首页 > 最新文献

2009 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
ContentEx: A framework for automatic content extraction programs 一个用于自动内容提取程序的框架
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137298
Linhai Song, Xueqi Cheng, Yan Guo, Yue Liu, Guodong Ding
Web pages are often decorated with extraneous information (such as navigation bars, branding banners, JavaScript and advertisements). This kind of information may distract users from actual content they are really interested in and may reduce effects of many advanced web applications. Automatic content extraction has many applications ranging from providing data for web mining to realizing better accessing the web over mobile devices. In this paper, we propose ContentEx, a framework for automatic content extraction programs, which we use to organize codes of automatic content extraction programs and to facilitate the development of related solutions. We also introduce how we extract content from forum pages in this framework to fulfill the requirement from our actual application.
网页通常用无关的信息(如导航条、品牌横幅、JavaScript和广告)来装饰。这类信息可能会分散用户对他们真正感兴趣的内容的注意力,并可能降低许多高级web应用程序的效果。自动内容提取有许多应用,从为web挖掘提供数据到实现通过移动设备更好地访问web。本文提出了一个自动内容提取程序的框架contexx,利用它来组织自动内容提取程序的代码,并为相关解决方案的开发提供便利。我们还介绍了如何在这个框架中从论坛页面中提取内容,以满足实际应用程序的需求。
{"title":"ContentEx: A framework for automatic content extraction programs","authors":"Linhai Song, Xueqi Cheng, Yan Guo, Yue Liu, Guodong Ding","doi":"10.1109/ISI.2009.5137298","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137298","url":null,"abstract":"Web pages are often decorated with extraneous information (such as navigation bars, branding banners, JavaScript and advertisements). This kind of information may distract users from actual content they are really interested in and may reduce effects of many advanced web applications. Automatic content extraction has many applications ranging from providing data for web mining to realizing better accessing the web over mobile devices. In this paper, we propose ContentEx, a framework for automatic content extraction programs, which we use to organize codes of automatic content extraction programs and to facilitate the development of related solutions. We also introduce how we extract content from forum pages in this framework to fulfill the requirement from our actual application.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123075051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the mitigation of bioterrorism through game theory 论用博弈论缓解生物恐怖主义
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137262
Ryan Layfield, Murat Kantarcioglu, B. Thuraisingham
Bioterrorism represents a serious threat to the security of civilian populations. The nature of an epidemic requires careful consideration of all possible vectors over which an infection can spread. Our work takes the SIR model and creates a detailed hybridization of existing simulations to allow a large search space to be explored. We then create a Stackelberg game to evaluate all possibilities with respect to the investment of available resources and consider the resulting scenarios. Our analysis of our experimental results yields the opportunity to place an upper bound on the worst case scenario for a population center in the event of an attack, with consideration of defensive and offensive measures.
生物恐怖主义是对平民安全的严重威胁。流行病的性质要求仔细考虑感染可能传播的所有可能媒介。我们的工作采用SIR模型,并创建了现有模拟的详细混合,以允许探索大型搜索空间。然后,我们创建一个Stackelberg游戏,根据可用资源的投资来评估所有可能性,并考虑最终的场景。我们对实验结果的分析使我们有机会在考虑防御和进攻措施的情况下,对人口中心发生袭击时的最坏情况设定上限。
{"title":"On the mitigation of bioterrorism through game theory","authors":"Ryan Layfield, Murat Kantarcioglu, B. Thuraisingham","doi":"10.1109/ISI.2009.5137262","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137262","url":null,"abstract":"Bioterrorism represents a serious threat to the security of civilian populations. The nature of an epidemic requires careful consideration of all possible vectors over which an infection can spread. Our work takes the SIR model and creates a detailed hybridization of existing simulations to allow a large search space to be explored. We then create a Stackelberg game to evaluate all possibilities with respect to the investment of available resources and consider the resulting scenarios. Our analysis of our experimental results yields the opportunity to place an upper bound on the worst case scenario for a population center in the event of an attack, with consideration of defensive and offensive measures.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting data exploration in databases 支持数据库中的数据探索
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137270
A. Badia
We propose a solution to the problem of exploring large, complex data sets in a (relational) database by a human user. In a nutshell, our proposed solution is to develop the tools to support data exploration and browsing in an organized manner. We introduce: (a) an organization of data around the idea of defining distances on data sets, to reflect the intuitive notion of data that is (closely) related to other data; and (b) a new set of operators to mediate user-data interaction that exploits the defined distances to let the user “move around” the data. Our operators are simple and intuitive, yet they can be combined in a flexible manner to support complex browsing interactions. The operators are combined in a novel interface that enables intelligent data exploration and analysis.
我们提出了一个解决方案,以解决人类用户在(关系)数据库中探索大型复杂数据集的问题。简而言之,我们提出的解决方案是开发工具,以有组织的方式支持数据探索和浏览。我们引入:(a)围绕定义数据集上的距离的想法来组织数据,以反映与其他数据(密切)相关的数据的直观概念;(b)一组新的操作符来调节用户数据交互,利用定义的距离让用户“移动”数据。我们的操作符简单直观,但它们可以以灵活的方式组合在一起,以支持复杂的浏览交互。这些操作符组合在一个新颖的界面中,可以实现智能数据探索和分析。
{"title":"Supporting data exploration in databases","authors":"A. Badia","doi":"10.1109/ISI.2009.5137270","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137270","url":null,"abstract":"We propose a solution to the problem of exploring large, complex data sets in a (relational) database by a human user. In a nutshell, our proposed solution is to develop the tools to support data exploration and browsing in an organized manner. We introduce: (a) an organization of data around the idea of defining distances on data sets, to reflect the intuitive notion of data that is (closely) related to other data; and (b) a new set of operators to mediate user-data interaction that exploits the defined distances to let the user “move around” the data. Our operators are simple and intuitive, yet they can be combined in a flexible manner to support complex browsing interactions. The operators are combined in a novel interface that enables intelligent data exploration and analysis.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Socio-contextual model of knowledge sharing among user assisting agents 用户辅助代理间知识共享的社会-语境模型
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137322
B. Rajendran, K. Iyakutti
A goal of user assisting agents is to provide effective assistance to their users in their tasks. The problem becomes challenging when the users are involved in a cognitive activity such as a knowledge gathering task through the web, and when the agents cannot clearly know the task of their users in advance. The challenge grows when the agent themselves do not possess the knowledge required for such tasks. It is in this scenario that we propose a socio-contextual model of knowledge sharing within a community of user assisting agents, provided through the environment of an open domain knowledge portal, which are used by the users for their web based knowledge gathering tasks. The agents involve themselves in a knowledge sharing exercise by implementing the socio-contextual model that may allow each agent to gain knowledge about a task of their interest from other fellow agents through which they can assist their respective users. We evaluate our model through an experiment involving many knowledge gathering tasks from diverse domains and the results indicate interesting implications of the model with respect to the agents, their tasks and their community.
用户辅助代理的目标是为用户的任务提供有效的帮助。当用户参与认知活动(如通过网络进行知识收集任务)时,当代理无法事先清楚地知道用户的任务时,问题变得具有挑战性。当代理本身不具备这些任务所需的知识时,挑战就会增加。正是在这种情况下,我们提出了一个在用户协助代理社区内的知识共享的社会上下文模型,该模型通过开放领域知识门户环境提供,供用户用于基于web的知识收集任务。通过实现社会上下文模型,智能体将自己参与到知识共享练习中,这可能允许每个智能体从其他智能体那里获得关于他们感兴趣的任务的知识,通过这些知识,他们可以帮助各自的用户。我们通过一个涉及来自不同领域的许多知识收集任务的实验来评估我们的模型,结果表明了该模型在代理、其任务和社区方面的有趣含义。
{"title":"Socio-contextual model of knowledge sharing among user assisting agents","authors":"B. Rajendran, K. Iyakutti","doi":"10.1109/ISI.2009.5137322","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137322","url":null,"abstract":"A goal of user assisting agents is to provide effective assistance to their users in their tasks. The problem becomes challenging when the users are involved in a cognitive activity such as a knowledge gathering task through the web, and when the agents cannot clearly know the task of their users in advance. The challenge grows when the agent themselves do not possess the knowledge required for such tasks. It is in this scenario that we propose a socio-contextual model of knowledge sharing within a community of user assisting agents, provided through the environment of an open domain knowledge portal, which are used by the users for their web based knowledge gathering tasks. The agents involve themselves in a knowledge sharing exercise by implementing the socio-contextual model that may allow each agent to gain knowledge about a task of their interest from other fellow agents through which they can assist their respective users. We evaluate our model through an experiment involving many knowledge gathering tasks from diverse domains and the results indicate interesting implications of the model with respect to the agents, their tasks and their community.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131666262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facilitating wrapper generation with page analysis 通过页面分析促进包装器生成
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137299
Bo Wu, Xueqi Cheng, Yu Wang, Gang Zhang, Guodong Ding
Current approaches for generating wrappers for web page extraction suffer from the requirement of huge amount of labeled training pages to obtain satisfying results. On the other hand, the quality of data extracted by fully automatic methods is not reliable. In this paper, we propose a novel method to facilitate wrapper generation by combining wrapper induction and page analysis approaches. In addition to manually labeled data, we also take advantage of a set of unlabeled pages to improve the quality of induced wrappers. Our experiments demonstrate that our system achieves a satisfying result with fewer manually labeled training pages.
当前用于网页抽取的包装器生成方法存在一个问题,即需要大量的标记训练页面才能获得满意的结果。另一方面,全自动方法提取的数据质量不可靠。在本文中,我们提出了一种结合包装器归纳和页面分析方法来促进包装器生成的新方法。除了手动标记数据外,我们还利用一组未标记的页面来提高诱导包装的质量。我们的实验表明,我们的系统在较少的人工标记训练页面的情况下取得了令人满意的结果。
{"title":"Facilitating wrapper generation with page analysis","authors":"Bo Wu, Xueqi Cheng, Yu Wang, Gang Zhang, Guodong Ding","doi":"10.1109/ISI.2009.5137299","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137299","url":null,"abstract":"Current approaches for generating wrappers for web page extraction suffer from the requirement of huge amount of labeled training pages to obtain satisfying results. On the other hand, the quality of data extracted by fully automatic methods is not reliable. In this paper, we propose a novel method to facilitate wrapper generation by combining wrapper induction and page analysis approaches. In addition to manually labeled data, we also take advantage of a set of unlabeled pages to improve the quality of induced wrappers. Our experiments demonstrate that our system achieves a satisfying result with fewer manually labeled training pages.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weaving ontologies to support digital forensic analysis 编织本体以支持数字取证分析
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137303
Allyson M. Hoss, D. Carver
Numerous challenges currently face digital forensic analysis. Although a variety of techniques and tools exist to assist with the analysis of digital evidence, they inadequately address key problems. We consider the applicability and usefulness of weaving ontologies to address some of these problems. We introduce an ontological approach leading to future development of an automated digital forensic analysis tool.
数字取证分析目前面临着诸多挑战。尽管存在各种各样的技术和工具来协助分析数字证据,但它们不足以解决关键问题。我们认为编织本体的适用性和有用性可以解决其中的一些问题。我们介绍了一种本体论的方法,导致自动化数字法医分析工具的未来发展。
{"title":"Weaving ontologies to support digital forensic analysis","authors":"Allyson M. Hoss, D. Carver","doi":"10.1109/ISI.2009.5137303","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137303","url":null,"abstract":"Numerous challenges currently face digital forensic analysis. Although a variety of techniques and tools exist to assist with the analysis of digital evidence, they inadequately address key problems. We consider the applicability and usefulness of weaving ontologies to address some of these problems. We introduce an ontological approach leading to future development of an automated digital forensic analysis tool.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Higher Order Collective Classifier for detecting and classifying network events 一种用于网络事件检测和分类的高阶集体分类器
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137283
Vikas Menon, W. Pottenger
Labeled Data is scarce. Most statistical machine learning techniques rely on the availability of a large labeled corpus for building robust models for prediction and classification. In this paper we present a Higher Order Collective Classifier (HOCC) based on Higher Order Learning, a statistical machine learning technique that leverages latent information present in co-occurrences of items across records. These techniques violate the IID assumption that underlies most statistical machine learning techniques and have in prior work outperformed first order techniques in the presence of very limited data. We present results of applying HOCC to two different network data sets, first for detection and classification of anomalies in a Border Gateway Protocol dataset and second for building models of users from Network File System calls to perform masquerade detection. The precision of our system has been shown to be 30% better than the standard Naive Bayes technique for masquerade detection. These results indicate that HOCC can successfully model a variety of network events and can be applied to solve difficult problems in security using the general framework proposed.
标签数据是稀缺的。大多数统计机器学习技术依赖于大型标记语料库的可用性来构建用于预测和分类的鲁棒模型。在本文中,我们提出了一种基于高阶学习的高阶集体分类器(HOCC),这是一种统计机器学习技术,利用了记录中项目共现中存在的潜在信息。这些技术违反了大多数统计机器学习技术的基础IID假设,并且在之前的工作中,在数据非常有限的情况下优于一阶技术。我们展示了将HOCC应用于两个不同的网络数据集的结果,首先用于边界网关协议数据集中的异常检测和分类,其次用于从网络文件系统调用中构建用户模型以执行伪装检测。我们的系统的精度已被证明比标准的朴素贝叶斯技术的伪装检测好30%。这些结果表明,HOCC可以成功地模拟各种网络事件,并且可以使用所提出的通用框架来解决安全中的难题。
{"title":"A Higher Order Collective Classifier for detecting and classifying network events","authors":"Vikas Menon, W. Pottenger","doi":"10.1109/ISI.2009.5137283","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137283","url":null,"abstract":"Labeled Data is scarce. Most statistical machine learning techniques rely on the availability of a large labeled corpus for building robust models for prediction and classification. In this paper we present a Higher Order Collective Classifier (HOCC) based on Higher Order Learning, a statistical machine learning technique that leverages latent information present in co-occurrences of items across records. These techniques violate the IID assumption that underlies most statistical machine learning techniques and have in prior work outperformed first order techniques in the presence of very limited data. We present results of applying HOCC to two different network data sets, first for detection and classification of anomalies in a Border Gateway Protocol dataset and second for building models of users from Network File System calls to perform masquerade detection. The precision of our system has been shown to be 30% better than the standard Naive Bayes technique for masquerade detection. These results indicate that HOCC can successfully model a variety of network events and can be applied to solve difficult problems in security using the general framework proposed.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115051403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
graphOnt: An ontology based library for conversion from semantic graphs to JUNG graphhont:一个基于本体的库,用于从语义图到JUNG的转换
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137292
Stephen Kelley, M. Goldberg, M. Magdon-Ismail, Konstantin Mertsalov, W. Wallace, Mohammed J. Zaki
In this work, we present the software library graphOnt. The purpose of this library is to automate the process of dynamically extracting “interesting” graphs from semantic networks. Instructions on the extraction are fed into the library via an ontological language specification custom built for this application. A set of SPARQL queries are used to define vertices and edges in the constructed graph. Extracted graphs are returned using the JUNG framework, which offers many algorithmic and visualization options. This work allows a set of individuals analyzing the same semantic network to extract and analyze dynamically created graphs using sophisticated, specific algorithmic tools without needing to manually construct classical graphs from the data.
在这项工作中,我们提出了软件库图。这个库的目的是自动化从语义网络中动态提取“有趣”图的过程。有关提取的指令通过为该应用程序定制的本体语言规范输入到库中。一组SPARQL查询用于定义所构建图中的顶点和边。使用JUNG框架返回提取的图形,该框架提供了许多算法和可视化选项。这项工作允许一组个体分析相同的语义网络,使用复杂的特定算法工具提取和分析动态创建的图形,而无需从数据中手动构建经典图形。
{"title":"graphOnt: An ontology based library for conversion from semantic graphs to JUNG","authors":"Stephen Kelley, M. Goldberg, M. Magdon-Ismail, Konstantin Mertsalov, W. Wallace, Mohammed J. Zaki","doi":"10.1109/ISI.2009.5137292","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137292","url":null,"abstract":"In this work, we present the software library graphOnt. The purpose of this library is to automate the process of dynamically extracting “interesting” graphs from semantic networks. Instructions on the extraction are fed into the library via an ontological language specification custom built for this application. A set of SPARQL queries are used to define vertices and edges in the constructed graph. Extracted graphs are returned using the JUNG framework, which offers many algorithmic and visualization options. This work allows a set of individuals analyzing the same semantic network to extract and analyze dynamically created graphs using sophisticated, specific algorithmic tools without needing to manually construct classical graphs from the data.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"55 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gender difference analysis of political web forums: An experiment on an international islamic women's forum 政治网络论坛的性别差异分析:一个国际伊斯兰妇女论坛的实验
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137272
Yulei Zhang, Yan Dang, Hsinchun Chen
As an important type of social media, the political Web forum has become a major communication channel for people to discuss and debate political, cultural and social issues. Although the Internet has a male-dominated history, more and more women have started to share their concerns and express opinions through online discussion boards and Web forums. This paper presents an automated approach to gender difference analysis of political Web forums. The approach uses rich textual feature representation and machine learning techniques to examine the online gender differences between female and male participants on political Web forums by analyzing writing styles and topics of interest. The results of gender difference analysis performed on a large and long-standing international Islamic women's political forum are presented, showing that female and male participants have significantly different topics of interest.
政治网络论坛作为一种重要的社交媒体类型,已经成为人们对政治、文化和社会问题进行讨论和辩论的主要沟通渠道。尽管互联网有一段男性主导的历史,但越来越多的女性开始通过在线讨论板和网络论坛分享她们的担忧并表达意见。本文提出了一种自动分析政治网络论坛性别差异的方法。该方法使用丰富的文本特征表示和机器学习技术,通过分析写作风格和感兴趣的主题,来检查政治网络论坛上女性和男性参与者之间的在线性别差异。本文介绍了在一个大型和长期的国际伊斯兰妇女政治论坛上进行的性别差异分析的结果,表明女性和男性参与者感兴趣的主题有很大不同。
{"title":"Gender difference analysis of political web forums: An experiment on an international islamic women's forum","authors":"Yulei Zhang, Yan Dang, Hsinchun Chen","doi":"10.1109/ISI.2009.5137272","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137272","url":null,"abstract":"As an important type of social media, the political Web forum has become a major communication channel for people to discuss and debate political, cultural and social issues. Although the Internet has a male-dominated history, more and more women have started to share their concerns and express opinions through online discussion boards and Web forums. This paper presents an automated approach to gender difference analysis of political Web forums. The approach uses rich textual feature representation and machine learning techniques to examine the online gender differences between female and male participants on political Web forums by analyzing writing styles and topics of interest. The results of gender difference analysis performed on a large and long-standing international Islamic women's political forum are presented, showing that female and male participants have significantly different topics of interest.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"143 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automated casing event detection in persistent video surveillance 持续视频监控中的自动套管事件检测
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137286
Daniel T. Schmitt, S. Kurkowski, M. Mendenhall
An increase volume of surveillance video is being collected, by various organizations, which has led to a need for automated video systems in order to reduce reviewing time. Using persistent video gathered from an aircraft overhead, as is done with unmanned aerial systems in Iraq and Afghanistan, we get a birds-eye view of vehicular activity. From these activities we can use a model to detect suspicious surveillance activity (casing). This paper builds a model to detect casing events and tests it using Global Positioning System (GPS) tracks generated from vehicles driving in an urban area to show the effectiveness of the model. The results show that several vehicles can be monitored at once in real-time. Additionally, the model detects when vehicles are casing buildings and which buildings they are targeting.
各组织正在收集越来越多的监视录像,这导致需要自动录像系统,以便减少审查时间。利用从头顶的飞机上持续收集的视频,就像在伊拉克和阿富汗使用的无人驾驶飞机系统一样,我们可以鸟瞰车辆的活动。从这些活动中,我们可以使用一个模型来检测可疑的监视活动(套管)。本文建立了套管事件的检测模型,并利用城市车辆行驶轨迹的全球定位系统(GPS)对模型进行了测试,验证了模型的有效性。结果表明,可以同时对多辆车进行实时监控。此外,该模型还可以检测车辆何时包围建筑物以及它们的目标是哪些建筑物。
{"title":"Automated casing event detection in persistent video surveillance","authors":"Daniel T. Schmitt, S. Kurkowski, M. Mendenhall","doi":"10.1109/ISI.2009.5137286","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137286","url":null,"abstract":"An increase volume of surveillance video is being collected, by various organizations, which has led to a need for automated video systems in order to reduce reviewing time. Using persistent video gathered from an aircraft overhead, as is done with unmanned aerial systems in Iraq and Afghanistan, we get a birds-eye view of vehicular activity. From these activities we can use a model to detect suspicious surveillance activity (casing). This paper builds a model to detect casing events and tests it using Global Positioning System (GPS) tracks generated from vehicles driving in an urban area to show the effectiveness of the model. The results show that several vehicles can be monitored at once in real-time. Additionally, the model detects when vehicles are casing buildings and which buildings they are targeting.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"173 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122428023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1