First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)最新文献

筛选
英文 中文
Forecasting the Impact of the Irregular Events with DIPA Methodology 用DIPA方法预测不规则事件的影响
Jinrong Zhu
{"title":"Forecasting the Impact of the Irregular Events with DIPA Methodology","authors":"Jinrong Zhu","doi":"10.1109/WKDD.2008.43","DOIUrl":"https://doi.org/10.1109/WKDD.2008.43","url":null,"abstract":"The impact of the irregular events on oil futures markets is so great that it is even superior to the variation tendency of the time series itself. In order to forecast the influence of the irregular events on oil futures price, based on the thorough analysis of the impact process of irregular events in oil futures markets, four concepts, which include direction, intensity, persistence and attenuation model, are introduced. Then a methodology called DIPA is proposed for events impact analysis in this paper. Empirical research shows the presented method can forecast the impact of irregular events on oil futures markets more preferably.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network Security Situation Assessment Based on Data Fusion 基于数据融合的网络安全态势评估
Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu
{"title":"Network Security Situation Assessment Based on Data Fusion","authors":"Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu","doi":"10.1109/WKDD.2008.35","DOIUrl":"https://doi.org/10.1109/WKDD.2008.35","url":null,"abstract":"Network security situation assessment can project the next behavior of the network by describing the current state. Security events from IDS, firewall, and other security tools are currently growing at a rapid pace. However, most intrusion event researches focus on IDS alerts, overlooking other intrusion evidence from other security tools, or they make simple integration of various security tools not inflecting the whole network state. In this paper, we described network security from the view of system. First, network situation elements are analyzed. Second, we research their correlations and present system architecture of network security situation. Third, multi-sensor correlation algorithms are analyzed that colored Petri net is used for describing the changing of system state after arrival of new events and D-S theory of evidence is used for combining the different evidence. Then, we report the experimental results on the DARPA 2000 DDoS attack scenarios and analyze them. At last, we conclude our work and present next research goal.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127611386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Association Rule Analysis of Spatial Data Mining Based on Matlab-A Case of Ancheng Township in China 基于matlab的空间数据挖掘关联规则分析——以安城乡为例
Xin-qi Zheng, Lu Zhao
{"title":"Association Rule Analysis of Spatial Data Mining Based on Matlab-A Case of Ancheng Township in China","authors":"Xin-qi Zheng, Lu Zhao","doi":"10.1109/WKDD.2008.21","DOIUrl":"https://doi.org/10.1109/WKDD.2008.21","url":null,"abstract":"Though there are many methods for spatial data mining, it is also a desirable problem that how to carry out this operation fast. Matlab is called full-purpose calculation paper. And it has certain advantage in carrying out data mining because of its powerful matrix calculation function. According to the association rule method of data mining, spatial data of land use and slope was processed and extracted on Geographic Information System (GIS) at first, and data mining was performed by the program, which was wrote in M-language of Matlab. The study area was Ancheng township in Shandong province of China. The confidence and the support between different land use types and slope levels were mined, and the association rules were set up. Through the empirical study, it has been proved that this study method is feasible and the conclusion can provide instruction for local land use planning.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ensemble Model of Intelligent Paradigms for Stock Market Forecasting 股票市场预测智能范式的集成模型
Qiang Wu, Yuehui Chen, Z. Liu
{"title":"Ensemble Model of Intelligent Paradigms for Stock Market Forecasting","authors":"Qiang Wu, Yuehui Chen, Z. Liu","doi":"10.1109/WKDD.2008.54","DOIUrl":"https://doi.org/10.1109/WKDD.2008.54","url":null,"abstract":"The use of intelligent systems for stock market predictions has been widely established. This paper introduces a ensemble model of SVM and ANNs for the prediction of three stock indices. The performance of this model is then compared with support vector machine model and an artificial neural network respectively. Empirical results reveal that the ensemble result obtain the best results.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Multi-Subpopulation Accelerating Particle Swarm Optimization 多亚种群加速粒子群优化
Yi Jiang
{"title":"A Multi-Subpopulation Accelerating Particle Swarm Optimization","authors":"Yi Jiang","doi":"10.1109/WKDD.2008.69","DOIUrl":"https://doi.org/10.1109/WKDD.2008.69","url":null,"abstract":"The particle swarm optimization is a stochastic, population-based optimization technique that can be applied to a wide range of problems. A multi- subpopulation accelerating particle swarm optimization(MAPSO)is proposed to improve the performance of the original algorithm. MAPSO views the excellent individuals as attractors and generates local small populations in the neighbor of them to maintain the diversity of the population. In the course of searching, MAPSO constantly shrinks the searching neighbor and uses the accelerating operators to speed up the evolution of MAPSO. Finally, MAPSO's efficiency is validated through optimization of benchmark functions.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Individuation and Construction of Web Courses 网络课程的个性化与构建
Zhonghua Wang, Yan Yu, Yifeng Wang, Lulu Chen, Shumei Gong
{"title":"Individuation and Construction of Web Courses","authors":"Zhonghua Wang, Yan Yu, Yifeng Wang, Lulu Chen, Shumei Gong","doi":"10.1109/WKDD.2008.143","DOIUrl":"https://doi.org/10.1109/WKDD.2008.143","url":null,"abstract":"Web-based education encouraged learner-centered, individualized study way. After analyzing the individualization situation of the web course in our country, aiming at the problem of the common deficiency of individualization in web course, combining with the Chinese E-Learning Technology Standard(CELTS) ,this paper constructed the systematic frame of the learner-based web course, and primarily debated how to realize the individualization of web course based on the learners' characteristics, and also it's advantage.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Information Technology Security in the Financial Industry 金融行业信息技术安全研究
Xiao Bin
{"title":"Research of Information Technology Security in the Financial Industry","authors":"Xiao Bin","doi":"10.1109/WKDD.2008.55","DOIUrl":"https://doi.org/10.1109/WKDD.2008.55","url":null,"abstract":"After describing the security condition of the information technology in financial industries, this paper systematically summarizes its basic influence elements on basis of introducing the concept of information technology risks in financial industries, and analyzes relationship of information technology risk factors. Finally, in view of these existence risk factors, guidelines for managing information technology risks in financial industries have been proposed.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Emotional Recognition in Intelligent Tutoring System 情绪识别在智能辅导系统中的应用
Yanwen Wu, W. Liu, Jianbo Wang
{"title":"Application of Emotional Recognition in Intelligent Tutoring System","authors":"Yanwen Wu, W. Liu, Jianbo Wang","doi":"10.1109/WKDD.2008.141","DOIUrl":"https://doi.org/10.1109/WKDD.2008.141","url":null,"abstract":"To meet the emotional need in traditional intelligent tutoring system (ITS), an intelligent tutoring system model based on emotional recognition technique was proposed in the paper. This model was added the emotional recognition module on the model of traditional intelligent tutoring system. The model of tutoring system based on emotional recognition was constructed with facial expression recognition and text recognition techniques, which can get, recognize and analyze emotional information of students' learning performance, then implement emotional stimulation and emotional tutoring according to different students' learning emotion.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Filtering Short Message Spam of Group Sending Using CAPTCHA 使用CAPTCHA过滤群发垃圾短信
Peizhou He, Yong Sun, Wei Zheng, X. Wen
{"title":"Filtering Short Message Spam of Group Sending Using CAPTCHA","authors":"Peizhou He, Yong Sun, Wei Zheng, X. Wen","doi":"10.1109/WKDD.2008.131","DOIUrl":"https://doi.org/10.1109/WKDD.2008.131","url":null,"abstract":"Short message spam brings so much trouble to the users, and the volume of short message spam becomes more and more large, especially the function of group sending is used in short message. This paper proposes a method to filter short message spam of group sending, in other words, it utilizes CAPTCHA (completely automated public Turing test to tell computers and human apart) method to filter short message spam. If the short message service (SMS) can pass the CAPTCHA, it will be identified as legitimate SMS and transmitted by Short Message processing Center. Conversely, if the SMS can not pass the CAPTCHA, it will be identified as SMS spam and deleted by Short Message processing Center. Finally, it has been simulated with Smartphone of Microsoft Visual Studio 2005.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
The Application and Research of Ontology Construction Technology 本体构建技术的应用与研究
Wenwen Yi, Yong Sun, Shukui Zhang, Yingfeng Wu, Z. Chu
{"title":"The Application and Research of Ontology Construction Technology","authors":"Wenwen Yi, Yong Sun, Shukui Zhang, Yingfeng Wu, Z. Chu","doi":"10.1109/WKDD.2008.108","DOIUrl":"https://doi.org/10.1109/WKDD.2008.108","url":null,"abstract":"In the field of search, the application of ontology is an important research topic. Introduction of ontology technology in the retrieval system with massive data can make the searching results more comprehensive. However, now days the ontology is constructed by domain experts, and there are a lot of shortcomings, such as complex process, long time for the project, and difficulty to update. Thereby, in this paper, a method of semiautomaticly building ontology is proposed, after synthetically analyzing a variety of methods and techniques about it. The building process which is based on user interests, mines not only the concepts but also the potential relationships between concepts from the texts by the method of concepts clustering. On the basis of such research, an unique patent information retrieval system based on ontology has been completed.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信