首页 > 最新文献

2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
Predicting return reversal through a two-stage method 通过两阶段法预测收益反转
Shuai Zhao, Yunhai Tong, Xiangfeng Meng, Xianglin Yang, Shaohua Tan
In the stock market, return reversal happens when investors sell overbought stocks and buy oversold stocks, making the trends of the stocks' prices reverse. While existing studies mainly focused on developing theories to explain the cause of return reversal, we aim at predicting return reversal by proposing a two-stage method in this paper. In the first stage, we employ dynamical Bayesian factor graph (DBFG) to select key factors correlating with return reversal closely from a comprehensive set of economic factors. In the second stage, we input the key factors into artificial neural network (ANN), support vector machine (SVM) and hidden Markov model (HMM) respectively, to accomplish the prediction of return reversal. Through extensive experiments on the US stock market, we establish that the key factors influencing return reversal generally change from year to year, yet factors related to the economic theory of liquidity effect consistently emerge as part of the key factors. Besides, DBFG-ANN achieves the most accurate prediction among the models, leading to precisions above 60%.
在股票市场中,当投资者卖出超买股票并买入超卖股票时,股票价格的走势就会发生反转。现有的研究主要集中在发展理论来解释回报逆转的原因,而本文提出了一种两阶段方法来预测回报逆转。在第一阶段,我们采用动态贝叶斯因子图(DBFG)从综合的经济因素中选择与收益反转密切相关的关键因素。在第二阶段,我们将关键因素分别输入到人工神经网络(ANN)、支持向量机(SVM)和隐马尔可夫模型(HMM)中,完成回归反转的预测。通过对美国股票市场的大量实验,我们发现影响收益率反转的关键因素通常每年都在变化,但与流动性效应经济理论相关的因素始终作为关键因素的一部分出现。DBFG-ANN的预测精度在60%以上,是所有模型中最准确的。
{"title":"Predicting return reversal through a two-stage method","authors":"Shuai Zhao, Yunhai Tong, Xiangfeng Meng, Xianglin Yang, Shaohua Tan","doi":"10.1109/ICSESS.2016.7883081","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883081","url":null,"abstract":"In the stock market, return reversal happens when investors sell overbought stocks and buy oversold stocks, making the trends of the stocks' prices reverse. While existing studies mainly focused on developing theories to explain the cause of return reversal, we aim at predicting return reversal by proposing a two-stage method in this paper. In the first stage, we employ dynamical Bayesian factor graph (DBFG) to select key factors correlating with return reversal closely from a comprehensive set of economic factors. In the second stage, we input the key factors into artificial neural network (ANN), support vector machine (SVM) and hidden Markov model (HMM) respectively, to accomplish the prediction of return reversal. Through extensive experiments on the US stock market, we establish that the key factors influencing return reversal generally change from year to year, yet factors related to the economic theory of liquidity effect consistently emerge as part of the key factors. Besides, DBFG-ANN achieves the most accurate prediction among the models, leading to precisions above 60%.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coverage model of multi beam antenna from high altitude platform in the swing state 摆动状态下高空平台多波束天线的覆盖模型
He Panfeng, Cheng Naiping, Ni Shuyan
Affected by the stratosphere winds, the swing of high altitude platform station seriously affected the performance of the communication system. This paper described and analyzed the swing state of the platform, established the swing state of high altitude platform multi beam antenna coverage model. The expression of coverage geometry, received power and carrier interference ratio was derived. In the swing state, the performance of multi beam antenna is simulated and analyzed, which provides a theoretical reference for the future design of multi beam cell.
受平流层风的影响,高空台站的摆动严重影响了通信系统的性能。本文对平台的摆动状态进行了描述和分析,建立了摆动状态下高空平台多波束天线覆盖模型。推导了覆盖几何、接收功率和载波干扰比的表达式。在摆动状态下,对多波束天线的性能进行了仿真分析,为今后多波束小区的设计提供理论参考。
{"title":"Coverage model of multi beam antenna from high altitude platform in the swing state","authors":"He Panfeng, Cheng Naiping, Ni Shuyan","doi":"10.1109/ICSESS.2016.7883176","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883176","url":null,"abstract":"Affected by the stratosphere winds, the swing of high altitude platform station seriously affected the performance of the communication system. This paper described and analyzed the swing state of the platform, established the swing state of high altitude platform multi beam antenna coverage model. The expression of coverage geometry, received power and carrier interference ratio was derived. In the swing state, the performance of multi beam antenna is simulated and analyzed, which provides a theoretical reference for the future design of multi beam cell.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126355726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location technology of indoor robot based on laser sensor 基于激光传感器的室内机器人定位技术
Yu Zhao, Fenglian Liu, Riwei Wang
In order to solve existed accumulative error and SLAM problem for dead reckoning, this paper was proposed a positioning method combining with the known structured environment based on Extended Kalman Filter algorithm (EKF). This method quickly extracts the information of border and corner. According to the feature mapping relationships between world coordinate system and local coordinate system, calculate the robot's position and orientation space in the scene by matching the modeled environmental information. This method that we proposed achieved a better accuracy, timeliness and correctness.
针对航位推算中存在的累积误差和SLAM问题,提出了一种结合已知结构环境的扩展卡尔曼滤波(EKF)定位方法。该方法可以快速提取图像的边角信息。根据世界坐标系与局部坐标系之间的特征映射关系,通过匹配建模的环境信息,计算机器人在场景中的位置和方向空间。该方法具有较好的准确性、及时性和正确性。
{"title":"Location technology of indoor robot based on laser sensor","authors":"Yu Zhao, Fenglian Liu, Riwei Wang","doi":"10.1109/ICSESS.2016.7883160","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883160","url":null,"abstract":"In order to solve existed accumulative error and SLAM problem for dead reckoning, this paper was proposed a positioning method combining with the known structured environment based on Extended Kalman Filter algorithm (EKF). This method quickly extracts the information of border and corner. According to the feature mapping relationships between world coordinate system and local coordinate system, calculate the robot's position and orientation space in the scene by matching the modeled environmental information. This method that we proposed achieved a better accuracy, timeliness and correctness.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Named Entity Recognition using Machine learning techniques for Telugu language 使用泰卢固语机器学习技术的命名实体识别
M. H. Khanam, Md.A. Khudhus, M. Babu
In this paper, we depict hybrid approach, i.e., combination of rule based approach and machine learning techniques, i.e Conditional Random Fields (CRF) for Named Entity Recognition (NER). The main objective of Named Entity Recognition is to categorize all Named Entities (NE) in a document into predefined classes like Person name, Location name, Organization name. This paper first outlines the Named Entity Recognizer using rule based approach. In this approach we prepared Gazette lists for names of persons, locations and organizations, some suffix and prefix features and dictionary consist of 200000 words to recognize the category of names entities. Further, we used Machine learning technique, i.e., CRF in order to improve the accuracy of the system.
在本文中,我们描述了混合方法,即基于规则的方法和机器学习技术的结合,即用于命名实体识别(NER)的条件随机场(CRF)。命名实体识别的主要目标是将文档中的所有命名实体(NE)分类为预定义的类,如人名、位置名称、组织名称。本文首先概述了基于规则方法的命名实体识别器。在该方法中,我们编制了人员、地点和组织名称的公报列表,一些后缀和前缀特征以及包含20万个单词的字典来识别名称实体的类别。此外,我们使用机器学习技术,即CRF来提高系统的准确性。
{"title":"Named Entity Recognition using Machine learning techniques for Telugu language","authors":"M. H. Khanam, Md.A. Khudhus, M. Babu","doi":"10.1109/ICSESS.2016.7883220","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883220","url":null,"abstract":"In this paper, we depict hybrid approach, i.e., combination of rule based approach and machine learning techniques, i.e Conditional Random Fields (CRF) for Named Entity Recognition (NER). The main objective of Named Entity Recognition is to categorize all Named Entities (NE) in a document into predefined classes like Person name, Location name, Organization name. This paper first outlines the Named Entity Recognizer using rule based approach. In this approach we prepared Gazette lists for names of persons, locations and organizations, some suffix and prefix features and dictionary consist of 200000 words to recognize the category of names entities. Further, we used Machine learning technique, i.e., CRF in order to improve the accuracy of the system.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121143989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Short-term load forecasting model for metro power supply system based on echo state neural network 基于回波状态神经网络的地铁供电系统短期负荷预测模型
Yu Litao, Han Aoyang, Wang Li, Jia Xu, Zhang Zhisheng
The paper presents a short-term load forecasting model for metro power supply system based on echo state neural network. Echo state neural network composed of input layer, reserve pool, the output layer. Reserve pool as a dynamic network is connected by a large number of random sparse of neurons. Reserve pool is used to overcome the slow convergence speed and avoid neural network into the local minimum. Using the actual historical data of the metro power supply system to simulate, the simulation results show that the short-term load forecasting model for metro power supply system based on echo state neural network has good prediction accuracy.
提出了一种基于回波状态神经网络的地铁供电系统短期负荷预测模型。回声状态神经网络由输入层、储备池、输出层组成。储备池作为一个动态网络,由大量随机稀疏的神经元连接而成。利用储备池克服了收敛速度慢的问题,避免了神经网络陷入局部极小值。利用地铁供电系统的实际历史数据进行仿真,仿真结果表明,基于回波状态神经网络的地铁供电系统短期负荷预测模型具有较好的预测精度。
{"title":"Short-term load forecasting model for metro power supply system based on echo state neural network","authors":"Yu Litao, Han Aoyang, Wang Li, Jia Xu, Zhang Zhisheng","doi":"10.1109/ICSESS.2016.7883212","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883212","url":null,"abstract":"The paper presents a short-term load forecasting model for metro power supply system based on echo state neural network. Echo state neural network composed of input layer, reserve pool, the output layer. Reserve pool as a dynamic network is connected by a large number of random sparse of neurons. Reserve pool is used to overcome the slow convergence speed and avoid neural network into the local minimum. Using the actual historical data of the metro power supply system to simulate, the simulation results show that the short-term load forecasting model for metro power supply system based on echo state neural network has good prediction accuracy.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121212655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploring the power of resource allocation for Spark executor 探索Spark执行器的资源分配能力
Huihong He, Yan Li, Yanfei Lv, Yong Wang
Nowadays Spark has been widely adopted as a sharp blade in solving big data problems by pipelining tasks of jobs on each node of cluster. In order to improve cluster resource utilization, lots of Spark performance-tuning advices have been proposed both by Spark and researchers. However, we notice that most of these advices focus tuning configuration items in isolation without considering job characteristics. In this paper, we try to explore the impact of executor quota allocation for Spark job in consideration of job stages and size of input. Dozens of carefully designed experiments reveal that execution time among job stages varies in probability as executor quota changes and thus the job execution time varies. We believe this conclusion helps to shed light on allocating executor resource quota regarding to job characteristics.
如今,Spark作为解决大数据问题的一把利刃,被广泛采用,它将作业的任务流水线化到集群的每个节点上。为了提高集群资源利用率,Spark和研究人员提出了许多Spark性能调优建议。但是,我们注意到,这些建议中的大多数都是单独关注调优配置项,而不考虑作业特征。在本文中,我们尝试在考虑作业阶段和输入大小的情况下探索执行器配额分配对Spark作业的影响。数十个精心设计的实验表明,作业阶段之间的执行时间随执行器配额的变化而发生概率变化,从而导致作业执行时间的变化。我们认为,这一结论有助于揭示根据工作特征分配执行者资源配额的问题。
{"title":"Exploring the power of resource allocation for Spark executor","authors":"Huihong He, Yan Li, Yanfei Lv, Yong Wang","doi":"10.1109/ICSESS.2016.7883042","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883042","url":null,"abstract":"Nowadays Spark has been widely adopted as a sharp blade in solving big data problems by pipelining tasks of jobs on each node of cluster. In order to improve cluster resource utilization, lots of Spark performance-tuning advices have been proposed both by Spark and researchers. However, we notice that most of these advices focus tuning configuration items in isolation without considering job characteristics. In this paper, we try to explore the impact of executor quota allocation for Spark job in consideration of job stages and size of input. Dozens of carefully designed experiments reveal that execution time among job stages varies in probability as executor quota changes and thus the job execution time varies. We believe this conclusion helps to shed light on allocating executor resource quota regarding to job characteristics.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123285389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implement a safe method for isolating memory based on Xen cloud environment 设计并实现了一种基于Xen云环境的安全内存隔离方法
Y. Liu
In view of the present cloud security problem which has been becoming one of the major obstacles hindering the development of the cloud increasingly, put forward a kind of technology implementation of memory security isolation based on Xen. And based on the Xen virtual machine monitor system, analysis the implementation approach of memory virtualization in the model, using Xen virtualization system memory's super calls and authorization table mechanism, design the security memory isolation system with the basics of virtual machine manager internal implementation of access control module (ACM). Experiments show that the system can effectively isolate the memory data between different customer domain OS illegal access.
针对目前云安全问题日益成为阻碍云发展的主要障碍之一,提出了一种基于Xen的内存安全隔离的技术实现。并以Xen虚拟机监控系统为基础,分析了该模型中内存虚拟化的实现方法,利用Xen虚拟化系统内存的超级调用和授权表机制,设计了安全的内存隔离系统,与虚拟机管理器内部实现访问控制模块(ACM)的基础。实验表明,该系统能有效隔离不同客户域操作系统之间的内存数据非法访问。
{"title":"Design and implement a safe method for isolating memory based on Xen cloud environment","authors":"Y. Liu","doi":"10.1109/ICSESS.2016.7883189","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883189","url":null,"abstract":"In view of the present cloud security problem which has been becoming one of the major obstacles hindering the development of the cloud increasingly, put forward a kind of technology implementation of memory security isolation based on Xen. And based on the Xen virtual machine monitor system, analysis the implementation approach of memory virtualization in the model, using Xen virtualization system memory's super calls and authorization table mechanism, design the security memory isolation system with the basics of virtual machine manager internal implementation of access control module (ACM). Experiments show that the system can effectively isolate the memory data between different customer domain OS illegal access.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of web security model based on Zero Knowledge Protocol 基于零知识协议的web安全模型研究
Amro Louay Al-Bajjari, Ling Yuan
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication property implemented by using Zero Knowledge Protocol (ZKP), the integrity property implemented by using HMAC, and the confidentiality property implemented by using AES. The web security model can demonstrate to handle the man-in-the-middle attack.
本文主要是设计和实现一个web安全模型,以保护网络免受任何潜在的威胁和攻击。当双方在不安全的通道上交换电子邮件和信息时,可以使用优化的零知识协议的web安全模型来识别双方之间的身份验证。该安全模型可以实现零知识协议(Zero Knowledge Protocol, ZKP)实现的认证属性、HMAC实现的完整性属性和AES实现的机密性属性。web安全模型可以演示如何处理中间人攻击。
{"title":"Research of web security model based on Zero Knowledge Protocol","authors":"Amro Louay Al-Bajjari, Ling Yuan","doi":"10.1109/ICSESS.2016.7883017","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883017","url":null,"abstract":"This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication property implemented by using Zero Knowledge Protocol (ZKP), the integrity property implemented by using HMAC, and the confidentiality property implemented by using AES. The web security model can demonstrate to handle the man-in-the-middle attack.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115844187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A parallel Bayesian network learning algorithm for classification 一个用于分类的并行贝叶斯网络学习算法
Jie Hu, Guoshi Wu, Pengfei Sun, Qiu Xiong
Bayesian network (BN), an important machine learning technique, has been widely used in modeling relationships among random variables. BN is considered to be suitable for tasks like prediction, classification and cause analysis. In fact, Bayesian network model often preforms better precision than other commonly used algorithm models in classification and prediction. Meanwhile, taking Max-Min-Hill-Climbing as an example, many BN structure learning algorithms are heuristic, which means the time algorithm needs to converge can grow intensively when dealing with massive calculation. This paper aims at lessening time cost of learning BN structure process. We proposed an approach combining MapReduce with MMHC method. After splitting the training data set, several sub Bayesian network structures are learned simultaneously on Hadoop. To easily integrate prediction results from all those subnets, we employed boosting method to manage classification task. Our experiment results show good precision as well as better time performance in real distributed environment.
贝叶斯网络是一种重要的机器学习技术,广泛应用于随机变量之间的关系建模。BN被认为适用于预测、分类和原因分析等任务。事实上,贝叶斯网络模型在分类和预测方面往往比其他常用的算法模型具有更好的精度。同时,以max - min - hill - climb为例,许多BN结构学习算法是启发式的,这意味着在处理大量计算时,算法需要收敛的时间会急剧增长。本文旨在减少学习BN结构过程的时间成本。我们提出了一种MapReduce与MMHC相结合的方法。将训练数据集分割后,在Hadoop上同时学习多个子贝叶斯网络结构。为了方便地整合所有子网的预测结果,我们采用提升方法来管理分类任务。实验结果表明,该方法在真实的分布式环境下具有良好的精度和时间性能。
{"title":"A parallel Bayesian network learning algorithm for classification","authors":"Jie Hu, Guoshi Wu, Pengfei Sun, Qiu Xiong","doi":"10.1109/ICSESS.2016.7883062","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883062","url":null,"abstract":"Bayesian network (BN), an important machine learning technique, has been widely used in modeling relationships among random variables. BN is considered to be suitable for tasks like prediction, classification and cause analysis. In fact, Bayesian network model often preforms better precision than other commonly used algorithm models in classification and prediction. Meanwhile, taking Max-Min-Hill-Climbing as an example, many BN structure learning algorithms are heuristic, which means the time algorithm needs to converge can grow intensively when dealing with massive calculation. This paper aims at lessening time cost of learning BN structure process. We proposed an approach combining MapReduce with MMHC method. After splitting the training data set, several sub Bayesian network structures are learned simultaneously on Hadoop. To easily integrate prediction results from all those subnets, we employed boosting method to manage classification task. Our experiment results show good precision as well as better time performance in real distributed environment.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128468991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Practical Identity-Based authentication protocol for ad-hoc networks ad-hoc网络实用的基于身份的认证协议
Boang Feng, Jianwei Liu
In this paper, we propose an Identity-Based encryption (IBE) scheme and corresponding signature scheme with the feature of transmission route assurance. And then, we put forward a reforming method to make them more efficient and lightweight with the end-to-end feature, encouraging a broader range of application in ad-hoc networks. Based on these schemes, we present a new identity-based authentication protocol for ad-hoc networks. Through analysis and contrast, we show the fulfillment and feasibility of our protocol with respect to the security and efficiency goals.
本文提出了一种具有传输路由保证特性的基于身份的加密方案和相应的签名方案。然后,我们提出了一种改进方法,使其具有端到端特性,使其更加高效和轻量级,从而促进了在ad-hoc网络中的更广泛应用。在此基础上,提出了一种新的基于身份的ad-hoc网络认证协议。通过分析和对比,我们证明了协议在安全性和效率目标方面的实现和可行性。
{"title":"Practical Identity-Based authentication protocol for ad-hoc networks","authors":"Boang Feng, Jianwei Liu","doi":"10.1109/ICSESS.2016.7883087","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883087","url":null,"abstract":"In this paper, we propose an Identity-Based encryption (IBE) scheme and corresponding signature scheme with the feature of transmission route assurance. And then, we put forward a reforming method to make them more efficient and lightweight with the end-to-end feature, encouraging a broader range of application in ad-hoc networks. Based on these schemes, we present a new identity-based authentication protocol for ad-hoc networks. Through analysis and contrast, we show the fulfillment and feasibility of our protocol with respect to the security and efficiency goals.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128750532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1