首页 > 最新文献

2011 Second International Conference on Intelligent Systems, Modelling and Simulation最新文献

英文 中文
Enhancing MAC Security Model with Meta-policy Approach Using an Intelligent Anomaly Based HIDS 利用基于异常的智能 HIDS,采用元政策方法增强 MAC 安全模型
Zeinab Shahbazi, R. Azmi, M. Mahmoudi
This paper exhibits a new structure based on a meta-policy approach using an intelligent anomaly based host based intrusion detection system, These access control decisions are decided in agreement with a meta-policy. The combination of policy and host based intrusion detection system approach depends on operating systems integrating with mandatory access control. The proposed structure controls a extended set of attacks and provides the management of the system policy, compared to other existing access control approaches and policy based host based intrusion detection system techniques. Items are given about methods used for the meta-policy, and implementation of the structure. We used genetic algorithm to try to select what was the best set of features and chose a Bayesian network, that is trained by using the selected system log on operating system.
本文展示了一种基于元政策方法的新结构,它使用了基于主机的智能异常入侵检测系统,这些访问控制决策是根据元政策决定的。政策与基于主机的入侵检测系统相结合的方法取决于与强制访问控制集成的操作系统。与其他现有的访问控制方法和基于策略的主机入侵检测系统技术相比,建议的结构可以控制更多的攻击,并提供系统策略管理。本文介绍了元政策使用的方法和结构的实现。我们使用遗传算法来尝试选择最佳特征集,并选择了贝叶斯网络,该网络是通过使用操作系统上的选定系统日志来训练的。
{"title":"Enhancing MAC Security Model with Meta-policy Approach Using an Intelligent Anomaly Based HIDS","authors":"Zeinab Shahbazi, R. Azmi, M. Mahmoudi","doi":"10.1109/ISMS.2011.17","DOIUrl":"https://doi.org/10.1109/ISMS.2011.17","url":null,"abstract":"This paper exhibits a new structure based on a meta-policy approach using an intelligent anomaly based host based intrusion detection system, These access control decisions are decided in agreement with a meta-policy. The combination of policy and host based intrusion detection system approach depends on operating systems integrating with mandatory access control. The proposed structure controls a extended set of attacks and provides the management of the system policy, compared to other existing access control approaches and policy based host based intrusion detection system techniques. Items are given about methods used for the meta-policy, and implementation of the structure. We used genetic algorithm to try to select what was the best set of features and chose a Bayesian network, that is trained by using the selected system log on operating system.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130060163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonlinearity Modelling of QoE for Video Streaming over Wireless and Mobile Network 无线和移动网络视频流QoE的非线性建模
H. Herman, Azizah Abd. Rahman, Yoanda Alim Syahbana, K. A. Bakar
Quality of Service (QoS) of video streaming service over wireless and mobile network is determined by many intermingled factors. Some of the factors can be adjusted. Video resolution, audio rate, and bandwidth are among of them. Other factors are not fully controllable such as network throughput, delay, and packet lost probability. In order to increase user satisfaction, efforts to make better quality of video services should consider these factors. However, user-perceived quality of the service is not only determined by QoS factors. User experience, user expectation and user interest to specific content are among factors that influence level of user satisfaction. In this context, customer satisfaction is known as Quality of user Experience (QoE). Moreover, there is a nonlinearity issue regarding improvement of QoS and QoE. This paper will discuss a holistic view of video service quality in order to elaborate the nonlinearity of QoS and QoE factors and their contribution to enhance user satisfaction.
无线和移动网络视频流服务的服务质量(QoS)是由多种因素共同决定的。有些因素是可以调整的。其中包括视频分辨率、音频速率和带宽。其他因素是不完全可控的,如网络吞吐量、延迟和丢包概率。为了提高用户满意度,努力做出更好的视频服务质量应该考虑这些因素。然而,用户感知的服务质量并不仅仅取决于QoS因素。用户体验、用户期望和用户对特定内容的兴趣是影响用户满意度水平的因素。在这种情况下,客户满意度被称为用户体验质量(QoE)。此外,在QoS和QoE的改进方面存在非线性问题。本文将讨论视频服务质量的整体观点,以阐述QoS和QoE因素的非线性及其对提高用户满意度的贡献。
{"title":"Nonlinearity Modelling of QoE for Video Streaming over Wireless and Mobile Network","authors":"H. Herman, Azizah Abd. Rahman, Yoanda Alim Syahbana, K. A. Bakar","doi":"10.1109/ISMS.2011.55","DOIUrl":"https://doi.org/10.1109/ISMS.2011.55","url":null,"abstract":"Quality of Service (QoS) of video streaming service over wireless and mobile network is determined by many intermingled factors. Some of the factors can be adjusted. Video resolution, audio rate, and bandwidth are among of them. Other factors are not fully controllable such as network throughput, delay, and packet lost probability. In order to increase user satisfaction, efforts to make better quality of video services should consider these factors. However, user-perceived quality of the service is not only determined by QoS factors. User experience, user expectation and user interest to specific content are among factors that influence level of user satisfaction. In this context, customer satisfaction is known as Quality of user Experience (QoE). Moreover, there is a nonlinearity issue regarding improvement of QoS and QoE. This paper will discuss a holistic view of video service quality in order to elaborate the nonlinearity of QoS and QoE factors and their contribution to enhance user satisfaction.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114484721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Low-cost Structural Health Monitoring Scheme Using MEMS-based Accelerometers 基于mems加速度计的低成本结构健康监测方案
T. Tan, Nguyen Tien Anh, Gian Quoc Anh
Vibration analysis is the great need and can be used in many practical applications, especially in monitoring the status of machines, bridges and other construction works. This paper presents a low-cost structural health monitoring scheme using MEMS-based accelerometers. The purpose of this scheme is to achieve the high performance system for bridge monitoring with low cost. The system can operate in two modes, real-time and offline. In the real-time mode, embedded real-time short-time Fourier transform programs on the 3-DOF accelerometers were performed for the monitoring and alert. In the offline mode, the analysis of bridge models was utilized based on DIAMOND tool for further analyses and evaluations. Initial results show that the system is suitable for practical applications.
振动分析是非常需要的,并且可以在许多实际应用中使用,特别是在监测机器,桥梁和其他建筑工程的状态方面。提出了一种基于mems加速度计的低成本结构健康监测方案。本方案的目的是以低成本实现高性能的桥梁监测系统。该系统具有实时和离线两种工作模式。在实时模式下,在三自由度加速度计上嵌入实时短时傅里叶变换程序进行监测和报警。在离线模式下,利用基于DIAMOND的桥梁模型分析工具进行进一步的分析和评价。初步结果表明,该系统适合实际应用。
{"title":"Low-cost Structural Health Monitoring Scheme Using MEMS-based Accelerometers","authors":"T. Tan, Nguyen Tien Anh, Gian Quoc Anh","doi":"10.1109/ISMS.2011.42","DOIUrl":"https://doi.org/10.1109/ISMS.2011.42","url":null,"abstract":"Vibration analysis is the great need and can be used in many practical applications, especially in monitoring the status of machines, bridges and other construction works. This paper presents a low-cost structural health monitoring scheme using MEMS-based accelerometers. The purpose of this scheme is to achieve the high performance system for bridge monitoring with low cost. The system can operate in two modes, real-time and offline. In the real-time mode, embedded real-time short-time Fourier transform programs on the 3-DOF accelerometers were performed for the monitoring and alert. In the offline mode, the analysis of bridge models was utilized based on DIAMOND tool for further analyses and evaluations. Initial results show that the system is suitable for practical applications.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Time and Space Efficient Algorithm for Alignment and Visualization of Sparse Retro-elements over Whole Genome Scale 基于时间和空间的全基因组稀疏逆转录元素比对和可视化算法
Sun-young Park, Seon-Yeong Kim, Dong-Sung Ryu, Hwan-Gue Cho
It is not easy to align DNA sequences of whole genomes to find some useful biomarkers (in general term), as whole genome has more than 10 mega bases. Thus, we do not apply the straightforward Smith-Waterman O(N^2) time and space algorithms. If some specific DNA segments in which we are interested are very sparse, then the O(n^2) dynamic programming algorithm for aligning those are inefficient since that algorithm depends on the total length of the input string rather than the number of markers appearing on it. When we consider the retro-element over the whole genome, this problem becomes very clear since the size of whole genome is much more than a few (about 10-20) retro-elements we want to compare. In this paper we propose another alignment problem that consists of only two kinds of symbols, retro-elements and other general symbols. Thus, the whole genome can be regarded as a binary string of '1' (retroelement) and '0' (others). We propose an alignment algorithm for simplified binary string to reveal the structural similarity of retro-elements over two different genomes. The time complexity of this algorithm is O(M^2), where M denotes the number of retro-elements appearing in the genomes. We studied structural similarities of all HERV(Human Endogenous RetroViruses) element of four typical primates including Human, Chimpanzees, Orangutan and Rhesus monkey to show the usefulness of our algorithm. Our system successfully revealed the similarity distribution of retro elements for the four primates.
由于整个基因组有超过10个兆碱基,因此对整个基因组的DNA序列进行比对以发现一些有用的生物标志物(一般来说)并不容易。因此,我们不应用直接的Smith-Waterman O(N^2)时间和空间算法。如果我们感兴趣的某些特定DNA片段非常稀疏,那么用于对齐这些片段的O(n^2)动态规划算法是低效的,因为该算法依赖于输入字符串的总长度,而不是出现在其中的标记的数量。当我们在整个基因组中考虑逆转录因子时,这个问题变得非常清楚,因为整个基因组的大小远远超过我们想要比较的几个(大约10-20个)逆转录因子。在本文中,我们提出了另一种仅由两种符号组成的对齐问题,即复古元素和其他一般符号。因此,整个基因组可以被看作是“1”(逆转录因子)和“0”(其他)的二进制字符串。我们提出了一种简化二进制字符串的比对算法,以揭示两个不同基因组上逆转录元素的结构相似性。该算法的时间复杂度为O(M^2),其中M表示基因组中出现的逆转录元素的数量。我们研究了人类、黑猩猩、猩猩和恒河猴四种典型灵长类动物的所有HERV(Human Endogenous retrovirus,人类内源性逆转录病毒)元素的结构相似性,以证明我们的算法的有效性。我们的系统成功地揭示了四种灵长类动物的复古元素的相似性分布。
{"title":"A Time and Space Efficient Algorithm for Alignment and Visualization of Sparse Retro-elements over Whole Genome Scale","authors":"Sun-young Park, Seon-Yeong Kim, Dong-Sung Ryu, Hwan-Gue Cho","doi":"10.1109/ISMS.2011.29","DOIUrl":"https://doi.org/10.1109/ISMS.2011.29","url":null,"abstract":"It is not easy to align DNA sequences of whole genomes to find some useful biomarkers (in general term), as whole genome has more than 10 mega bases. Thus, we do not apply the straightforward Smith-Waterman O(N^2) time and space algorithms. If some specific DNA segments in which we are interested are very sparse, then the O(n^2) dynamic programming algorithm for aligning those are inefficient since that algorithm depends on the total length of the input string rather than the number of markers appearing on it. When we consider the retro-element over the whole genome, this problem becomes very clear since the size of whole genome is much more than a few (about 10-20) retro-elements we want to compare. In this paper we propose another alignment problem that consists of only two kinds of symbols, retro-elements and other general symbols. Thus, the whole genome can be regarded as a binary string of '1' (retroelement) and '0' (others). We propose an alignment algorithm for simplified binary string to reveal the structural similarity of retro-elements over two different genomes. The time complexity of this algorithm is O(M^2), where M denotes the number of retro-elements appearing in the genomes. We studied structural similarities of all HERV(Human Endogenous RetroViruses) element of four typical primates including Human, Chimpanzees, Orangutan and Rhesus monkey to show the usefulness of our algorithm. Our system successfully revealed the similarity distribution of retro elements for the four primates.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129736143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Decision Support with Simulation-Based System BPsim.DSS: Advanced Simulation Techniques 基于仿真系统BPsim的高效决策支持。高级模拟技术
K. Aksyonov, E. Bykov, E. Smoliy, Ekaterina Sufrygina, A.A. Sheklein, O. Aksyonova, Wang Kai
Effective decision support assist greatly in many control and management processes. Many business processes may be easily formalized and simulated, allowing automated assistance in decision making. The paper describes research on current decision support systems with the self-developed system BPsim.DSS, based on multi-agent simulation of resource conversion processes, extended with additional functionality, including agent coalitions consideration, simulation experiment design, and assistance in model design. Process definition apparatus allows such approach to be applied to various kinds of business processes in many spheres of life. Some examples of deployment within different kinds of enterprises are provided, including economical effect estimation.
有效的决策支持在许多控制和管理过程中有很大的帮助。许多业务流程可以很容易地形式化和模拟,从而允许在决策制定中提供自动化帮助。本文利用自主开发的BPsim系统对现有的决策支持系统进行了研究。决策支持系统基于资源转换过程的多智能体仿真,扩展了包括智能体联盟考虑、仿真实验设计和模型设计辅助在内的附加功能。过程定义设备允许将这种方法应用于生活中许多领域的各种业务过程。提供了在不同类型的企业中部署的一些示例,包括经济效果评估。
{"title":"Efficient Decision Support with Simulation-Based System BPsim.DSS: Advanced Simulation Techniques","authors":"K. Aksyonov, E. Bykov, E. Smoliy, Ekaterina Sufrygina, A.A. Sheklein, O. Aksyonova, Wang Kai","doi":"10.1109/ISMS.2011.15","DOIUrl":"https://doi.org/10.1109/ISMS.2011.15","url":null,"abstract":"Effective decision support assist greatly in many control and management processes. Many business processes may be easily formalized and simulated, allowing automated assistance in decision making. The paper describes research on current decision support systems with the self-developed system BPsim.DSS, based on multi-agent simulation of resource conversion processes, extended with additional functionality, including agent coalitions consideration, simulation experiment design, and assistance in model design. Process definition apparatus allows such approach to be applied to various kinds of business processes in many spheres of life. Some examples of deployment within different kinds of enterprises are provided, including economical effect estimation.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117240328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semiotic Differences of Macintosh Os X & Microsoft Windows 7 Based on Metaphors and Interpretation 基于隐喻与解读的Macintosh Os X与Microsoft Windows 7的符号学差异
Raghdah Sadik Abdulhassan, M. Masood, Al-Samarraie Hosam
this study utilized the Souza's semiotic engineering theory of HCI to user interface metaphors. The main aim of using Metaphors is the ability to determine the potential meaning in ongoing cognitive activities. The data were collected through the “Icon Recognition Test” and the interview questions. In addition, the users’ navigation through Mac and Win7 operating systems include certain categories of metaphors. The examination result indicated that 90% of the “structure metaphors” appeared for the desktop icons and some of the Power Point environment. The findings of the study indicated that Win7 and Mac users did not recognize their system metaphors, which reflects how users can transfer their skills and experience through and across the two platforms after one week of practice across the systems.
本研究将Souza的人机交互符号工程理论应用于用户界面隐喻。使用隐喻的主要目的是确定正在进行的认知活动的潜在意义的能力。通过“图标识别测试”和访谈问题收集数据。此外,用户在Mac和Win7操作系统上的导航也包含了一定类别的隐喻。测试结果表明,90%的“结构隐喻”出现在桌面图标和部分ppt环境中。研究结果表明,Win7和Mac用户无法识别他们的系统隐喻,这反映了用户在跨系统练习一周后如何通过两个平台转移他们的技能和经验。
{"title":"Semiotic Differences of Macintosh Os X & Microsoft Windows 7 Based on Metaphors and Interpretation","authors":"Raghdah Sadik Abdulhassan, M. Masood, Al-Samarraie Hosam","doi":"10.1109/ISMS.2011.41","DOIUrl":"https://doi.org/10.1109/ISMS.2011.41","url":null,"abstract":"this study utilized the Souza's semiotic engineering theory of HCI to user interface metaphors. The main aim of using Metaphors is the ability to determine the potential meaning in ongoing cognitive activities. The data were collected through the “Icon Recognition Test” and the interview questions. In addition, the users’ navigation through Mac and Win7 operating systems include certain categories of metaphors. The examination result indicated that 90% of the “structure metaphors” appeared for the desktop icons and some of the Power Point environment. The findings of the study indicated that Win7 and Mac users did not recognize their system metaphors, which reflects how users can transfer their skills and experience through and across the two platforms after one week of practice across the systems.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129355664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Algorithm for Peak Identification in Semi-periodic Signals 一种新的半周期信号峰值识别算法
S. A. Al-Otaibi, L. Cheded
In this paper, we propose a novel and general algorithm for peak identification in semi-periodic signals which form an important class of useful signals occurring in several practical applications. The key ideas behind the proposed algorithm will be expounded in the paper. An extensive simulation study was carried out to test the performance of the proposed algorithm. The test bed for our performance analysis was a practical application involving ECG signals recorded from pregnant women, and consisting of identifying the heartbeat signals of both the mother and the fetus. Our proposed algorithm showed excellent results. Encouraged by this excellent performance, we also propose an enhanced version of this algorithm that can be extended to non semi-periodic signals and which will be tested as part of our future work.
在本文中,我们提出了一种新的通用算法,用于半周期信号的峰值识别。半周期信号是在一些实际应用中出现的一类重要的有用信号。本文将阐述该算法背后的关键思想。进行了广泛的仿真研究,以测试所提出算法的性能。我们性能分析的测试平台是一个实际应用,涉及从孕妇记录的心电图信号,包括识别母亲和胎儿的心跳信号。我们提出的算法取得了很好的效果。受此优异性能的鼓舞,我们还提出了该算法的增强版本,可以扩展到非半周期信号,并将作为我们未来工作的一部分进行测试。
{"title":"A Novel Algorithm for Peak Identification in Semi-periodic Signals","authors":"S. A. Al-Otaibi, L. Cheded","doi":"10.1109/ISMS.2011.34","DOIUrl":"https://doi.org/10.1109/ISMS.2011.34","url":null,"abstract":"In this paper, we propose a novel and general algorithm for peak identification in semi-periodic signals which form an important class of useful signals occurring in several practical applications. The key ideas behind the proposed algorithm will be expounded in the paper. An extensive simulation study was carried out to test the performance of the proposed algorithm. The test bed for our performance analysis was a practical application involving ECG signals recorded from pregnant women, and consisting of identifying the heartbeat signals of both the mother and the fetus. Our proposed algorithm showed excellent results. Encouraged by this excellent performance, we also propose an enhanced version of this algorithm that can be extended to non semi-periodic signals and which will be tested as part of our future work.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129399112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-level Fuzzy Association Rules Mining via Determining Minimum Supports and Membership Functions 基于最小支持度和隶属度函数的多级模糊关联规则挖掘
E. Mahmoudi, Elahe Sabetnia, M. N. Torshiz, Mehrdad Jalali, G. T. Tabrizi
Association rule mining is sought for items through a fairly large data set relation are certainly consequential. The traditional association mining based on a uniform minimum support, either missed interesting patterns of low support or suffered from the bottleneck of itemset generation. An alternative solution relies on exploiting support constraints which specifies the required minimum support itemsets. This paper proposes an ACS-based algorithm to determine membership functions for each item followed by computing minimum supports. It therefore will run the fuzzy multi-level mining algorithm for extracting knowledge implicit in quantitative transactions, immediately. In order to address this need, the new approach can express three profits includes specifying the membership functions for each items, computing the minimum support for each item regarding to characteristic for each item in database and making a system automation. We considered an algorithm that can cover the multiple level association rules under multiple item supports, significantly.
关联规则挖掘是通过一个相当大的数据集寻找项目的关系,当然是相应的。传统的基于统一最小支持度的关联挖掘要么错过了低支持度的有趣模式,要么存在项集生成的瓶颈。另一种解决方案依赖于利用支持约束,它指定了所需的最小支持项集。本文提出了一种基于acs的算法来确定每个项目的隶属函数,然后计算最小支持度。因此,它将立即运行模糊多级挖掘算法来提取定量交易中隐含的知识。为了满足这一需求,该方法可以实现三个方面的好处:指定每个项目的隶属函数,根据数据库中每个项目的特征计算每个项目的最小支持度,实现系统自动化。我们考虑了一种能够覆盖多条目支持下的多级关联规则的算法。
{"title":"Multi-level Fuzzy Association Rules Mining via Determining Minimum Supports and Membership Functions","authors":"E. Mahmoudi, Elahe Sabetnia, M. N. Torshiz, Mehrdad Jalali, G. T. Tabrizi","doi":"10.1109/ISMS.2011.20","DOIUrl":"https://doi.org/10.1109/ISMS.2011.20","url":null,"abstract":"Association rule mining is sought for items through a fairly large data set relation are certainly consequential. The traditional association mining based on a uniform minimum support, either missed interesting patterns of low support or suffered from the bottleneck of itemset generation. An alternative solution relies on exploiting support constraints which specifies the required minimum support itemsets. This paper proposes an ACS-based algorithm to determine membership functions for each item followed by computing minimum supports. It therefore will run the fuzzy multi-level mining algorithm for extracting knowledge implicit in quantitative transactions, immediately. In order to address this need, the new approach can express three profits includes specifying the membership functions for each items, computing the minimum support for each item regarding to characteristic for each item in database and making a system automation. We considered an algorithm that can cover the multiple level association rules under multiple item supports, significantly.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks 移动Ad Hoc网络协同黑洞攻击检测机制研究
Jaydip Sen, Sripad Koilakonda, A. Ukil
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. This attack becomes more sever when a group of malicious nodes cooperate each other. In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. The simulation carried out on the proposed scheme has produced results that demonstrate the effectiveness of the mechanism in detection of the attack while maintaining a reasonable level of throughput in the network.
移动自组织网络(MANET)是一个自治节点的集合,这些节点通过形成多跳无线网络并以分散的方式保持连接来相互通信。由于这些网络具有开放介质、动态变化的拓扑结构、依赖于协作算法、缺乏集中监控点以及缺乏明确的防线等特点,安全性仍然是这些网络面临的主要挑战。因此,大多数用于manet的路由协议容易受到各种类型的攻击。自组织按需距离矢量路由(AODV)是一种非常流行的路由算法。然而,它很容易受到众所周知的黑洞攻击,即恶意节点在路由发现过程中错误地向目标节点发布良好路径。当一组恶意节点相互合作时,这种攻击会变得更加严重。本文提出了一种针对无线局域网中多个黑洞节点协同攻击的防御机制。对该方案进行的仿真结果表明,该机制在检测攻击的同时保持了网络中合理的吞吐量水平。
{"title":"A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks","authors":"Jaydip Sen, Sripad Koilakonda, A. Ukil","doi":"10.1109/ISMS.2011.58","DOIUrl":"https://doi.org/10.1109/ISMS.2011.58","url":null,"abstract":"A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. This attack becomes more sever when a group of malicious nodes cooperate each other. In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. The simulation carried out on the proposed scheme has produced results that demonstrate the effectiveness of the mechanism in detection of the attack while maintaining a reasonable level of throughput in the network.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
Probabilistic Neural Network for Brain Tumor Classification 脑肿瘤分类的概率神经网络
M. Othman, M. Basri
In this paper, Probabilistic Neural Network with image and data processing techniques was employed to implement an automated brain tumor classification. The conventional method for medical resonance brain images classification and tumors detection is by human inspection. Operator-assisted classification methods are impractical for large amounts of data and are also non-reproducible. Medical Resonance images contain a noise caused by operator performance which can lead to serious inaccuracies classification. The use of artificial intelligent techniques for instant, neural networks, and fuzzy logic shown great potential in this field. Hence, in this paper the Probabilistic Neural Network was applied for the purposes. Decision making was performed in two stages: feature extraction using the principal component analysis and the Probabilistic Neural Network (PNN). The performance of the PNN classifier was evaluated in terms of training performance and classification accuracies. Probabilistic Neural Network gives fast and accurate classification and is a promising tool for classification of the tumors.
本文采用概率神经网络结合图像和数据处理技术实现了脑肿瘤的自动分类。医学磁共振脑图像分类和肿瘤检测的传统方法是人检。算子辅助分类方法对于大量数据是不切实际的,而且也是不可重复的。医学磁共振图像包含操作员性能引起的噪声,这可能导致严重的不准确分类。人工智能技术在即时、神经网络和模糊逻辑中的应用在这一领域显示出巨大的潜力。因此,本文采用了概率神经网络的方法。决策分两个阶段进行:使用主成分分析的特征提取和概率神经网络(PNN)。从训练性能和分类精度两方面对PNN分类器的性能进行了评价。概率神经网络具有快速、准确的分类能力,是一种很有前途的肿瘤分类工具。
{"title":"Probabilistic Neural Network for Brain Tumor Classification","authors":"M. Othman, M. Basri","doi":"10.1109/ISMS.2011.32","DOIUrl":"https://doi.org/10.1109/ISMS.2011.32","url":null,"abstract":"In this paper, Probabilistic Neural Network with image and data processing techniques was employed to implement an automated brain tumor classification. The conventional method for medical resonance brain images classification and tumors detection is by human inspection. Operator-assisted classification methods are impractical for large amounts of data and are also non-reproducible. Medical Resonance images contain a noise caused by operator performance which can lead to serious inaccuracies classification. The use of artificial intelligent techniques for instant, neural networks, and fuzzy logic shown great potential in this field. Hence, in this paper the Probabilistic Neural Network was applied for the purposes. Decision making was performed in two stages: feature extraction using the principal component analysis and the Probabilistic Neural Network (PNN). The performance of the PNN classifier was evaluated in terms of training performance and classification accuracies. Probabilistic Neural Network gives fast and accurate classification and is a promising tool for classification of the tumors.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
期刊
2011 Second International Conference on Intelligent Systems, Modelling and Simulation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1