2008 International Conference on Advanced Computer Theory and Engineering最新文献

筛选
英文 中文
A New Approach for on Line Recommender System in Web Usage Mining Web使用挖掘中在线推荐系统的新方法
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.72
S. Shinde, U. Kulkarni
{"title":"A New Approach for on Line Recommender System in Web Usage Mining","authors":"S. Shinde, U. Kulkarni","doi":"10.1109/ICACTE.2008.72","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.72","url":null,"abstract":"The Internet is one of the fastest growing areas of intelligence gathering. During their navigation Web users leave many records of their activity. This huge amount of data can be a useful source of knowledge. Sophisticated mining processes are needed for this knowledge to be extracted, understood and used. Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web Site. WUM can model user behavior and, therefore, to forecast their future movements. Online prediction is one Web usage mining application. However, the accuracy of the prediction and classification in the current architecture of predicting userspsila future requests systems can not still satisfy users especially in huge Web sites. To provide online prediction efficiently, we develop architecture for online recommendation for predicting in Web Usage Mining System .In this paper we propose architecture of on line recommendation in Web usage mining (OLRWMS) for enhancing accuracy of classification by interaction between classifications, evaluation, and current user activates and user profile in online phase of this architecture.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Bearings-Only Maneuvering Target Tracking Based on STF and UKF 基于STF和UKF的全方位机动目标跟踪
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.10
Wang Yali
{"title":"Bearings-Only Maneuvering Target Tracking Based on STF and UKF","authors":"Wang Yali","doi":"10.1109/ICACTE.2008.10","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.10","url":null,"abstract":"The bearings-only tracking problem (BOT) has been studied for many years and UKF has extensively been applied in passive non-maneuvering target tracking. When target takes maneuver, the estimation will diverge. STF can track the abrupt change of state by tuning the gain matrix online. Based on the advantages of STF and UKF, a new method, STF_UKF, is proposed to track maneuvering target with bearings-only measurements from two separate stationary observers. Simulation results show that STF_UKF is feasible and effective in tracking maneuvering target, especially when initial state deviation and measurement noise are great.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Communication Mechanism of Search and Rescue at Sea Intelligent Decision Support System Based on RMI 基于RMI的海上搜救智能决策支持系统通信机制
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.14
Yu Weihong
{"title":"Communication Mechanism of Search and Rescue at Sea Intelligent Decision Support System Based on RMI","authors":"Yu Weihong","doi":"10.1109/ICACTE.2008.14","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.14","url":null,"abstract":"A multi-agent system (MAS) is a system composed of multiple interacting intelligent agents. Multi-agent systems can be used to solve problems that are difficult or impossible for an individual agent or monolithic system to solve. Search and rescue at sea intelligent decision support system is developed by us based on MAS. RMI that means remote method invocation is Java distributed programming model. The communication of MAS and the communication mechanism in search and rescue at sea intelligent decision support system based on RMI are analyzed. Low-level implementation details are also given. As a research highlight, a practical application of RMI in search and rescue at sea intelligent decision support system is introduced and the main advantages of RMI communication are summarized.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal Concepts and Maximal Compatibility Blocks 形式概念和最大兼容性块
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.41
Wan-Li Chen
{"title":"Formal Concepts and Maximal Compatibility Blocks","authors":"Wan-Li Chen","doi":"10.1109/ICACTE.2008.41","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.41","url":null,"abstract":"An alternative perspective of formal concept is presented. Given the finite formal context, the incidence relation is seen as the universe of discourse since it is a subset of the Cartesian product from objects set to attributes set, and then the compatibility relation on the universe is induced. It is proved that formal concepts are precisely maximal compatibility blocks with respect to the induced compatibility relation. Some properties of formal concept are also discussed in terms of maximal compatibility blocks.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Traffic Analysis Using Refined Bayesian Reasoning to Detect Flooding and Port Scan Attacks 基于改进贝叶斯推理的网络流量分析检测泛洪攻击和端口扫描攻击
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.44
Dai-ping Liu, Ming-wei Zhang, Tao Li
{"title":"Network Traffic Analysis Using Refined Bayesian Reasoning to Detect Flooding and Port Scan Attacks","authors":"Dai-ping Liu, Ming-wei Zhang, Tao Li","doi":"10.1109/ICACTE.2008.44","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.44","url":null,"abstract":"Dynamical analysis of the current network status is critical to detect large scale intrusions and to ensure the networks to continually function. Collecting and analyzing traffic in real time and reporting the current status in time provide a feasible way. In this paper we used a refined naive Bayes method, naive Bayes kernel estimator (NBKE), to identify flooding attacks and port scans from normal traffic. The mechanism of our method is based on the observation that almost all known attacks could significantly change the traffic features. Uniquely, we employ the hand-identified traffic instance as the input of the NBKE. In this paper, we illustrate the higher accuracy in detection the flooding attacks and port scan behavior by using NBKE. Our results indicate that the simplest naive Bayes (NB) estimator is able to achieve about 88.4% accuracy, while the kernel estimator can provide 96.8% accuracy. We also demonstrate that the mechanism our method based on is more reasonable.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131800479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
New Modeling Method for Trees 树的新建模方法
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.54
Chunhua Wang, Kejian Yang, Dong Han
{"title":"New Modeling Method for Trees","authors":"Chunhua Wang, Kejian Yang, Dong Han","doi":"10.1109/ICACTE.2008.54","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.54","url":null,"abstract":"L-systems, IFS and fractal method are widely used to model trees, but the created trees are of great similarity and unable to embody the characteristic of different trees well. To overcome the above drawback, a new modeling method for trees is presented and expounded based on stochastic space point. Through specifying the branching type, the proposed modeling method will create relevant bifurcate trees flexibly. Besides, it also can easily control the brachespsila smooth level and density. Experiments show that the result graphs are true to nature and this proposed method can be applied to model other plant in visual reality.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131061425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of Negotiation Method for Data Grid Transmission 数据网格传输协商方法研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.20
Hong Liang, Jianjiang Chen
{"title":"Research of Negotiation Method for Data Grid Transmission","authors":"Hong Liang, Jianjiang Chen","doi":"10.1109/ICACTE.2008.20","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.20","url":null,"abstract":"Multi-agent coalition technology can resolve the problems of data transmission and autonomy greatly, and improves transmission efficiency. However, in the process of practical data transmission, probability of net fault appeared must be obeyed to the average Poisson Distribution any time, and then, the original task assigned can not adapt the new grid environment. According to traditional auction negotiation method, this paper puts forward on-to-many multi-proposal negotiation method based on auction method.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132747305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving Cross-Selling Problems with Ensemble Learning: A Case Study 用集成学习解决交叉销售问题:一个案例研究
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.86
X. Guo, Yilong Yin, Guang-Tong Zhou, Cailing Dong
{"title":"Solving Cross-Selling Problems with Ensemble Learning: A Case Study","authors":"X. Guo, Yilong Yin, Guang-Tong Zhou, Cailing Dong","doi":"10.1109/ICACTE.2008.86","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.86","url":null,"abstract":"This paper shows our solution to PAKDD Competition 2007 as a case study of cross-selling problems. Following a brief description of the data mining task, we discuss several difficulties to be confronted with in the task from the view of data mining. Then, we show how to do the data pre-processing. In the solution we proposed, to weaken class imbalance of the modeling dataset externally, we combine under-sampling and over-sampling techniques. Besides, we adjust the parameters of each base learner internally to solve cost-sensitivity. Next, we get an ensemble of base learners to achieve a better predicting performance. Experimental results on prediction dataset of real world provided by PAKDD Competition 2007 show that our solution is effective and efficient with its AUC value 60.73%.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131312881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile IP Network Mobility 移动IP网络移动性
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.53
Reza Malekian
{"title":"Mobile IP Network Mobility","authors":"Reza Malekian","doi":"10.1109/ICACTE.2008.53","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.53","url":null,"abstract":"In this paper we discuss network mobility, in which an entire network moves from one location to another on the Internet. As an example, consider Alice taking a network in her car on her vacation; it should be possible for her vehicular network to maintain seamless connectivity with her home network. We consider how Mobile IP can be extended so that individual mobile nodes do not have to run the Mobile IP protocol when the network they are attached to moves. We present MEMO model and then Discuss NEMO Route Optimization.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131883162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Personalized Trust-Based Approach for Service Selection in Internetwares 基于个性化信任的互联网服务选择方法
2008 International Conference on Advanced Computer Theory and Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICACTE.2008.88
Pan Jing, Xu Feng, Xin Xianlong, Lu Jian
{"title":"A Personalized Trust-Based Approach for Service Selection in Internetwares","authors":"Pan Jing, Xu Feng, Xin Xianlong, Lu Jian","doi":"10.1109/ICACTE.2008.88","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.88","url":null,"abstract":"Internetware is an abstract of the distributed software system in the open and dynamic Internet which is generally integrated by large numbers of autonomous and heterogeneous software services of various functions. The reliability of the service which acts as a component in Internetware inevitably has an effect on the collaboration in the system and users' satisfaction on the whole system. So picking the right service from the open environment is a critical problem for developers to build high confidence application systems. However, traditional test measures cannot work when facing with dynamically evolutive characters and separated interests between developers of systems and third-party services in the Internetware. Trust and reputation mechanism is a complementary approach which relies on analyzing collected recommendations from past users to evaluate the software. In this paper, we propose a personalized trust-based approach to do service selection automatically for users. It mainly deals with two problems: 1) trustworthiness: as lacking of a global monitor to record runtime performances of services, we design a recommendation collection method based on the user's social network; 2) relevance: since the formation of ratings has an impact on the recommendation, we establish a filtering process to weight information according to recommenders' expectation and capability.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信