{"title":"REL: A structural query language for processing massive line-based records","authors":"Li Cheng, Alei Liang","doi":"10.1109/ICCSNT.2013.6967089","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967089","url":null,"abstract":"Many modern programs still use flat files to store application data because of their simplicity and portability. These files contain massive line-based records, on which common actions performed involve filtering, mapping and basic set operations. Rather than having each program to implement them on its own, we present REL, a structural query language that handles all these complexity behind and provides an elegant query interface. We also implement REL as a UNIX utility to translate query expressions into UNIX shell scripts that do the actual record processing. Finally we evaluate its performance through experiments.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guimin Huang, Yukai Zhang, Ya Zhou, Pingshan Liu, Tian Yu
{"title":"Two-stage replication strategy in P2P VoD systems","authors":"Guimin Huang, Yukai Zhang, Ya Zhou, Pingshan Liu, Tian Yu","doi":"10.1109/ICCSNT.2013.6967068","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967068","url":null,"abstract":"In P2P (Peer-to-Peer) VoD (Video-on-Demand) systems, one of the key problems is cache replication. However, with the large scale P2P VoD systems deployed, people study on the log of these systems and gradually realize that the strategy which caches videos proportionally to their popularities is not optimal, especially for cold resources. In simulation, we show that cold videos produce the majority of server workload. In our work, we propose a two-stage cache replication strategy, which increases the distribution of cold resources in the system and reduces the redundant cache of popular resources. Through simulation, we find that the cache proportion of popular videos and cold videos has been readjusted. Owing to more proportion of cache capacity used to cache cold videos, the server workload produced by cold videos is reduced sharply while the server workload produced by popular videos stays low.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128716592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on architecture of smart home management system and key devices","authors":"Chunlai Zhou, Wenhui Huang, Xiaoyun Zhao","doi":"10.1109/ICCSNT.2013.6967330","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967330","url":null,"abstract":"The architecture of smart home management system and key devices are studied according to the specifications on smart home gateway, socket and terminal issued by State power grid corp. in Nov. 30th, 2011, and smart home gateway, smart jack and smart terminal software are developed. Several communication technologies are used, including Zigbee, used to acquire data of wireless sensor network; TCP, used for video monitor; DALI, used to control lamps; Modbus, used to operate actuators, Wi-Fi, used between the terminal device and the gateway; as well as SOAP used for web services. The architecture and devices developed in this paper work well, and satisfy the needs of smart home management.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128728531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The optimized scheme of WSN with low power consumption based on program analysis","authors":"Run Chen","doi":"10.1109/ICCSNT.2013.6967244","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967244","url":null,"abstract":"Wireless sensors need to be designed saving power consumption to extend working time. This paper mainly focuses on power optimization based on the function level in the wireless communication block. We use program analysis tools to extract the most frequent-called functions and reframe these functions to pursue less energy consumed. Following the function change, most of the scenarios installed with different protocols achieve a relatively obvious power saving and make the WSN alive for a longer time.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qian Tan, Bin Zhang, Yi Jiang, Fan Lin, Zhuxiang Xu
{"title":"LDA-based model for traditional Chinese medicine diagnosis","authors":"Qian Tan, Bin Zhang, Yi Jiang, Fan Lin, Zhuxiang Xu","doi":"10.1109/ICCSNT.2013.6967145","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967145","url":null,"abstract":"Based on Lejeune Dirichlet allocation (LDA) model and multi-relationship topic model in Diagnosis and treatment of traditional Chinese medicine (TCM), the Symptom TCM Treatment Diagnosis (STTD) model is purposed to extract topic structure of symptom, TCM, treatment and diagnosis from TCM clinical datum. This paper uses Gibbs sampling to do parameters reasoning and confirms the optimal number of topics according to the average similarity among topics. From the experimental results, given the symptoms of patient, STTD model can predicts treatment, result of diagnosis, TCM and the distribution of topic. And it is available for clinical doctors and researchers.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol","authors":"S. Adhikari, S. Setua","doi":"10.1109/ICCSNT.2013.6967257","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967257","url":null,"abstract":"Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open medium, node mobility, lack of centralized monitoring and lack of a clear line of defense. In this paper, we propose a design of a cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system. This system is able to identify different types of behaviors of a misbehaving node like suspicious, malicious but not intrusive and both malicious & intrusive. Simulation result shows the effectiveness of our proposal.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116818832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Segmentation algorithms of chromosome images","authors":"Wenzhong Yan, Dongming Li","doi":"10.1109/ICCSNT.2013.6967278","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967278","url":null,"abstract":"The chromosome segmentation is the most important step in the automatic chromosome analysis system. In this paper, a few basic chromosome segmentation algorithms are investigated firstly. As a common phenomenon, the partial touching and overlapping chromosomes occur in almost every metaphase images. So, as a difficult yet vital problem, the algorithms for overlapping chromosomes are discussed in detail. The principle and the realization of these algorithms are analyzed. Results of these algorithms are compared and discussed.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mesh segmentation based on face-face similarity probability","authors":"Yang Lei, Jingqi Yan","doi":"10.1109/ICCSNT.2013.6967065","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967065","url":null,"abstract":"Many methods have been developed for mesh segmentation with different advantages and disadvantages. How to integrate the virtues of different segmentations is an attractive problem. This paper proposes a Face-Face Similarity Probability (FFSP) matrix for fusing the results from different segmentation algorithms. Each element of the matrix represents the probability that two faces belong to the same part. So it is a highly-condensed information package extracted from all the other algorithms' understanding of the mesh model. After getting the FFSP matrix, we can combine it with the Random Walks (RW) algorithm for final segmentation. Compared with classical algorithms, our proposed FFSP-RW method is more competitive in both quantitative evaluation and the visualized results.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of medical images in the shearlet domain","authors":"Qin Xue","doi":"10.1109/ICCSNT.2013.6967103","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967103","url":null,"abstract":"In this paper, a new contrast enhancement method is implemented to medical images by applying local range modification on shearlet coefficients. The proposed method is evaluated by the contrast improvement index (CII) and results show that the method is superior to other methods. Moreover, resulting images show that the proposed method can enhance useful features in medical images and improve the visualization of medical images.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new dynamic credit scoring model based on clustering ensemble","authors":"Gao Wei, Chen Mingshu","doi":"10.1109/ICCSNT.2013.6967144","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967144","url":null,"abstract":"With the rapid development of credit industry, customer credit scoring issue is particularly important. In this paper, a new dynamic credit scoring model based on clustering ensemble is proposed to solve the problem that cannot predict customer credit dynamically as well as population drift in customer credit scoring. Firstly, the training set samples are clustered into multiple subareas using OCA clustering ensemble algorithm to weaken the differences among different subareas samples. Then, the entire observation period is fractionized into several fractional periods. Finally customer credit scoring sub-classifiers are established using cost-sensitive support vector machine. The empirical results show that the dynamic model we proposed not only has lower misclassification rate than static model, but also can predict the bad customers as early as possible.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115341974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}