{"title":"A computer based strategy design for automobile spare part logistics network optimization","authors":"Gao Yi, Lin Xinda, Wang Dong","doi":"10.1109/ICITST.2009.5402534","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402534","url":null,"abstract":"This paper discusses the problem of the automobile spare part logistics warehouse network strategy, a quite important problem in logistics. On the basis of the integration of quantitative technology and qualitative technology, a mathematic model and algorithm of automobile spare part logistics network optimization are presented. In the quantitative analysis part we propose a novel hybrid approach through crossing over the PSO and GA, called hybrid PSO-GA based algorithm. Among the mixed algorithm, GA is embedded to solve the difficulties of updating the particles in the binary code system; the roulette algorithm is embedded to eliminate worse particles; SA is embed to control convergence of particles. Then in the qualitative part, we propose a selection model along with the AHP methodology that project selection would be easier and more accurate than before. In the end we apply the above approach in an automobile spare part logistics company. Computational simulation is carried out to evaluate the performance of the algorithm and the results show that this approach can indeed find effective solutions for the automobile spare part logistics optimization problem.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131438898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong
{"title":"Server virtualization by user behaviour model using a data mining technique — A preliminary study","authors":"D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong","doi":"10.1109/ICITST.2009.5402611","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402611","url":null,"abstract":"Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. However, the problem of tuning dynamic resource allocation is a novelty. Managing heterogeneous workloads running within virtual machines is an interesting and challenging topic of server virtualization. This research applied association rule discovery, which is one of the data mining techniques to predict level of user access. The results illustrate that performance of the predictive model for a proxy server is 86.86%. The performance of the predictive model for a web server is 87.18%. Additionally, user behaviors for proxy and web servers are visualized. The results suggest that user behaviors are different in term of workload, day and time usage. This preliminary study may be an approach to improve management of data centers running heterogeneous workloads using server virtualization.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-domain classification: Trade-off between complexity and accuracy","authors":"E. Lex, C. Seifert, M. Granitzer, A. Juffinger","doi":"10.1109/ICITST.2009.5402559","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402559","url":null,"abstract":"Text classification is one of the core applications in data mining due to the huge amount of not categorized digital data available. Training a text classifier generates a model that reflects the characteristics of the domain. However, if no training data is available, labeled data from a related but different domain might be exploited to perform cross-domain classification. In our work, we aim to accurately classify unlabeled blogs into commonly agreed newspaper categories using labeled data from the news domain. The labeled news and the unlabeled blog corpus are highly dynamic and hourly growing with a topic drift, so a trade-off between accuracy and performance is required. Our approach is to apply a fast novel centroid-based algorithm, the Class-Feature-Centroid Classifier (CFC), to perform efficient cross-domain classification. Experiments showed that this algorithm achieves a comparable accuracy than k-NN and is slightly better than Support Vector Machines (SVM), yet at linear time cost for training and classification. The benefit of this approach is that the linear time complexity enables us to efficiently generate an accurate classifier, reflecting the topic drift, several times per day on a huge dataset.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metrics for network forensics conviction evidence","authors":"A. Amran, R. Phan, D. Parish","doi":"10.1109/ICITST.2009.5402640","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402640","url":null,"abstract":"Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper takes a step forward showing how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) — Redress that is defined as holding intruders responsible. We propose a procedure of evidence acquisition in network forensics where we then analyse sample of packet data in order to extract useful information as evidence through a formalised intuitive model, based on capturing adversarial behaviour and layer analysis. We then apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans","authors":"P. Beran, E. Schikuta","doi":"10.1109/ICITST.2009.5402518","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402518","url":null,"abstract":"New application domains ranging from the area of computational science (e.g. CERN Datagrid) to international business processes (e.g. Wal-Mart logistics) demand ever increasing storage capacities on a global scale. Therefore the ability to query and access data efficiently is one of the major challenges that drive research and development in the area of wide distributed data management. Due to the situation of a huge variety of underlying heterogeneous and homogenous infrastructures, where each showing specific hard- and software resources and a number of possible data sources, the optimization of the access process to the desired data is a challenging task. Hence, this paper introduces a novel heuristic approach for the optimization of query execution plans (QEP) on a global scale based on an extended multi-layered blackboard mechanism to determine which available (1) data, (2) resources, and (3) operations to use. The proposed method is illustrated by an application scenario of finding an optimal QEP for the retrieval of music information from an online music store.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen
{"title":"Network and content aware information management","authors":"S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen","doi":"10.1109/ICITST.2009.5402569","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402569","url":null,"abstract":"The presented approach addresses the problem of query and persistent query (subscription) resolution, taking into consideration distribution across multi-domains, network infrastructure and content management. This approach is particularly suitable for information-centric and cloud computing applications based around a mobile-device infrastructure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated framework For modelling the adoptive behaviour of online product recommendations","authors":"W. Lin","doi":"10.1109/ICITST.2009.5402552","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402552","url":null,"abstract":"A new-product recommendation system supports users in making buying decisions. The method representing recommending results in accordance with users' preferences is one of the crucial technologies for persuading users to adopt the recommendations. A body of literature proposes technical improvements in recommendation systems (RS). However, the research that investigates users' behaviour toward adopting results presented by the RS is scarce. This paper targets the online scenario that customers provide post-purchase opinions; in this case, e-word-of-mouth (eWOMs). It investigates the choice model in terms of adoptive and evaluative behaviour of the eWOMs receivers (users of the recommendation systems). This paper presents ongoing research that proposes an integrated framework that links literature on the use of product recommendation systems.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simplified link reliability enhancement schemes for wireless networks","authors":"Boon Hoi Lim, C. Tan","doi":"10.1109/ICITST.2009.5402599","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402599","url":null,"abstract":"Today's Internet uses the IP protocol suite that was primarily designed for the transport of data and provides best-effort data delivery. Thus, it does not guarantee the quality of voice transmission that is highly sensitive to error and delay. The situation is even more severe in wireless networks which experience even more distortion and attenuation. Therefore, enhancing the voice traffic quality in the wireless network is essentials for users to experience the lowest erroneous voice traffic. The objective of this paper is to propose an enhanced link reliability scheme and a low level frame prioritize scheme where they are able to improve the QoS in voice traffic especially in wireless networks. Each scheme utilized the wireless environment to tackle the time sensitive traffic. The two schemes have been proven to be able to performance well in enhancing voice quality under specified circumstances via network simulations.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Yet another approach for dynamic web service composition","authors":"Kaouthar Boumhamdi, Zahi Jarir","doi":"10.1109/ICITST.2009.5435098","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5435098","url":null,"abstract":"Web services have received much interest due to their potential to design and build complex interenterprise business applications. A particular interest concerns dynamic web services composition that offers the opportunity for creating new web services at runtime from those already published in uddi registry. However, this composition requires necessarily quantifying criteria for web service selection to build a more appropriated one. The objective of this paper is to suggest an answer of this challenge by proposing a flexible architecture for dynamic web services composition related to user's requirements and to the availability of critical resources. In addition, this architecture has the ability to re-configure at runtime the created composite service, if some failures happen, in order to maintain a better quality of composite service.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How does politics affect electronic healthcare adoption","authors":"Zanifa Omary, F. Mtenzi, Bing Wu","doi":"10.1109/ICITST.2009.5402502","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402502","url":null,"abstract":"In the 21 century, the term e-healthcare has become the common buzzword in the world. Its popularity is directly related to the rate of its adoption and benefits that it offers to individuals and governments. Among the common benefits include reduction in medical errors, improvements on physician efficiency, improvement in physician-patient relationship and an increase in the quality of care delivered. Despite all these benefits, politics is one among the obstacles hindering its adoption. In this paper we analyse how politics at local, national and international levels affect e-healthcare adoption and thereafter we suggest appropriate alternatives to overcome these obstacles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}