2009 International Conference for Internet Technology and Secured Transactions, (ICITST)最新文献

筛选
英文 中文
A computer based strategy design for automobile spare part logistics network optimization 基于计算机的汽车备件物流网络优化策略设计
Gao Yi, Lin Xinda, Wang Dong
{"title":"A computer based strategy design for automobile spare part logistics network optimization","authors":"Gao Yi, Lin Xinda, Wang Dong","doi":"10.1109/ICITST.2009.5402534","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402534","url":null,"abstract":"This paper discusses the problem of the automobile spare part logistics warehouse network strategy, a quite important problem in logistics. On the basis of the integration of quantitative technology and qualitative technology, a mathematic model and algorithm of automobile spare part logistics network optimization are presented. In the quantitative analysis part we propose a novel hybrid approach through crossing over the PSO and GA, called hybrid PSO-GA based algorithm. Among the mixed algorithm, GA is embedded to solve the difficulties of updating the particles in the binary code system; the roulette algorithm is embedded to eliminate worse particles; SA is embed to control convergence of particles. Then in the qualitative part, we propose a selection model along with the AHP methodology that project selection would be easier and more accurate than before. In the end we apply the above approach in an automobile spare part logistics company. Computational simulation is carried out to evaluate the performance of the algorithm and the results show that this approach can indeed find effective solutions for the automobile spare part logistics optimization problem.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131438898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Server virtualization by user behaviour model using a data mining technique — A preliminary study 服务器虚拟化中使用用户行为模型的数据挖掘技术的初步研究
D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong
{"title":"Server virtualization by user behaviour model using a data mining technique — A preliminary study","authors":"D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong","doi":"10.1109/ICITST.2009.5402611","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402611","url":null,"abstract":"Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. However, the problem of tuning dynamic resource allocation is a novelty. Managing heterogeneous workloads running within virtual machines is an interesting and challenging topic of server virtualization. This research applied association rule discovery, which is one of the data mining techniques to predict level of user access. The results illustrate that performance of the predictive model for a proxy server is 86.86%. The performance of the predictive model for a web server is 87.18%. Additionally, user behaviors for proxy and web servers are visualized. The results suggest that user behaviors are different in term of workload, day and time usage. This preliminary study may be an approach to improve management of data centers running heterogeneous workloads using server virtualization.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cross-domain classification: Trade-off between complexity and accuracy 跨领域分类:复杂性和准确性之间的权衡
E. Lex, C. Seifert, M. Granitzer, A. Juffinger
{"title":"Cross-domain classification: Trade-off between complexity and accuracy","authors":"E. Lex, C. Seifert, M. Granitzer, A. Juffinger","doi":"10.1109/ICITST.2009.5402559","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402559","url":null,"abstract":"Text classification is one of the core applications in data mining due to the huge amount of not categorized digital data available. Training a text classifier generates a model that reflects the characteristics of the domain. However, if no training data is available, labeled data from a related but different domain might be exploited to perform cross-domain classification. In our work, we aim to accurately classify unlabeled blogs into commonly agreed newspaper categories using labeled data from the news domain. The labeled news and the unlabeled blog corpus are highly dynamic and hourly growing with a topic drift, so a trade-off between accuracy and performance is required. Our approach is to apply a fast novel centroid-based algorithm, the Class-Feature-Centroid Classifier (CFC), to perform efficient cross-domain classification. Experiments showed that this algorithm achieves a comparable accuracy than k-NN and is slightly better than Support Vector Machines (SVM), yet at linear time cost for training and classification. The benefit of this approach is that the linear time complexity enables us to efficiently generate an accurate classifier, reflecting the topic drift, several times per day on a huge dataset.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Metrics for network forensics conviction evidence 网络取证定罪证据指标
A. Amran, R. Phan, D. Parish
{"title":"Metrics for network forensics conviction evidence","authors":"A. Amran, R. Phan, D. Parish","doi":"10.1109/ICITST.2009.5402640","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402640","url":null,"abstract":"Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper takes a step forward showing how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) — Redress that is defined as holding intruders responsible. We propose a procedure of evidence acquisition in network forensics where we then analyse sample of packet data in order to extract useful information as evidence through a formalised intuitive model, based on capturing adversarial behaviour and layer analysis. We then apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans 用于优化跨世界查询执行计划的扩展多层黑板方法
P. Beran, E. Schikuta
{"title":"An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans","authors":"P. Beran, E. Schikuta","doi":"10.1109/ICITST.2009.5402518","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402518","url":null,"abstract":"New application domains ranging from the area of computational science (e.g. CERN Datagrid) to international business processes (e.g. Wal-Mart logistics) demand ever increasing storage capacities on a global scale. Therefore the ability to query and access data efficiently is one of the major challenges that drive research and development in the area of wide distributed data management. Due to the situation of a huge variety of underlying heterogeneous and homogenous infrastructures, where each showing specific hard- and software resources and a number of possible data sources, the optimization of the access process to the desired data is a challenging task. Hence, this paper introduces a novel heuristic approach for the optimization of query execution plans (QEP) on a global scale based on an extended multi-layered blackboard mechanism to determine which available (1) data, (2) resources, and (3) operations to use. The proposed method is illustrated by an application scenario of finding an optimal QEP for the retrieval of music information from an online music store.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network and content aware information management 网络和内容感知信息管理
S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen
{"title":"Network and content aware information management","authors":"S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen","doi":"10.1109/ICITST.2009.5402569","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402569","url":null,"abstract":"The presented approach addresses the problem of query and persistent query (subscription) resolution, taking into consideration distribution across multi-domains, network infrastructure and content management. This approach is particularly suitable for information-centric and cloud computing applications based around a mobile-device infrastructure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An integrated framework For modelling the adoptive behaviour of online product recommendations 为在线产品推荐的采用行为建模的集成框架
W. Lin
{"title":"An integrated framework For modelling the adoptive behaviour of online product recommendations","authors":"W. Lin","doi":"10.1109/ICITST.2009.5402552","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402552","url":null,"abstract":"A new-product recommendation system supports users in making buying decisions. The method representing recommending results in accordance with users' preferences is one of the crucial technologies for persuading users to adopt the recommendations. A body of literature proposes technical improvements in recommendation systems (RS). However, the research that investigates users' behaviour toward adopting results presented by the RS is scarce. This paper targets the online scenario that customers provide post-purchase opinions; in this case, e-word-of-mouth (eWOMs). It investigates the choice model in terms of adoptive and evaluative behaviour of the eWOMs receivers (users of the recommendation systems). This paper presents ongoing research that proposes an integrated framework that links literature on the use of product recommendation systems.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simplified link reliability enhancement schemes for wireless networks 简化的无线网络链路可靠性增强方案
Boon Hoi Lim, C. Tan
{"title":"Simplified link reliability enhancement schemes for wireless networks","authors":"Boon Hoi Lim, C. Tan","doi":"10.1109/ICITST.2009.5402599","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402599","url":null,"abstract":"Today's Internet uses the IP protocol suite that was primarily designed for the transport of data and provides best-effort data delivery. Thus, it does not guarantee the quality of voice transmission that is highly sensitive to error and delay. The situation is even more severe in wireless networks which experience even more distortion and attenuation. Therefore, enhancing the voice traffic quality in the wireless network is essentials for users to experience the lowest erroneous voice traffic. The objective of this paper is to propose an enhanced link reliability scheme and a low level frame prioritize scheme where they are able to improve the QoS in voice traffic especially in wireless networks. Each scheme utilized the wireless environment to tackle the time sensitive traffic. The two schemes have been proven to be able to performance well in enhancing voice quality under specified circumstances via network simulations.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Yet another approach for dynamic web service composition 这是动态web服务组合的另一种方法
Kaouthar Boumhamdi, Zahi Jarir
{"title":"Yet another approach for dynamic web service composition","authors":"Kaouthar Boumhamdi, Zahi Jarir","doi":"10.1109/ICITST.2009.5435098","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5435098","url":null,"abstract":"Web services have received much interest due to their potential to design and build complex interenterprise business applications. A particular interest concerns dynamic web services composition that offers the opportunity for creating new web services at runtime from those already published in uddi registry. However, this composition requires necessarily quantifying criteria for web service selection to build a more appropriated one. The objective of this paper is to suggest an answer of this challenge by proposing a flexible architecture for dynamic web services composition related to user's requirements and to the availability of critical resources. In addition, this architecture has the ability to re-configure at runtime the created composite service, if some failures happen, in order to maintain a better quality of composite service.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How does politics affect electronic healthcare adoption 政治如何影响电子医疗保健的采用
Zanifa Omary, F. Mtenzi, Bing Wu
{"title":"How does politics affect electronic healthcare adoption","authors":"Zanifa Omary, F. Mtenzi, Bing Wu","doi":"10.1109/ICITST.2009.5402502","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402502","url":null,"abstract":"In the 21 century, the term e-healthcare has become the common buzzword in the world. Its popularity is directly related to the rate of its adoption and benefits that it offers to individuals and governments. Among the common benefits include reduction in medical errors, improvements on physician efficiency, improvement in physician-patient relationship and an increase in the quality of care delivered. Despite all these benefits, politics is one among the obstacles hindering its adoption. In this paper we analyse how politics at local, national and international levels affect e-healthcare adoption and thereafter we suggest appropriate alternatives to overcome these obstacles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书