{"title":"Dublin Core-Based Metadata Extracting Algorithm from RDF-Based Information Elements","authors":"Hongbin Wang, Daxin Liu, Wei Sun","doi":"10.1109/WKDD.2008.113","DOIUrl":"https://doi.org/10.1109/WKDD.2008.113","url":null,"abstract":"The semantic Web and semantic Web technologies offer us a new approach to managing information and processes, the fundamental principle of which is the creation and use of semantic metadata. A Dublin core-based metadata extracting algorithm from RDF-based information elements is proposed in this paper. The rule library is designed in the paper after introducing the semantic rules. The system named IDPMS (integration design platform management system) based on the above-mentioned algorithm is developed, which can perform automatic Dublin core-based metadata extracting algorithm from information elements which is described by RDF documents. The Dublin core-based metadata extracting algorithm from RDF-based information elements is described in this paper. The experiment is analyzed in the end.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133214253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Internet Traffic Forecasting Model Adopting Radical Based on Function Neural Network Optimized by Genetic Algorithm","authors":"Cong Wang, Xiaoxia Zhang, Han Yan, Linlin Zheng","doi":"10.1109/WKDD.2008.13","DOIUrl":"https://doi.org/10.1109/WKDD.2008.13","url":null,"abstract":"Traditional traffic forecasting model is hard to show non-linear characteristic of Internet. Neural networks and genetic algorithm are representatives of modern algorithms. Considering that BP neural networks model is easy to take local convergence, this paper put forward genetic algorithm optimizing weight and bias value of radial based function network(GA-RBF), made a Internet traffic forecasting model which is relative with p steps and ahead of l steps, overcame the limitations of traditional forecasting algorithm model and BP neural networks algorithm. To prove the effectiveness and rationality of this algorithm, we forecasted the China education network main port traffic with GA-RBF neural networks. According to the analysis, we find that the GA-RBF forecasting effect is obviously better than BP neural networks. The conclusion shows that it is one of available and effective ways to use GA-RBF artificial neural networks to do Internet traffic forecast.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131238582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Personal Credit Evaluation System of Commercial Banks","authors":"L. Yuanyuan","doi":"10.1109/WKDD.2008.147","DOIUrl":"https://doi.org/10.1109/WKDD.2008.147","url":null,"abstract":"Based on the analysis of personal credit evaluation index systems in and out of China, this paper establishes personal credit evaluation index system of commercial banks suitable for China, which can be divided into three parts: Personal indices, economy indices and credit indices; and this paper builds personal credit synthetic evaluation model based on GEM algorithm to better make use of experts' experiences and wisdom, and to overcome the inconsistency of experts' evaluation results. This evaluation system provides references for commercial banks to make customer loan decisions.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Researches on Diffusion Model of MNCs' Distributed Innovation","authors":"Gao Xiao-qin, Liu Guo-xin","doi":"10.1109/WKDD.2008.115","DOIUrl":"https://doi.org/10.1109/WKDD.2008.115","url":null,"abstract":"Along with globalization and fast development of knowledge economy and informatization, many MNCs and large enterprises explore and practice distributed innovation actively beside their global production and operation. This article discusses about the model and law of development of distributed innovation diffusion, as well as showing the dynamic characteristics of distributed innovation diffusion. Meanwhile, the above diffusion model is used to research RP technique, and set up RP technical diffusion model, whose popularization state can be anticipated, thus provides a reference for the popularization and application of RP technique in our China.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Approach to Recognition of Lane Marking and Road Boundary","authors":"Weina Lu, Yucai Zheng, Yuquan Ma, Tao Liu","doi":"10.1109/WKDD.2008.119","DOIUrl":"https://doi.org/10.1109/WKDD.2008.119","url":null,"abstract":"An integrated vision method was proposed for intelligent vehicles to synchronously recognize the lane marking and road boundary in direct or curve road environment. Firstly, with region connectivity analyzing, the method extracted the brightness features of lane markings on input images by self-adaptive threshold segmenting. Not only the gradient magnitude but also the gradient direction features of the road boundary were extracted by the Sobel operator method. Secondly, the 2-D models of road shape were acquired and the features above were matched to them by least-squares fit. With the circular calling of detecting and tracking program block, the whole process showed a fast and exact capability. The experiments have been conducted with the videos captured from real road scenes, and the results proved that it is a real time and robust method to recognize the road for the vision-based navigation of intelligent vehicles.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progressive Image Transmission over Memoryless Feedback Channels Using Joint Source-Channel Coding Strategy","authors":"Xunfeng Yu, Dawei Ma","doi":"10.1109/WKDD.2008.150","DOIUrl":"https://doi.org/10.1109/WKDD.2008.150","url":null,"abstract":"In this paper, we consider the problem of joint source-channel coding for image progressive transmitted over channels with feedback. Feedback routes are provided in many existing standard wireless channels, making rate allocation with feedback a problem of considerable practical importance. We address the question of rate allocation between the source and channel codes in the forward channel, in the presence of feedback information and under a distortion cost function. We show that the presence of feedback shifts the optimal rate allocation point, resulting higher rates for error-correcting codes and smaller overall distortion. Simulations on memoryless channels show that the presence of feedback allows up to about 1.5 dB improvement in PSNR compared to the similarly optimized feedforward scheme.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121381739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Piecewise Hashing Method for Computer Forensics","authors":"Long Chen, Guoyin Wang","doi":"10.1109/WKDD.2008.80","DOIUrl":"https://doi.org/10.1109/WKDD.2008.80","url":null,"abstract":"Hashing, a basic tool in computer forensics, is used to ensure data integrity and to identify known data objects efficiently. Unfortunately, intentional tiny modified file can not be identified using this traditional technique. Context triggered piecewise hashing separates a file into pieces using local context characteristic, and produces a hash sequence as a hash signature. The hash signature can be used to identify similar files with tiny modifications such as insertion, replacement and deletion. The algorithm of currently available scheme is designed for junk mail detection, which is low efficient and not suitable for file system investigation. In this paper, an improved algorithm based on the Store-Hash and Rehash idea is developed for context triggered piecewise hashing technique. Experiment results show that the performance of speed and the ability of similarity detection of the new scheme are better than that of spamsum. It is valuable for forensics practice.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on WEB Cache Prediction Recommend Mechanism Based on Usage Pattern","authors":"Lin Jianhui, H. Tianshu, Yang Chao","doi":"10.1109/WKDD.2008.9","DOIUrl":"https://doi.org/10.1109/WKDD.2008.9","url":null,"abstract":"Cache prefetching technique can improve the hit ratio and expedite users visiting speed. After analyzed the recommend system in e-business, this paper studied the characteristics how user visit Web page and proposed a Web prefetching recommender system based on usage pattern. This system cluster user behavior through an improved ant colony algorithm, then usage pattern can be abstracted from these classes through sequence mining. These sequence patterns are applied to forecast the coming behavior of users thus improve the hit ratio of system. Experiment result proves the validity of the system.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Architecture of Tacit Knowledge Transfer Based on Ontology","authors":"Can Chen, Zhanhong Xin","doi":"10.1109/WKDD.2008.103","DOIUrl":"https://doi.org/10.1109/WKDD.2008.103","url":null,"abstract":"Tacit knowledge transfer has been the core of knowledge management all long. On the basis of reviewing on the existing literatures about knowledge transfer, this paper, stating from ontology, proposes an ontology-based architecture of tacit knowledge transfer which enable efficient reuse and sharing of tacit knowledge. The architecture is composed by the acquisition module, the delivery module, and the inference module. Then we give respective explanation of the primary function of each module. This paper also proposes an example of the mobile telephone fault diagnosis and repair implementing the architecture.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Guo, G. Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng
{"title":"Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model","authors":"R. Guo, G. Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng","doi":"10.1109/WKDD.2008.62","DOIUrl":"https://doi.org/10.1109/WKDD.2008.62","url":null,"abstract":"In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of bots that should blocked by defender. A differential games model is used to determine how a defender combats an attacker and protect the servers. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126308160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}