{"title":"Forecasting the Impact of the Irregular Events with DIPA Methodology","authors":"Jinrong Zhu","doi":"10.1109/WKDD.2008.43","DOIUrl":"https://doi.org/10.1109/WKDD.2008.43","url":null,"abstract":"The impact of the irregular events on oil futures markets is so great that it is even superior to the variation tendency of the time series itself. In order to forecast the influence of the irregular events on oil futures price, based on the thorough analysis of the impact process of irregular events in oil futures markets, four concepts, which include direction, intensity, persistence and attenuation model, are introduced. Then a methodology called DIPA is proposed for events impact analysis in this paper. Empirical research shows the presented method can forecast the impact of irregular events on oil futures markets more preferably.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Security Situation Assessment Based on Data Fusion","authors":"Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu","doi":"10.1109/WKDD.2008.35","DOIUrl":"https://doi.org/10.1109/WKDD.2008.35","url":null,"abstract":"Network security situation assessment can project the next behavior of the network by describing the current state. Security events from IDS, firewall, and other security tools are currently growing at a rapid pace. However, most intrusion event researches focus on IDS alerts, overlooking other intrusion evidence from other security tools, or they make simple integration of various security tools not inflecting the whole network state. In this paper, we described network security from the view of system. First, network situation elements are analyzed. Second, we research their correlations and present system architecture of network security situation. Third, multi-sensor correlation algorithms are analyzed that colored Petri net is used for describing the changing of system state after arrival of new events and D-S theory of evidence is used for combining the different evidence. Then, we report the experimental results on the DARPA 2000 DDoS attack scenarios and analyze them. At last, we conclude our work and present next research goal.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127611386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Association Rule Analysis of Spatial Data Mining Based on Matlab-A Case of Ancheng Township in China","authors":"Xin-qi Zheng, Lu Zhao","doi":"10.1109/WKDD.2008.21","DOIUrl":"https://doi.org/10.1109/WKDD.2008.21","url":null,"abstract":"Though there are many methods for spatial data mining, it is also a desirable problem that how to carry out this operation fast. Matlab is called full-purpose calculation paper. And it has certain advantage in carrying out data mining because of its powerful matrix calculation function. According to the association rule method of data mining, spatial data of land use and slope was processed and extracted on Geographic Information System (GIS) at first, and data mining was performed by the program, which was wrote in M-language of Matlab. The study area was Ancheng township in Shandong province of China. The confidence and the support between different land use types and slope levels were mined, and the association rules were set up. Through the empirical study, it has been proved that this study method is feasible and the conclusion can provide instruction for local land use planning.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Model of Intelligent Paradigms for Stock Market Forecasting","authors":"Qiang Wu, Yuehui Chen, Z. Liu","doi":"10.1109/WKDD.2008.54","DOIUrl":"https://doi.org/10.1109/WKDD.2008.54","url":null,"abstract":"The use of intelligent systems for stock market predictions has been widely established. This paper introduces a ensemble model of SVM and ANNs for the prediction of three stock indices. The performance of this model is then compared with support vector machine model and an artificial neural network respectively. Empirical results reveal that the ensemble result obtain the best results.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Subpopulation Accelerating Particle Swarm Optimization","authors":"Yi Jiang","doi":"10.1109/WKDD.2008.69","DOIUrl":"https://doi.org/10.1109/WKDD.2008.69","url":null,"abstract":"The particle swarm optimization is a stochastic, population-based optimization technique that can be applied to a wide range of problems. A multi- subpopulation accelerating particle swarm optimization(MAPSO)is proposed to improve the performance of the original algorithm. MAPSO views the excellent individuals as attractors and generates local small populations in the neighbor of them to maintain the diversity of the population. In the course of searching, MAPSO constantly shrinks the searching neighbor and uses the accelerating operators to speed up the evolution of MAPSO. Finally, MAPSO's efficiency is validated through optimization of benchmark functions.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhonghua Wang, Yan Yu, Yifeng Wang, Lulu Chen, Shumei Gong
{"title":"Individuation and Construction of Web Courses","authors":"Zhonghua Wang, Yan Yu, Yifeng Wang, Lulu Chen, Shumei Gong","doi":"10.1109/WKDD.2008.143","DOIUrl":"https://doi.org/10.1109/WKDD.2008.143","url":null,"abstract":"Web-based education encouraged learner-centered, individualized study way. After analyzing the individualization situation of the web course in our country, aiming at the problem of the common deficiency of individualization in web course, combining with the Chinese E-Learning Technology Standard(CELTS) ,this paper constructed the systematic frame of the learner-based web course, and primarily debated how to realize the individualization of web course based on the learners' characteristics, and also it's advantage.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Information Technology Security in the Financial Industry","authors":"Xiao Bin","doi":"10.1109/WKDD.2008.55","DOIUrl":"https://doi.org/10.1109/WKDD.2008.55","url":null,"abstract":"After describing the security condition of the information technology in financial industries, this paper systematically summarizes its basic influence elements on basis of introducing the concept of information technology risks in financial industries, and analyzes relationship of information technology risk factors. Finally, in view of these existence risk factors, guidelines for managing information technology risks in financial industries have been proposed.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Emotional Recognition in Intelligent Tutoring System","authors":"Yanwen Wu, W. Liu, Jianbo Wang","doi":"10.1109/WKDD.2008.141","DOIUrl":"https://doi.org/10.1109/WKDD.2008.141","url":null,"abstract":"To meet the emotional need in traditional intelligent tutoring system (ITS), an intelligent tutoring system model based on emotional recognition technique was proposed in the paper. This model was added the emotional recognition module on the model of traditional intelligent tutoring system. The model of tutoring system based on emotional recognition was constructed with facial expression recognition and text recognition techniques, which can get, recognize and analyze emotional information of students' learning performance, then implement emotional stimulation and emotional tutoring according to different students' learning emotion.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering Short Message Spam of Group Sending Using CAPTCHA","authors":"Peizhou He, Yong Sun, Wei Zheng, X. Wen","doi":"10.1109/WKDD.2008.131","DOIUrl":"https://doi.org/10.1109/WKDD.2008.131","url":null,"abstract":"Short message spam brings so much trouble to the users, and the volume of short message spam becomes more and more large, especially the function of group sending is used in short message. This paper proposes a method to filter short message spam of group sending, in other words, it utilizes CAPTCHA (completely automated public Turing test to tell computers and human apart) method to filter short message spam. If the short message service (SMS) can pass the CAPTCHA, it will be identified as legitimate SMS and transmitted by Short Message processing Center. Conversely, if the SMS can not pass the CAPTCHA, it will be identified as SMS spam and deleted by Short Message processing Center. Finally, it has been simulated with Smartphone of Microsoft Visual Studio 2005.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenwen Yi, Yong Sun, Shukui Zhang, Yingfeng Wu, Z. Chu
{"title":"The Application and Research of Ontology Construction Technology","authors":"Wenwen Yi, Yong Sun, Shukui Zhang, Yingfeng Wu, Z. Chu","doi":"10.1109/WKDD.2008.108","DOIUrl":"https://doi.org/10.1109/WKDD.2008.108","url":null,"abstract":"In the field of search, the application of ontology is an important research topic. Introduction of ontology technology in the retrieval system with massive data can make the searching results more comprehensive. However, now days the ontology is constructed by domain experts, and there are a lot of shortcomings, such as complex process, long time for the project, and difficulty to update. Thereby, in this paper, a method of semiautomaticly building ontology is proposed, after synthetically analyzing a variety of methods and techniques about it. The building process which is based on user interests, mines not only the concepts but also the potential relationships between concepts from the texts by the method of concepts clustering. On the basis of such research, an unique patent information retrieval system based on ontology has been completed.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}