{"title":"Intelligent Business Prediction in Context-awareness Services Based on Hidden Markov Model (HMM)","authors":"Chen Xia, Lu Tingjie","doi":"10.1109/WMWA.2009.50","DOIUrl":"https://doi.org/10.1109/WMWA.2009.50","url":null,"abstract":"Context-awareness services are important applications of mobile commerce, and how to predict demands of mobile customers so as to provide business information they need is a key point. This paper proposed a predicting model based on the hidden Markov model (HMM), which mines the latent information requirement concepts that the customer visiting path contains and to make business information predicting decisions. Simulation experimental results show that the scheme is effective.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122711743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on IPTV Service in FTTx","authors":"Zeng Xi-yang, Cheng Chuanqing","doi":"10.1109/WMWA.2009.73","DOIUrl":"https://doi.org/10.1109/WMWA.2009.73","url":null,"abstract":"Fttx can supply high bandwidth to each user. It can support multicast function as well as data servicel. EPON system is the most important access way to vide multicast service. Carrying IPTV service in EPON, multiple users in the same group can share a stream and can improve the efficiency of downstream band. The paper introduces an method to carrying IPTV in Fttx network base on EPON..","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Building of Campus Network Transition Scheme Based on IPv6 Automatic Tunnel Technology","authors":"Tingzhao Guan, Yandong Xia","doi":"10.1109/WMWA.2009.9","DOIUrl":"https://doi.org/10.1109/WMWA.2009.9","url":null,"abstract":"IPv6 is the key technology of the next generation Internet, this paper analyses the strategies for managing the transition from IPO4 to IPO6, designs the campus network transition scheme based on IPv6automatic tunnel technology, and verifies the feasibility that IPv4 network can access IPv6 network through IPv6 automatic tunnel technology by the experiment.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks","authors":"Huike Li, Daquan Gu","doi":"10.1109/WMWA.2009.75","DOIUrl":"https://doi.org/10.1109/WMWA.2009.75","url":null,"abstract":"With the rapid development of the networking technology, the ad hoc technology has kept advancing apace. But wireless ad hoc networks present more security problems than the conventional wired and wireless networks. Therefore, the ever-increasing researchers are focusing on intrusion detection, as a complementary mechanism to the regular intrusion prevention approaches, which is needed to secure the wireless ad hoc networks. However, how to improve the accuracy of the intrusion detection efficiently in wireless ad hoc networks is still a challenging problem. In this paper, we propose a new approach for intrusion detection, which uses a novel Support Vector Machine Fuzzy Network (SVMFN) to make the detection more suitable and accurate in various wireless ad hoc network environments. The experimental results show that the generalization performance and the accuracy of identification are improved significantly compared to that of the traditional methods, and adapt to engineering applications.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WLAN Authentication System Based on the Improved EAP-TLS Protocol","authors":"Weili Huang, Renle Li","doi":"10.1109/WMWA.2009.63","DOIUrl":"https://doi.org/10.1109/WMWA.2009.63","url":null,"abstract":"This paper introduces the working principle of IEEE 802.1x protocol and Extensible Authentication Protocol EAP-TLS in the wireless local area network. There are some safety defects by analysis of the EAP-TLS protocol. On this basis, make an improvement to the EAP-TLS protocol, and give concrete realization of the process, to set up a WLAN authentication system with higher safety.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application of Grey Prediction Theory for Scientists and Technicians Forecasting: Evidence from Henan Province in China","authors":"Wuwei Li","doi":"10.1109/WMWA.2009.65","DOIUrl":"https://doi.org/10.1109/WMWA.2009.65","url":null,"abstract":"Based on the statistical data during the period from 2001 to 2004 released by Henan Statistical Bureau in China, this paper aims to predict the amount of scientists and technicians of Henan province in China by the usage of GM (1, 1) model with the four items. The result of this empirical study is that the grey prediction theory can fit the scientists and technicians amount development precisely in Henan province. The accuracy of the prediction result is above 90% and corresponds with a distinction, which the grey theory can meet expectations with small samples or data. Research results show that this model established in this paper could provide valuable information for policy makers in their efforts to make appropriate technological policies.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of the Effect of Self-access Center on Non-English Major Students' Listening Ability","authors":"Zhihua Xu, Guangying Cui","doi":"10.1109/WMWA.2009.36","DOIUrl":"https://doi.org/10.1109/WMWA.2009.36","url":null,"abstract":"This paper tries to probe into the effect of the Self-access Center of Huazhong University of Science and Technology on improving non-English major college students’ listening ability employing many concepts of self-assess language learning, a way of autonomous learning. Both qualitative and quantitative research methods are used to analyze the results. While the students’ listening ability has been improved greatly through learning in the center under the guidance of their teacher, some limitations are also found and suggestions given based on the research results.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131088521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of a Three-party Key Exchange Protocol","authors":"Sida Lin, Qianna Xie","doi":"10.1109/WMWA.2009.54","DOIUrl":"https://doi.org/10.1109/WMWA.2009.54","url":null,"abstract":"Recently¿Lu and Cao proposed a novel three-party key exchange protocol. Guo et al pointed out that their protocol cannot resist man-in-the-middle attack and undetectable on-line dictionary attack, and then an improved protocol was proposed in 2008.However, we show that Guo et al’s protocol is still vulnerable to undetectable on-line dictionary attack. To overcome the security flaw, an improved scheme is proposed.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122432485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Distributed Spiders System Based on Web Service","authors":"Liu Guangli, Z. Hongbin","doi":"10.1109/WMWA.2009.15","DOIUrl":"https://doi.org/10.1109/WMWA.2009.15","url":null,"abstract":"A distributed spiders antitype was designed by Web Service based on Service-Oriented Architecture(SOA).This antitype is made up of a server and several clients. The clients are controlled to download a new web page by the server according to the crawled pages. Moreover, they must manage the To Crawl , Crawled URL queues and Noise URL queue after analyzing it by multi-threads. Furthermore, they keep connection with the server to pass the unknown URL and domain names. The server is made up of the front platform and the background. The front platform controls the clients including the design of load balance policy and real-time monitoring of clients by Microsoft Message Queue(MSMQ). Web service is deployed on the server background which contains the structure of persistent data connection. With the help of this structure, the front platform and the clients can access data by the normative interface. Finally, a lot of experiments were done which show that the distributed spiders system has good robust performance.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Construction of Autonomous-resource Systems in “Zero-approach” Teaching Mode Based on Web","authors":"X. Tian","doi":"10.1109/WMWA.2009.42","DOIUrl":"https://doi.org/10.1109/WMWA.2009.42","url":null,"abstract":"With the teaching reform, \"zero-approach\"teaching mode has been much more popular than before. The core spirit of the reform is to develop autonomy of students in universities. During the course of development, autonomous-material system is necessary to be built based on web. The author has investigated the mode and put forward some useful measures to comply with present teaching reform in universities.In the investigation,the author paid much attention to the usages of methods of natural field observation and analytic statistical ones to get some effective conclusions.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}