abstract: It is obligatory that organizations by law safeguard the privacy of individuals when handling data sets containing personal identifiable information (PII). Nevertheless, during the process of data privatization, the utility or usefulness of the privatized data diminishes. Yet achieving the optimal balance between data privacy and utility needs has been documented as an NP-hard challenge. In this study, we investigate data privacy and utility preservation using KNN machine learning classification as a gauge.
A Review of Privacy Essentials for Confidential Mobile Data Transactions
Kato Mivule,Claude Turner
Computer Science , 2013,
Abstract: The increasingly rapid use of mobile devices for data transaction around the world has consequently led to a new problem, and that is, how to engage in mobile data transactions while maintaining an acceptable level of data privacy and security. While most mobile devices engage in data transactions through a data cloud or a set of data servers, it is still possible to apply data confidentiality across data servers, and, as such, preserving privacy in any mobile data transaction. Yet still, it is essential that a review of data privacy, data utility, the techniques, and methodologies employed in the data privacy process, is done, as the underlying data privacy principles remain the same. In this paper, as a contribution, we present a review of data privacy essentials that are fundamental in delivering any appropriate analysis and specific methodology implementation for various data privacy needs in mobile data transactions and computation.
A Review of CUDA, MapReduce, and Pthreads Parallel Computing Models
Kato Mivule,Benjamin Harvey,Crystal Cobb,Hoda El Sayed
Computer Science , 2014,
Abstract: The advent of high performance computing (HPC) and graphics processing units (GPU), present an enormous computation resource for Large data transactions (big data) that require parallel processing for robust and prompt data analysis. While a number of HPC frameworks have been proposed, parallel programming models present a number of challenges, for instance, how to fully utilize features in the different programming models to implement and manage parallelism via multi-threading in both CPUs and GPUs. In this paper, we take an overview of three parallel programming models, CUDA, MapReduce, and Pthreads. The goal is to explore literature on the subject and provide a high level view of the features presented in the programming models to assist high performance users with a concise understanding of parallel programming concepts and thus faster implementation of big data projects using high performance computing.
Asymptotic Analysis for Spectral Risk Measures Parameterized by Confidence Level  [PDF]
Takashi Kato
Journal of Mathematical Finance (JMF) , 2018, DOI: 10.4236/jmf.2018.81015
Abstract: We study the asymptotic behavior of the difference \"\" as \"\", where \"\" is a risk measure equipped with a confidence level parameter \"\" , and where X and Y are non-negative random variables whose tail probability functions are regularly varying. The case where is the value-at-risk (VaR) at α, is treated in [1]. This paper investigates the case where \"\" is a spectral risk measure that converges to the worst-case risk measure as \"\" . We give the asymptotic behavior of the difference between the marginal risk contribution \"\" and the Euler contribution \"\" of Y to the portfolio X+Y . Similarly to [1], our results depend primarily on the relative magnitudes of the thicknesses of the tails of X and Y. Especially, we find that \"\" is asymptotically equivalent to the expectation (expected loss) of Y if the tail of Y is sufficiently thinner than that of X. Moreover, we obtain the asymptotic relationship \"\" as \"\", where \"\" is a constant whose value likewise changes according to the relative magnitudes of the thicknesses of the tails of X and Y. We also conducted a numerical experiment, finding that when the tail of X is sufficiently thicker than that of Y, \"\" does not increase monotonically with α and takes a maximum at a confidence level strictly less than 1.
Contribution of CD3 ε Epitope and Oxidative Type of Copper-Zinc Superoxide Dismutase to the Degeneration Processes of Cerebellar Purkinje Cells in Patients with Multiple System Atrophy-Cerebellar Type (MSA-C: Olivopontocerebellar Atrophy, OPCA): An Immunohistochemical Study  [PDF]
Masako Kato, Shinsuke Kato, Kiyota Kato, Kazuhiko Hayashi
World Journal of Neuroscience (WJNS) , 2016, DOI: 10.4236/wjns.2016.64034
Abstract: Objective: This study aimed to investigate the contribution of CD3 epsilon (ε) epitope and oxidative type of copper-zinc superoxide dismutase to the degeneration processes of cerebellar Purkinje cells in patients with Multiple System Atrophy-Cerebellar type (MSA-C). Methods: This retrospective study was carried out on autopsy specimens of 17 patients with sporadic MSA-C and 10 normal individuals. Paraffin sections of autopsied cerebella and pontes were immunostained with polyclonal antibodies against CD3 ε epitope and oxidative modification to cysteine sulfonic acid of cys111 in human copper-zinc superoxide dismutase (Ox-SOD1). With respect to the areas of CD3-ε-epitope expression, the immunohistochemical study and the quantitative statistical analysis between the areas of CD3-ε-epitope expression in the surviving Purkinje cells of MSA-C patients and their disease duration were performed. Results: The cell bodies and dendritic arborization including primary, secondary, and tertiary dendrites of normal Purkinje cells were intensely immunostained by the antibody against CD3 ε epitope. Both the immunohistochemical study and the quantitative statistical analysis revealed that the areas positive for CD3 ε epitope disappeared in the order from tertiary dendrites, secondary dendrites, primary dendrites toward the cell bodies, along with the disease progression. In addition, Glial Cytoplasmic Inclusions (GCIs) and Neuronal Cytoplasmic Inclusions (NCIs) were strongly positive for CD3 ε epitope. The surviving Purkinje cells in MSA-C showed immunostaining by the anti-Ox-SOD1 antibody, although normal Purkinje cells did not. Conclusion: Based on the oxidative stress that the surviving Purkinje cells
Page 1 /2198
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.