2011 Sixth International Conference on Digital Information Management最新文献

筛选
英文 中文
Index-based n-gram extraction from large document collections 从大型文档集合中基于索引的n-gram提取
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093324
M. Krátký, Radim Bača, D. Bednář, J. Walder, J. Dvorský, P. Chovanec
{"title":"Index-based n-gram extraction from large document collections","authors":"M. Krátký, Radim Bača, D. Bednář, J. Walder, J. Dvorský, P. Chovanec","doi":"10.1109/ICDIM.2011.6093324","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093324","url":null,"abstract":"N-grams are applied in some applications searching in text documents, especially in cases when one must work with phrases, e.g. in plagiarism detection. N-gram is a sequence of n terms (or generally tokens) from a document. We get a set of n-grams by moving a floating window from the begin to the end of the document. During the extraction we must remove duplicate n-grams and we must store additional values to each n-gram type, e.g. n-gram type frequency for each document and so on, it depends on a query model used. Previous works utilize a sorting algorithm to compute the n-gram frequency. These approaches must handle a high number of the same n-grams resulting in high time and space overhead. Moreover, these techniques are often main-memory only, it means they must be executed for small or middle size collections. In this paper, we show an index-based method to the n-gram extraction for large collections. This method utilizes common data structures like B+-tree and Hash table. We show the scalability of our method by presenting experiments with the gigabytes collection.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A PPDM model using Bayesian Network for hiding sensitive XML Association Rules 一个使用贝叶斯网络隐藏敏感XML关联规则的PPDM模型
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093345
Khalid Iqbal, S. Asghar, S. Fong
{"title":"A PPDM model using Bayesian Network for hiding sensitive XML Association Rules","authors":"Khalid Iqbal, S. Asghar, S. Fong","doi":"10.1109/ICDIM.2011.6093345","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093345","url":null,"abstract":"Association Rule Mining (ARM) was introduced for the market basket analysis where items that are frequently appeared together per transaction are identified as rules. In such mining process, sensitivity issue of rules has never been addressed for more than a decade. Thus, research on guarding sensitivity in ARM should be attended to in priority by researchers, so that the risk of sensitive information disclosure can be avoided especially when the data sources are being shared. In this paper, we presented a Mode-based PPDM model via Bayesian Network (BN) which can reliably hide away sensitive rules in ARM. Such reliability was never studied nor reported in the literature of XML domain of PPDM. One useful advantage of PPDM model is its ability to unfasten a variety of directions that could be effectively used to overcome disclosure risk in XML Association Rules (XARs). Moreover, PPDM model is known to benefit businesses even in absolute competitive environment.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Online ngram-enhanced topic model for academic retrieval 用于学术检索的在线ngram增强主题模型
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093316
Han Wang, B. Lang
{"title":"Online ngram-enhanced topic model for academic retrieval","authors":"Han Wang, B. Lang","doi":"10.1109/ICDIM.2011.6093316","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093316","url":null,"abstract":"Applying topic model to text mining has achieved a great success. However, state-of-art topic modeling methods still have potential to improve in academic retrieval field. In this paper, we propose an online unified topic model, which is ngram-enhanced. Our model discovers topics with unigrams as well as topical bigrams and is updated by an online inference algorithm with the new incoming data streams. On this basis, we combine our model into the query likelihood model and develop an integrated academic searching system. Experiment results on ACM collection show that our proposed methods outperform the existing approaches on document modeling and searching accuracy. Especially, we prove the efficiency of our system on academic retrieval problem.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114985882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Query optimization in information integration for queries involving aggregation and group by 信息集成中涉及聚合和分组查询的查询优化
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093349
Wejdan Alkaldi, F. Sadri
{"title":"Query optimization in information integration for queries involving aggregation and group by","authors":"Wejdan Alkaldi, F. Sadri","doi":"10.1109/ICDIM.2011.6093349","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093349","url":null,"abstract":"This paper addresses the efficient processing of queries involving aggregation and group-by in the semantic-model approach to information integration. Query processing algorithms materialization, subqueries, and wrapper have been extended for such aggregate queries. Algorithms have been presented for two cases: In the first case information at different sources are disjoint, while in the second case information sources may contain overlapping information.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintaining imbalance highly dependent medical data using dirichlet process data generation 使用狄利克雷过程数据生成来维护不平衡的高度依赖的医疗数据
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093359
Tieta Antaresti, M. I. Fanany, A. M. Arymurthy
{"title":"Maintaining imbalance highly dependent medical data using dirichlet process data generation","authors":"Tieta Antaresti, M. I. Fanany, A. M. Arymurthy","doi":"10.1109/ICDIM.2011.6093359","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093359","url":null,"abstract":"The existence of imbalanced data between one class and another class is an important issue to be considered in a classification problem. One of the well-known data balancing technique is the artificial oversampling, which increase the size of datasets. In this research, multinomial classification was applied to classify some recorded features obtained from a single ECG (electrocardiograph) sensor. Therefore, a Dirichlet process, a dirichlet distribution of cumulative distribution function of each data partition, was needed to model the distribution of the new generated data by also considering the statistical properties of the previous data. Data balancing process had given the result of 77.21% classification accuracy (CA), and 90.9% area under ROC curve (AUC).","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effect of user search behaviour on web information gathering tasks 用户搜索行为对网络信息收集任务的影响
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093353
Anwar Alhenshiri, Hoda Badesh
{"title":"The effect of user search behaviour on web information gathering tasks","authors":"Anwar Alhenshiri, Hoda Badesh","doi":"10.1109/ICDIM.2011.6093353","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093353","url":null,"abstract":"Research has identified high level tasks in activities users perform on the web. Amongst those tasks is information gathering. This type of task is complex, exploratory, and it usually requires more user effort than other tasks. During the task of information gathering, users may follow one or more types of search behaviour. This paper investigates the effect of the user search behaviour on the task of information gathering on the web. Activities users perform on the web during information gathering and their correlation with the type of behaviour followed by the user were examined. The research draws recommendations for further studies that may concern developing tools for supporting web information gathering tasks according to the user search behaviour","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"82 299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian based subgroup discovery 基于贝叶斯的子组发现
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093343
T. Anwar, S. Asghar, S. Fong
{"title":"Bayesian based subgroup discovery","authors":"T. Anwar, S. Asghar, S. Fong","doi":"10.1109/ICDIM.2011.6093343","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093343","url":null,"abstract":"Data Mining is concerned with extraction of interesting patterns or knowledge from huge amounts of Data. Generally data mining tasks are either predictive or descriptive. Classification falls under predictive induction while clustering and association rule mining fall under descriptive induction. Subgroup discovery is a task at the intersection of supervised learning and descriptive induction. In subgroup discovery we want to uncover individual patterns in data with a given property of interest. We want to find subgroups that cover a large population and are statistically different. The main application areas of subgroup discovery are exploration and descriptive induction, where the user wants to find the overview of dependencies between a target and many explaining variables. Many techniques have been proposed for discovering subgroups and some of these techniques are based on classification. But none of the techniques uses Bayesian networks for the generation of subgroups. Our contributions include a technique for the discovery of subgroups where the subgroups are generated using Bayesian networks.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127150904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multisensor fusion-based object detection and tracking using Active Shape Model 基于主动形状模型的多传感器融合目标检测与跟踪
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093321
Dongeun Lee, Sunghoon Choi
{"title":"Multisensor fusion-based object detection and tracking using Active Shape Model","authors":"Dongeun Lee, Sunghoon Choi","doi":"10.1109/ICDIM.2011.6093321","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093321","url":null,"abstract":"This paper proposes automatic target detection and tracking system using Active Shape Model (ASM). Existing model based approaches for tracking are either manually initiated or need some form of user interaction to locate the object in images. Also the low light environmental conditions for surveillance systems make the tracking further harder. Hence the proposed system makes use of multiple sensors in the form of IR and visible cameras to enable tracking in degraded and low light environments. The proposed algorithm consists of the following stages: (i) input image evaluation for obtaining the conditions under which the camera is placed, (ii) an integrated motion detector and target tracker, (iii) active shape tracker(AST) for performing tracking, (iv) update of tracking results for real time tracking of targets. In the first stage the input image is evaluated for the lighting conditions. If the lighting conditions are poor then IR sensor is integrated with the CCD sensor for tracking applications. In the second stage the motion detector and region tracker are used to provide feedback to AST for automatic initialization of tracking. Tracking is carried out in the third stage using ASM. The final stage extracts the parameters and tracking information and applies it to the next frame if the tracking is carried out in real time. The major contribution this work lies in the integration for a completed system, which covers from image processing to tracking algorithms. The approach of combining multiple algorithms succeeds in overcoming fundamental limitations of tracking and at the same time realizes real time implementation. Experimental results show that the proposed algorithm can track people under various environment in real-time. The proposed system has potential uses in the area of surveillance, shape analysis, and model-based coding.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks 基于有限状态机的自组织网络异常节点检测新方法
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093331
Dina Sadat Jalali, Alireza Shahrbanoonezhad
{"title":"A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks","authors":"Dina Sadat Jalali, Alireza Shahrbanoonezhad","doi":"10.1109/ICDIM.2011.6093331","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093331","url":null,"abstract":"In this paper we express a new intrusion detection system based FSM (Finite State Machine) in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing and overall network reduce performance. The presented approach based on FSM focuses at recognizing the malicious nodes within the network in a fast and accurate way, then it deals with rapid introduction of the malicious nodes to other nodes in the network to prevent sending multiple packets and drop and packet change. Finally, we will show the significant improvement of some factors in comparison with other last works and we simulated our methods by NS2 software.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of P2P streaming systems for webcast 网络直播P2P流媒体系统的评价
2011 Sixth International Conference on Digital Information Management Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093352
Y. Gotoh, Kentaro Suzuki, T. Yoshihisa, H. Taniguchi, M. Kanazawa
{"title":"Evaluation of P2P streaming systems for webcast","authors":"Y. Gotoh, Kentaro Suzuki, T. Yoshihisa, H. Taniguchi, M. Kanazawa","doi":"10.1109/ICDIM.2011.6093352","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093352","url":null,"abstract":"Due to the recent spread of streaming delivery of movies, streaming using Peer-to-Peer (P2P) streaming technology has attracted much attention. In P2P streaming systems, to distribute the network load, peers from which the user receives data is selected at random. For this, clients have to wait until their desired data is delivered. Therefore, there are many researches to reduce the waiting time. However, because of the complexity of the implementation, they usually evaluate these methods using computer simulations. In actual environment, indeed, interruption time is not always reduced by increasing clients to deliver data. To evaluate the effectiveness of P2P streaming systems, it is important to implement an actual P2P streaming system. In this paper, we evaluate a P2P streaming system. By using our implemented P2P streaming system, we investigate situations that its system is effective. As a result of our evaluation, we confirmed that interruption time is reduced effectively.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信