First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)最新文献

筛选
英文 中文
Dublin Core-Based Metadata Extracting Algorithm from RDF-Based Information Elements 基于都柏林核的rdf信息元数据提取算法
Hongbin Wang, Daxin Liu, Wei Sun
{"title":"Dublin Core-Based Metadata Extracting Algorithm from RDF-Based Information Elements","authors":"Hongbin Wang, Daxin Liu, Wei Sun","doi":"10.1109/WKDD.2008.113","DOIUrl":"https://doi.org/10.1109/WKDD.2008.113","url":null,"abstract":"The semantic Web and semantic Web technologies offer us a new approach to managing information and processes, the fundamental principle of which is the creation and use of semantic metadata. A Dublin core-based metadata extracting algorithm from RDF-based information elements is proposed in this paper. The rule library is designed in the paper after introducing the semantic rules. The system named IDPMS (integration design platform management system) based on the above-mentioned algorithm is developed, which can perform automatic Dublin core-based metadata extracting algorithm from information elements which is described by RDF documents. The Dublin core-based metadata extracting algorithm from RDF-based information elements is described in this paper. The experiment is analyzed in the end.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133214253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Internet Traffic Forecasting Model Adopting Radical Based on Function Neural Network Optimized by Genetic Algorithm 基于遗传算法优化的基于函数神经网络的径向网络流量预测模型
Cong Wang, Xiaoxia Zhang, Han Yan, Linlin Zheng
{"title":"An Internet Traffic Forecasting Model Adopting Radical Based on Function Neural Network Optimized by Genetic Algorithm","authors":"Cong Wang, Xiaoxia Zhang, Han Yan, Linlin Zheng","doi":"10.1109/WKDD.2008.13","DOIUrl":"https://doi.org/10.1109/WKDD.2008.13","url":null,"abstract":"Traditional traffic forecasting model is hard to show non-linear characteristic of Internet. Neural networks and genetic algorithm are representatives of modern algorithms. Considering that BP neural networks model is easy to take local convergence, this paper put forward genetic algorithm optimizing weight and bias value of radial based function network(GA-RBF), made a Internet traffic forecasting model which is relative with p steps and ahead of l steps, overcame the limitations of traditional forecasting algorithm model and BP neural networks algorithm. To prove the effectiveness and rationality of this algorithm, we forecasted the China education network main port traffic with GA-RBF neural networks. According to the analysis, we find that the GA-RBF forecasting effect is obviously better than BP neural networks. The conclusion shows that it is one of available and effective ways to use GA-RBF artificial neural networks to do Internet traffic forecast.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131238582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Research on Personal Credit Evaluation System of Commercial Banks 商业银行个人信用评价体系研究
L. Yuanyuan
{"title":"Research on Personal Credit Evaluation System of Commercial Banks","authors":"L. Yuanyuan","doi":"10.1109/WKDD.2008.147","DOIUrl":"https://doi.org/10.1109/WKDD.2008.147","url":null,"abstract":"Based on the analysis of personal credit evaluation index systems in and out of China, this paper establishes personal credit evaluation index system of commercial banks suitable for China, which can be divided into three parts: Personal indices, economy indices and credit indices; and this paper builds personal credit synthetic evaluation model based on GEM algorithm to better make use of experts' experiences and wisdom, and to overcome the inconsistency of experts' evaluation results. This evaluation system provides references for commercial banks to make customer loan decisions.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Researches on Diffusion Model of MNCs' Distributed Innovation 跨国公司分布式创新的扩散模型研究
Gao Xiao-qin, Liu Guo-xin
{"title":"Researches on Diffusion Model of MNCs' Distributed Innovation","authors":"Gao Xiao-qin, Liu Guo-xin","doi":"10.1109/WKDD.2008.115","DOIUrl":"https://doi.org/10.1109/WKDD.2008.115","url":null,"abstract":"Along with globalization and fast development of knowledge economy and informatization, many MNCs and large enterprises explore and practice distributed innovation actively beside their global production and operation. This article discusses about the model and law of development of distributed innovation diffusion, as well as showing the dynamic characteristics of distributed innovation diffusion. Meanwhile, the above diffusion model is used to research RP technique, and set up RP technical diffusion model, whose popularization state can be anticipated, thus provides a reference for the popularization and application of RP technique in our China.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Integrated Approach to Recognition of Lane Marking and Road Boundary 车道标线与道路边界识别的集成方法
Weina Lu, Yucai Zheng, Yuquan Ma, Tao Liu
{"title":"An Integrated Approach to Recognition of Lane Marking and Road Boundary","authors":"Weina Lu, Yucai Zheng, Yuquan Ma, Tao Liu","doi":"10.1109/WKDD.2008.119","DOIUrl":"https://doi.org/10.1109/WKDD.2008.119","url":null,"abstract":"An integrated vision method was proposed for intelligent vehicles to synchronously recognize the lane marking and road boundary in direct or curve road environment. Firstly, with region connectivity analyzing, the method extracted the brightness features of lane markings on input images by self-adaptive threshold segmenting. Not only the gradient magnitude but also the gradient direction features of the road boundary were extracted by the Sobel operator method. Secondly, the 2-D models of road shape were acquired and the features above were matched to them by least-squares fit. With the circular calling of detecting and tracking program block, the whole process showed a fast and exact capability. The experiments have been conducted with the videos captured from real road scenes, and the results proved that it is a real time and robust method to recognize the road for the vision-based navigation of intelligent vehicles.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Progressive Image Transmission over Memoryless Feedback Channels Using Joint Source-Channel Coding Strategy 基于联合信源信道编码策略的无记忆反馈信道渐进图像传输
Xunfeng Yu, Dawei Ma
{"title":"Progressive Image Transmission over Memoryless Feedback Channels Using Joint Source-Channel Coding Strategy","authors":"Xunfeng Yu, Dawei Ma","doi":"10.1109/WKDD.2008.150","DOIUrl":"https://doi.org/10.1109/WKDD.2008.150","url":null,"abstract":"In this paper, we consider the problem of joint source-channel coding for image progressive transmitted over channels with feedback. Feedback routes are provided in many existing standard wireless channels, making rate allocation with feedback a problem of considerable practical importance. We address the question of rate allocation between the source and channel codes in the forward channel, in the presence of feedback information and under a distortion cost function. We show that the presence of feedback shifts the optimal rate allocation point, resulting higher rates for error-correcting codes and smaller overall distortion. Simulations on memoryless channels show that the presence of feedback allows up to about 1.5 dB improvement in PSNR compared to the similarly optimized feedforward scheme.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121381739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Piecewise Hashing Method for Computer Forensics 一种用于计算机取证的高效分段哈希方法
Long Chen, Guoyin Wang
{"title":"An Efficient Piecewise Hashing Method for Computer Forensics","authors":"Long Chen, Guoyin Wang","doi":"10.1109/WKDD.2008.80","DOIUrl":"https://doi.org/10.1109/WKDD.2008.80","url":null,"abstract":"Hashing, a basic tool in computer forensics, is used to ensure data integrity and to identify known data objects efficiently. Unfortunately, intentional tiny modified file can not be identified using this traditional technique. Context triggered piecewise hashing separates a file into pieces using local context characteristic, and produces a hash sequence as a hash signature. The hash signature can be used to identify similar files with tiny modifications such as insertion, replacement and deletion. The algorithm of currently available scheme is designed for junk mail detection, which is low efficient and not suitable for file system investigation. In this paper, an improved algorithm based on the Store-Hash and Rehash idea is developed for context triggered piecewise hashing technique. Experiment results show that the performance of speed and the ability of similarity detection of the new scheme are better than that of spamsum. It is valuable for forensics practice.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Research on WEB Cache Prediction Recommend Mechanism Based on Usage Pattern 基于使用模式的WEB缓存预测推荐机制研究
Lin Jianhui, H. Tianshu, Yang Chao
{"title":"Research on WEB Cache Prediction Recommend Mechanism Based on Usage Pattern","authors":"Lin Jianhui, H. Tianshu, Yang Chao","doi":"10.1109/WKDD.2008.9","DOIUrl":"https://doi.org/10.1109/WKDD.2008.9","url":null,"abstract":"Cache prefetching technique can improve the hit ratio and expedite users visiting speed. After analyzed the recommend system in e-business, this paper studied the characteristics how user visit Web page and proposed a Web prefetching recommender system based on usage pattern. This system cluster user behavior through an improved ant colony algorithm, then usage pattern can be abstracted from these classes through sequence mining. These sequence patterns are applied to forecast the coming behavior of users thus improve the hit ratio of system. Experiment result proves the validity of the system.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on Architecture of Tacit Knowledge Transfer Based on Ontology 基于本体的隐性知识转移体系结构研究
Can Chen, Zhanhong Xin
{"title":"Research on Architecture of Tacit Knowledge Transfer Based on Ontology","authors":"Can Chen, Zhanhong Xin","doi":"10.1109/WKDD.2008.103","DOIUrl":"https://doi.org/10.1109/WKDD.2008.103","url":null,"abstract":"Tacit knowledge transfer has been the core of knowledge management all long. On the basis of reviewing on the existing literatures about knowledge transfer, this paper, stating from ontology, proposes an ontology-based architecture of tacit knowledge transfer which enable efficient reuse and sharing of tacit knowledge. The architecture is composed by the acquisition module, the delivery module, and the inference module. Then we give respective explanation of the primary function of each module. This paper also proposes an example of the mobile telephone fault diagnosis and repair implementing the architecture.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model 基于差分对策模型的反DDoS攻击主动防御策略研究
R. Guo, G. Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng
{"title":"Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model","authors":"R. Guo, G. Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng","doi":"10.1109/WKDD.2008.62","DOIUrl":"https://doi.org/10.1109/WKDD.2008.62","url":null,"abstract":"In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of bots that should blocked by defender. A differential games model is used to determine how a defender combats an attacker and protect the servers. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126308160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信