首页 > 最新文献

J. Chem. Inf. Comput. Sci.最新文献

英文 中文
Representation and Reasoning with Probabilistic TCP-nets 概率tcp网络的表示与推理
Pub Date : 2018-10-16 DOI: 10.5539/cis.v11n4p9
Sultan Ahmed, Malek Mouhoub
TCP-nets are graphical tools for modeling user's preference and relative importance statements. We propose the Prob-abilistic TCP-net (PTCP-net) model that can aggregate a set of TCP-nets, in a compact form, sharing the same set of variables and their domains but having different preference and relative importance statements. In particular, the PTCP-net is able to aggregate the choices of multiple users such as, in recommender systems. The PTCP-net can also be seen as an extension of the TCP-net with uncertainty on preference and relative importance statements. We adopt the Bayesian Network as the reasoning tool for PTCP-nets especially when answering the following two queries (1) finding the most probable TCP-net and (2) finding the most probable optimal outcome. We also show that the PTCP-net is applicable in collaborative filtering type recommender systems.
tcp -net是为用户偏好和相对重要性陈述建模的图形工具。我们提出了一种probabilistic TCP-net (PTCP-net)模型,该模型可以以紧凑的形式聚合一组TCP-net,这些TCP-net共享同一组变量及其域,但具有不同的偏好和相对重要性陈述。特别是,PTCP-net能够聚合多个用户的选择,例如在推荐系统中。PTCP-net也可以看作是TCP-net的延伸,在偏好和相对重要性声明上具有不确定性。我们采用贝叶斯网络作为PTCP-nets的推理工具,特别是在回答以下两个查询(1)找到最可能的TCP-net和(2)找到最可能的最优结果时。我们还证明了PTCP-net适用于协同过滤类型的推荐系统。
{"title":"Representation and Reasoning with Probabilistic TCP-nets","authors":"Sultan Ahmed, Malek Mouhoub","doi":"10.5539/cis.v11n4p9","DOIUrl":"https://doi.org/10.5539/cis.v11n4p9","url":null,"abstract":"TCP-nets are graphical tools for modeling user's preference and relative importance statements. We propose the Prob-abilistic TCP-net (PTCP-net) model that can aggregate a set of TCP-nets, in a compact form, sharing the same set of variables and their domains but having different preference and relative importance statements. In particular, the PTCP-net is able to aggregate the choices of multiple users such as, in recommender systems. The PTCP-net can also be seen as an extension of the TCP-net with uncertainty on preference and relative importance statements. We adopt the Bayesian Network as the reasoning tool for PTCP-nets especially when answering the following two queries (1) finding the most probable TCP-net and (2) finding the most probable optimal outcome. We also show that the PTCP-net is applicable in collaborative filtering type recommender systems.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"1 1","pages":"9-28"},"PeriodicalIF":0.0,"publicationDate":"2018-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90269396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Location Fingerprint Database Filter Algorithm Based on Multi-Mapping Data Structure 基于多映射数据结构的位置指纹数据库过滤算法
Pub Date : 2018-10-16 DOI: 10.5539/cis.v11n4p29
Xun Li, Zegang Xie
The key to improve the precision of location fingerprinting algorithm is to reduce the errors between the position vectors in online locating process and the tag vector of the database in offline process. In view of the large errors caused by the construction of locating tags built from a single vector in traditional offline database, this paper proposed a kind of locating mapping tags for establishing the multi-mapping data structure and the offline database, which adapt better the distribution characteristics of RSSI signals in WIFI. Experiments showed that the offline database constructed by the methods effectively match the current actual position, reduce errors, and significantly improve the matching accuracy.
提高位置指纹识别算法精度的关键是减少在线定位过程中位置向量与离线定位过程中数据库标签向量之间的误差。针对传统离线数据库中以单一向量构建定位标签所造成的较大误差,本文提出了一种定位映射标签,用于建立多映射数据结构和离线数据库,该定位映射标签更适应WIFI中RSSI信号的分布特点。实验表明,该方法构建的离线数据库能够有效匹配当前实际位置,减少误差,显著提高匹配精度。
{"title":"Location Fingerprint Database Filter Algorithm Based on Multi-Mapping Data Structure","authors":"Xun Li, Zegang Xie","doi":"10.5539/cis.v11n4p29","DOIUrl":"https://doi.org/10.5539/cis.v11n4p29","url":null,"abstract":"The key to improve the precision of location fingerprinting algorithm is to reduce the errors between the position vectors in online locating process and the tag vector of the database in offline process. In view of the large errors caused by the construction of locating tags built from a single vector in traditional offline database, this paper proposed a kind of locating mapping tags for establishing the multi-mapping data structure and the offline database, which adapt better the distribution characteristics of RSSI signals in WIFI. Experiments showed that the offline database constructed by the methods effectively match the current actual position, reduce errors, and significantly improve the matching accuracy.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"8 1","pages":"29-35"},"PeriodicalIF":0.0,"publicationDate":"2018-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79016807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT ReDy Architecture for Smart Grid Management 面向智能电网管理的物联网ready架构
Pub Date : 2018-10-16 DOI: 10.5539/cis.v11n4p36
K. Hafdi, Abderahman Kriouile, A. Kriouile
Smart Grid introduces intelligent infrastructure to the existing power grid. Energy production is no longer confined just to large power plants, but is becoming geographically distributed on small renewable energy plants that can inject electricity directly into the grid. IoT proposes a good solution to connect the producers to the consumers and to propose a reactive balancing of power production and consumption. The ReDy architecture, which is intended for IoT applications, provides a base to implement a scalable, reliable, and dynamic IoT network ready to meet Smart Grid needs. The different producers and consumers represent nodes of a decentralized network managed with a dynamic membership management algorithm. Each node is a centralized sub-network composed of one gateway making decisions and several sensors and actuators.
智能电网为现有电网引入了智能基础设施。能源生产不再仅仅局限于大型发电厂,而是在地理上分布在可以直接向电网注入电力的小型可再生能源发电厂。物联网为连接生产者和消费者提供了一个很好的解决方案,并提出了电力生产和消费的无功平衡。ReDy架构旨在为物联网应用提供基础,以实现可扩展、可靠和动态的物联网网络,以满足智能电网的需求。不同的生产者和消费者代表由动态会员管理算法管理的分散网络的节点。每个节点是一个集中的子网络,由一个决策网关和多个传感器和执行器组成。
{"title":"IoT ReDy Architecture for Smart Grid Management","authors":"K. Hafdi, Abderahman Kriouile, A. Kriouile","doi":"10.5539/cis.v11n4p36","DOIUrl":"https://doi.org/10.5539/cis.v11n4p36","url":null,"abstract":"Smart Grid introduces intelligent infrastructure to the existing power grid. Energy production is no longer confined just to large power plants, but is becoming geographically distributed on small renewable energy plants that can inject electricity directly into the grid. IoT proposes a good solution to connect the producers to the consumers and to propose a reactive balancing of power production and consumption. The ReDy architecture, which is intended for IoT applications, provides a base to implement a scalable, reliable, and dynamic IoT network ready to meet Smart Grid needs. The different producers and consumers represent nodes of a decentralized network managed with a dynamic membership management algorithm. Each node is a centralized sub-network composed of one gateway making decisions and several sensors and actuators.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"57 1","pages":"36-44"},"PeriodicalIF":0.0,"publicationDate":"2018-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84877399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cover Image, Volume 41, Issue 6 封面图片,第41卷,第6期
Pub Date : 2018-10-01 DOI: 10.1111/jfpe.12929
Hye Lim Lee, Su Yeon Park, D. An, Dong Sun Lee
{"title":"Cover Image, Volume 41, Issue 6","authors":"Hye Lim Lee, Su Yeon Park, D. An, Dong Sun Lee","doi":"10.1111/jfpe.12929","DOIUrl":"https://doi.org/10.1111/jfpe.12929","url":null,"abstract":"","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"91 1","pages":"C1"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77984247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Localization Algorithm Based on Linear Regression and Least Squares in NLOS Environments NLOS环境下基于线性回归和最小二乘的三维定位算法
Pub Date : 2018-09-11 DOI: 10.5539/cis.v11n4p1
Jiang Li, Lei Zhang
Based on the positive bias property of the time of arrival(TOA) measurement error caused by the non-line-of-sight(NLOS) propagation, a simple and effective three dimensional(3D) geometrical localization algorithm was proposed, the algorithm needs no prior knowledge of time delay distribution of TOA, and only linear regression was used to estimate the parameters of the relationship between the NLOS distance error and the true distance, thus, the approximate real distance between mobile terminal (MT) and base station (BS) was reduced, then, the 3D geometric localization of mobile terminal was carried out by the least square method. The experimental results shows the effectiveness of the algorithm, and the positional accuracy is far higher than the required accuracy by E-911 in NLOS environments.
基于非视距(NLOS)传播引起的到达时间(TOA)测量误差的正偏性,提出了一种简单有效的三维几何定位算法,该算法不需要预先知道TOA的时延分布,只使用线性回归估计NLOS距离误差与真距离之间的关系参数,从而实现了对到达时间(TOA)测量误差的精确定位。将移动终端(MT)与基站(BS)之间的近似真实距离进行约简,然后利用最小二乘法对移动终端进行三维几何定位。实验结果表明了该算法的有效性,定位精度远远高于E-911在近距离定位环境下所需要的精度。
{"title":"3D Localization Algorithm Based on Linear Regression and Least Squares in NLOS Environments","authors":"Jiang Li, Lei Zhang","doi":"10.5539/cis.v11n4p1","DOIUrl":"https://doi.org/10.5539/cis.v11n4p1","url":null,"abstract":"Based on the positive bias property of the time of arrival(TOA) measurement error caused by the non-line-of-sight(NLOS) propagation, a simple and effective three dimensional(3D) geometrical localization algorithm was proposed, the algorithm needs no prior knowledge of time delay distribution of TOA, and only linear regression was used to estimate the parameters of the relationship between the NLOS distance error and the true distance, thus, the approximate real distance between mobile terminal (MT) and base station (BS) was reduced, then, the 3D geometric localization of mobile terminal was carried out by the least square method. The experimental results shows the effectiveness of the algorithm, and the positional accuracy is far higher than the required accuracy by E-911 in NLOS environments.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"36 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86611762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strategy to Promote Professional Reading in University Libraries 促进高校图书馆专业阅读的策略
Pub Date : 2018-07-29 DOI: 10.5539/cis.v11n3p95
Yunxia Zhou, Xiaozhu Zou
Reading promotion in university libraries needs to consider the differences in reading behavior of different readers and adopt suitable reading promotion strategies. Here, we first review the current situation of professional reading promotion and distinguish the demand characteristics of different types of readers. Then we conduct personal interviews with graduate students in Nanjing University of Aeronautics and Astronautics, and results demonstrate that the demands of graduate students for information on professional reading promotion and reading professional books and literatures become their indispensable demands in reading. Therefore, the visible display strategy to professional reading promotion is suggested for university libraries. Finally, taking an example of the reading promotion for zero-borrowing professional books, it is proved that the proposed strategy can increase the proportion of borrowed books and promote professional reading. In summary, we use tangible display strategy as theoretical basis and testify the proposed strategy for professional reading promotion: 1) a special cabinet displaying relevant professional books, 2) resources and charts, 3) placing bookshelves of stereoscopic models, and 4) designing and distributing a reading brochure.
高校图书馆的阅读推广需要考虑不同读者阅读行为的差异,采取合适的阅读推广策略。在这里,我们首先回顾专业阅读推广的现状,区分不同类型读者的需求特征。然后,我们对南京航空航天大学的研究生进行了个人访谈,结果表明,研究生对专业阅读推广信息和阅读专业书籍文献的需求成为他们在阅读中不可或缺的需求。为此,提出了高校图书馆专业阅读推广的可视化展示策略。最后,以零借阅专业图书的阅读推广为例,证明了所提出的策略可以提高借阅比例,促进专业阅读。综上所述,我们以有形展示策略为理论依据,验证了所提出的专业阅读推广策略:1)专用柜展示相关专业书籍,2)资源与图表,3)立体模型书架放置,4)阅读宣传册设计与发行。
{"title":"Strategy to Promote Professional Reading in University Libraries","authors":"Yunxia Zhou, Xiaozhu Zou","doi":"10.5539/cis.v11n3p95","DOIUrl":"https://doi.org/10.5539/cis.v11n3p95","url":null,"abstract":"Reading promotion in university libraries needs to consider the differences in reading behavior of different readers and adopt suitable reading promotion strategies. Here, we first review the current situation of professional reading promotion and distinguish the demand characteristics of different types of readers. Then we conduct personal interviews with graduate students in Nanjing University of Aeronautics and Astronautics, and results demonstrate that the demands of graduate students for information on professional reading promotion and reading professional books and literatures become their indispensable demands in reading. Therefore, the visible display strategy to professional reading promotion is suggested for university libraries. Finally, taking an example of the reading promotion for zero-borrowing professional books, it is proved that the proposed strategy can increase the proportion of borrowed books and promote professional reading. In summary, we use tangible display strategy as theoretical basis and testify the proposed strategy for professional reading promotion: 1) a special cabinet displaying relevant professional books, 2) resources and charts, 3) placing bookshelves of stereoscopic models, and 4) designing and distributing a reading brochure.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"71 1","pages":"95-101"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82283735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Brilliant Scheduler: Automated Scheduling System for Video Conferencing Courses 卓越的调度:视频会议课程的自动调度系统
Pub Date : 2018-07-29 DOI: 10.5539/cis.v11n3p82
Maram Meccawy
The study aims to investigate the problems and drawbacks associated with the present scheduling process for courses of video-conferencing, conducted at Administration of Educational Media at KAU (King Abdul-Aziz University). In KAU, male and female campuses are almost entirely segregated. The number of male staff and the diversity of their academic specialties is higher than those of their female counter parts. Hence, some subjects are taught to female students by male faculty, while utilizing videoconferencing technology. This research investigates the main challenges, faced by the Administration of Educational Media at King Abdul-Aziz University in scheduling video conferencing courses for classrooms reservation requests. It provides a complete list of tools and features to enhance, support, and automate the scheduling process for classrooms and supervisors, following Rapid Application development (RAD) methodology. The system has been implemented as a web-based automated scheduling system to undertake the capability of technology and to create an influential scheduling system. This system might also help in the migration of traditional paper-based work to a better technological environment, satisfied employees, and faster feedbacks.
本研究旨在探讨现时视讯会议课程排课过程中存在的问题及不足,由国王阿卜杜勒-阿齐兹大学教育传媒管理学院进行。在KAU,男女校园几乎完全隔离。男性工作人员的数量及其学术专业的多样性高于女性工作人员。因此,一些科目由男教师通过视频会议技术教授给女学生。本研究调查了阿卜杜勒-阿齐兹国王大学教育媒体管理局在为教室预订请求安排视频会议课程时面临的主要挑战。它提供了一个完整的工具和功能列表,以增强、支持和自动化教室和主管的调度过程,遵循快速应用程序开发(RAD)方法。该系统已实现为基于web的自动化调度系统,以承担技术能力,创建一个有影响力的调度系统。该系统还可能有助于将传统的纸质工作迁移到更好的技术环境、满意的员工和更快的反馈。
{"title":"The Brilliant Scheduler: Automated Scheduling System for Video Conferencing Courses","authors":"Maram Meccawy","doi":"10.5539/cis.v11n3p82","DOIUrl":"https://doi.org/10.5539/cis.v11n3p82","url":null,"abstract":"The study aims to investigate the problems and drawbacks associated with the present scheduling process for courses of video-conferencing, conducted at Administration of Educational Media at KAU (King Abdul-Aziz University). In KAU, male and female campuses are almost entirely segregated. The number of male staff and the diversity of their academic specialties is higher than those of their female counter parts. Hence, some subjects are taught to female students by male faculty, while utilizing videoconferencing technology. This research investigates the main challenges, faced by the Administration of Educational Media at King Abdul-Aziz University in scheduling video conferencing courses for classrooms reservation requests. It provides a complete list of tools and features to enhance, support, and automate the scheduling process for classrooms and supervisors, following Rapid Application development (RAD) methodology. The system has been implemented as a web-based automated scheduling system to undertake the capability of technology and to create an influential scheduling system. This system might also help in the migration of traditional paper-based work to a better technological environment, satisfied employees, and faster feedbacks.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"19 1","pages":"82-88"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83301590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System 无线入侵检测系统中对抗虚警的机器学习方法
Pub Date : 2018-07-29 DOI: 10.5539/cis.v11n3p67
D. Vijayakumar, S. Ganapathy
Wireless Networks facilitate the ease of communication for sharing the crucial information. Recently, most of the small and large-scale companies, educational institutions, government organizations, medical sectors, military and banking sectors are using the wireless networks. Security threats, a common term found both in wired as well as in wireless networks. However, it holds lot of importance in wireless networks because of its susceptible nature to threats. Security concerns in WLAN are studied and many organizations concluded that Wireless Intrusion Detection Systems (WIDS) is an essential element in network security infrastructure to monitor wireless activity for signs of attacks. However, it is an indisputable fact that the art of detecting attacks remains in its infancy. WIDS generally collect the activities within the protected network and analyze them to detect intrusions and generates an intrusion alarm. Irrespective of the different types of Intrusion Detection Systems, the major problems arising with WIDS is its inability to handle large volumes of alarms and more prone to false alarm attacks. Reducing the false alarms can improve the overall efficiency of the WIDS. Many techniques have been proposed in the literature to reduce the false alarm rates. However, most of the existing techniques are failed to provide desirable result and the high complexity to achieve high detection rate with less false alarm rates. This is the right time to propose a new technique for providing high detection accuracy with less false alarm rate. This paper made an extensive survey about the role of machine learning techniques to reduce the false alarm rate in WLAN IEEE 802.11. This survey proved that the substantial improvement has been achieved by reducing false alarm rate through machine learning algorithms. In addition to that, advancements specific to machine learning approaches is studied meticulously and a filtration technique is proposed.
无线网络为重要信息的共享提供了便利。最近,大部分中小企业、教育机关、政府机关、医疗部门、军队、银行等都在使用无线网络。安全威胁是有线和无线网络中常见的术语。然而,由于其易受威胁的特性,它在无线网络中占有重要地位。对WLAN的安全问题进行了研究,许多组织得出结论,无线入侵检测系统(WIDS)是网络安全基础设施中监视无线活动以发现攻击迹象的基本要素。然而,检测攻击的技术仍处于初级阶段,这是一个不争的事实。WIDS通常收集被保护网络内的活动,并对其进行分析,以检测入侵并产生入侵告警。不管不同类型的入侵检测系统,WIDS的主要问题是它无法处理大量的警报,而且更容易受到假警报攻击。减少虚警可以提高WIDS的整体效率。文献中提出了许多降低误报率的方法。然而,现有的大多数检测技术都无法提供理想的检测结果,并且在实现高检测率和低虚警率方面存在较高的复杂性。在这种情况下,提出一种既能提高检测精度又能降低误报率的新技术正是时候。本文对机器学习技术在WLAN IEEE 802.11中降低虚警率的作用进行了广泛的研究。这项调查证明,通过机器学习算法降低误报率已经取得了实质性的改善。除此之外,对机器学习方法的具体进展进行了细致的研究,并提出了一种过滤技术。
{"title":"Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System","authors":"D. Vijayakumar, S. Ganapathy","doi":"10.5539/cis.v11n3p67","DOIUrl":"https://doi.org/10.5539/cis.v11n3p67","url":null,"abstract":"Wireless Networks facilitate the ease of communication for sharing the crucial information. Recently, most of the small and large-scale companies, educational institutions, government organizations, medical sectors, military and banking sectors are using the wireless networks. Security threats, a common term found both in wired as well as in wireless networks. However, it holds lot of importance in wireless networks because of its susceptible nature to threats. Security concerns in WLAN are studied and many organizations concluded that Wireless Intrusion Detection Systems (WIDS) is an essential element in network security infrastructure to monitor wireless activity for signs of attacks. However, it is an indisputable fact that the art of detecting attacks remains in its infancy. WIDS generally collect the activities within the protected network and analyze them to detect intrusions and generates an intrusion alarm. Irrespective of the different types of Intrusion Detection Systems, the major problems arising with WIDS is its inability to handle large volumes of alarms and more prone to false alarm attacks. Reducing the false alarms can improve the overall efficiency of the WIDS. Many techniques have been proposed in the literature to reduce the false alarm rates. However, most of the existing techniques are failed to provide desirable result and the high complexity to achieve high detection rate with less false alarm rates. This is the right time to propose a new technique for providing high detection accuracy with less false alarm rate. This paper made an extensive survey about the role of machine learning techniques to reduce the false alarm rate in WLAN IEEE 802.11. This survey proved that the substantial improvement has been achieved by reducing false alarm rate through machine learning algorithms. In addition to that, advancements specific to machine learning approaches is studied meticulously and a filtration technique is proposed.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"77 1","pages":"67-81"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85520640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Identity Management Systems: Techno-Semantic Interoperability for Heterogeneous Federated Systems 身份管理系统:异构联邦系统的技术语义互操作性
Pub Date : 2018-07-29 DOI: 10.5539/cis.v11n3p102
Hasnae L'Amrani, Y. Idrissi, R. Ajhoun
The identity management domain is a huge research domain. The federated systems proved on theirs legibility to solve a several digital identity issues. However, the problem of interoperability between federations is the researcher first issue. The researchers final goal is creating a federation of federations which is a large meta-system composed of several different federation systems. The previous researchers’ technical interoperability approach solved a part of the above-mentioned issue. However, there are some-others problems in the communication process between federated systems. In this work, the researcher target the semantic interoperability as a solution to solve the exchange of attribute issue among heterogeneous federated systems, because there is a significant need of managing the users’ attributes coming from different federations. Therefore, the researcher proposed a semantic layer to enhance the previous technical approach with the aim to guarantee the exchange of attribute that has the same semantic signification but a different representation, all that based on a mapping and matching between different anthologies. This approach will be applied to the academic domain as the researcher application domain.
身份管理领域是一个庞大的研究领域。联邦系统证明了它们的易读性,可以解决几个数字身份问题。然而,联盟之间的互操作性问题是研究人员面临的首要问题。研究人员的最终目标是创建一个联邦的联邦,这是一个由几个不同的联邦系统组成的大型元系统。前人提出的技术互操作性方法在一定程度上解决了上述问题。然而,在联邦系统之间的通信过程中还存在其他一些问题。由于需要对来自不同联邦的用户属性进行管理,本文将语义互操作性作为解决异构联邦系统间属性交换问题的解决方案。为此,本文提出了一种语义层,对原有的技术方法进行了改进,以保证具有相同语义意义但不同表示的属性之间的交换,所有这些都是基于不同集合之间的映射和匹配。该方法将作为研究人员应用领域应用于学术领域。
{"title":"Identity Management Systems: Techno-Semantic Interoperability for Heterogeneous Federated Systems","authors":"Hasnae L'Amrani, Y. Idrissi, R. Ajhoun","doi":"10.5539/cis.v11n3p102","DOIUrl":"https://doi.org/10.5539/cis.v11n3p102","url":null,"abstract":"The identity management domain is a huge research domain. The federated systems proved on theirs legibility to solve a several digital identity issues. However, the problem of interoperability between federations is the researcher first issue. The researchers final goal is creating a federation of federations which is a large meta-system composed of several different federation systems. The previous researchers’ technical interoperability approach solved a part of the above-mentioned issue. However, there are some-others problems in the communication process between federated systems. In this work, the researcher target the semantic interoperability as a solution to solve the exchange of attribute issue among heterogeneous federated systems, because there is a significant need of managing the users’ attributes coming from different federations. Therefore, the researcher proposed a semantic layer to enhance the previous technical approach with the aim to guarantee the exchange of attribute that has the same semantic signification but a different representation, all that based on a mapping and matching between different anthologies. This approach will be applied to the academic domain as the researcher application domain.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"23 2 1","pages":"102-111"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73031158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of China HowNet Knowledge Map Generation Module Literature 中国知网知识地图生成模块文献的设计与实现
Pub Date : 2018-07-29 DOI: 10.5539/cis.v11n3p89
L. Wei
Based on the analysis of the construction technology of the existing literature knowledge map, a China HowNet (CNKI) method for automatic generation of literature knowledge map. This paper according to the qualification to collect related data of the web page; Second original web data analysis, and design knowledge map structure; By determining the entity, after extracting properties and associated knowledge; And knowledge to the automatic mapping for secondary image database of Cypher code; Finally build the direction of our school language information processing of CNKI, included the literature of knowledge map. Automatic and efficient knowledge map construction in the evolution of discipline has great practical significance, methods and conclusions of this paper can provide literature research, the researchers in the field of knowledge map building and information visualization to provide enlightenment and reference.
在分析现有文献知识地图构建技术的基础上,提出了一种中国知网(CNKI)文献知识地图自动生成方法。本文根据资质来收集网页的相关数据;其次对原始网页数据进行分析,并设计知识图谱结构;通过确定实体,提取属性和相关知识;并对Cypher代码的二次图像数据库自动映射有一定的了解;最后构建我校语文信息处理方向的CNKI,包括文献知识图谱。自动高效的知识地图构建在学科演进中具有重大的现实意义,本文的方法和结论可以为文献研究、知识地图构建和信息可视化领域的研究者提供启示和参考。
{"title":"Design and Implementation of China HowNet Knowledge Map Generation Module Literature","authors":"L. Wei","doi":"10.5539/cis.v11n3p89","DOIUrl":"https://doi.org/10.5539/cis.v11n3p89","url":null,"abstract":"Based on the analysis of the construction technology of the existing literature knowledge map, a China HowNet (CNKI) method for automatic generation of literature knowledge map. This paper according to the qualification to collect related data of the web page; Second original web data analysis, and design knowledge map structure; By determining the entity, after extracting properties and associated knowledge; And knowledge to the automatic mapping for secondary image database of Cypher code; Finally build the direction of our school language information processing of CNKI, included the literature of knowledge map. Automatic and efficient knowledge map construction in the evolution of discipline has great practical significance, methods and conclusions of this paper can provide literature research, the researchers in the field of knowledge map building and information visualization to provide enlightenment and reference.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"53 1","pages":"89-94"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86307321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
J. Chem. Inf. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1