Information Fusion
High Dimensional Data Fusion via Joint Manifold Learning
Davenport, Mark A. (Stanford University) | Hegde, Chinmay (Rice University) | Duarte, Marco F. (Princeton University) | Baraniuk, Richard G. (Rice University)
The emergence of low-cost sensing architectures for diverse modalities has made it possible to deploy sensor networks that acquire large amounts of very high-dimensional data. To cope with such a data deluge, manifold models are often developed that provide a powerful theoretical and algorithmic framework for capturing the intrinsic structure of data governed by a low-dimensional set of parameters. However, these models do not typically take into account dependencies among multiple sensors. We thus propose a new joint manifold framework for data ensembles that exploits such dependencies. We show that joint manifold structure can lead to improved performance for manifold learning. Additionally, we leverage recent results concerning random projections of manifolds to formulate a universal, network-scalable dimensionality reduction scheme that efficiently fuses the data from all sensors.
Detection of Anomaly Trends in Dynamically Evolving Systems
Rabin, Neta (Yale University) | Averbuch, Amir (Tel Aviv University)
We propose a learning framework, which is based on diffusionmethodology, that performs data fusion and anomalydetection in multi-dimensional time series data. Real lifeapplications and processes usually contain a large numberof sensors that generate parameters (features), where eachsensor collects partial information about the running process.These input sensors are fused to describe the behaviorof the whole process. The proposed data fusing algorithmis done in an hierarchial fashion: first it re-scales the inputsensors. Then, the re-formulated inputs are fused togetherby the application of the diffusion maps to reveal the nonlinearrelationships among them. This process constructsby embedding a low-dimensional description of the system.The embedding separates between sensors (parameters) thatcause stable and instable behavior of the system.This unsupervised algorithm first studies the systemโsprofile from a training dataset by reducing its dimensions.Then, the coordinates of newly arrived data points are determinedby the application of multi-scale Gaussian approximation.To achieve this, an hierarchial processing of theincoming data is introduced.
Ontological Reasoning with F-logic Lite and its Extensions
Cali, Andrea (University of Oxford) | Gottlob, Georg (University of Oxford) | Kifer, Michael (SUNY Stony Brook) | Lukasiewicz, Thomas (University of Oxford) | Pieris, Andreas (University of Oxford)
Answering queries posed over knowledge bases is a central problem in knowledge representation and database theory. In the database area, checking query containment is an important query optimization and schema integration technique. In knowledge representation it has been used for object classification, schema integration, service discovery, and more. In the presence of a knowledge base, the problem of query containment is strictly related to that of query answering; indeed, the two are reducible to each other; we focus on the latter, and our results immediately extend to the former.
Ambulatory Energy Expenditure Estimation: A Machine Learning Approach
Shahabdeen, Junaith Ahemed (Intel Corporation) | Baxi, Amit | Nachman, Lama
This paper presents a machine learning approach for accurate estimation of energy expenditure using a fusion of accelerometer and heart rate sensing. To address short comings in existing off-the-shelf solutions, we designed Jog Falls, an end to end system for weight management in collaboration with physicians in India. This system is meant to enable people to accurately monitor their energy expenditure and intake and make educated tradeoffs to reach their weight goals. In this paper we describe the sensing components of Jog Falls and focus on the energy expenditure estimation algorithm. We present results from controlled experiments in the lab, as well results from a 15 participant user study over a period of 63 days. We show how our algorithm mitigates many of the issues in existing solutions and yields more accurate results.
Improving Iris Recognition Accuracy By Score Based Fusion Method
Gawande, Ujwalla, Zaveri, Mukesh, Kapur, Avichal
Iris recognition technology, used to identify individuals by photographing the iris of their eye, has become popular in security applications because of its ease of use, accuracy, and safety in controlling access to high-security areas. Fusion of multiple algorithms for biometric verification performance improvement has received considerable attention. The proposed method combines the zero-crossing 1 D wavelet Euler number, and genetic algorithm based for feature extraction. The output from these three algorithms is normalized and their score are fused to decide whether the user is genuine or imposter. This new strategies is discussed in this paper, in order to compute a multimodal combined score.
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
Greensmith, Julie, Feyereisl, Jan, Aickelin, Uwe
The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation which results in a 'context aware' detection system. Previous applications of the DCA have included the detection of potentially malicious port scanning activity, where it has produced high rates of true positives and low rates of false positives. In this work we aim to compare the performance of the DCA and of a Self-Organizing Map (SOM) when applied to the detection of SYN port scans, through experimental analysis. A SOM is an ideal candidate for comparison as it shares similarities with the DCA in terms of the data fusion method employed. It is shown that the results of the two systems are comparable, and both produce false positives for the same processes. This shows that the DCA can produce anomaly detection results to the same standard as an established technique.
Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering
Abu-Nimeh, Saeed (Websense Security Labs) | Mead, Nancy (Carnegie Mellon University)
Functional or end user requirements are the tasks that the system - Protection and control of consolidated data under development is expected to perform. However, nonfunctional - Data retrieval requirements are the qualities that the system is - Equitable treatment of users to adhere to. Functional requirements are not as difficult - Data retention and disposal to tackle, as it is easier to test their implementation in the - User monitoring and protection against unauthorized system under development. Security and privacy requirements monitoring are considered nonfunctional requirements, although in many instances they do have functionality. To identify Several laws and regulations provide a set of guidelines privacy risks early in the design process, privacy requirements that can be used to assess privacy risks. For example, engineering is used (Chiasera et al. 2008). However, the Health Insurance Portability and Accountability Act unlike security requirements engineering, little attention is (HIPAA) addresses privacy concerns of health information paid to privacy requirements engineering, thus it is less mature systems by enforcing data exchange standards.
Data Integration: The Relational Logic Approach
This book is an introduction to the problem of data integration and a rigorous account of one of the leading approaches to solving this problem, viz., the relational logic approach. Relational logic provides a theoretical framework for discussing data integration. Moreover, in many important cases, it provides algorithms for solving the problem in a computationally practical way. ISBN 9781598297416, 97 pages.
Information Fusion in the Immune System
Twycross, Jamie, Aickelin, Uwe
Biologically-inspired methods such as evolutionary algorithms and neural networks are proving useful in the field of information fusion. Artificial Immune Systems (AISs) are a biologically-inspired approach which take inspiration from the biological immune system. Interestingly, recent research has show how AISs which use multi-level information sources as input data can be used to build effective algorithms for real time computer intrusion detection. This research is based on biological information fusion mechanisms used by the human immune system and as such might be of interest to the information fusion community. The aim of this paper is to present a summary of some of the biological information fusion mechanisms seen in the human immune system, and of how these mechanisms have been implemented as AISs