Intrusion detection system (IDS) is based on data mining technology in this paper. Association rule mining which is a method of data mining will make the boundaries of intervals hard. It will increase the information loss. In this paper, a novel framework based on data mining techniques is proposed for designing IDS. In this framework, the classification engine, which is actually the core of the IDS, uses fuzzy association rules for building classifiers. Particularly, the fuzzy association rule sets are exploited as descriptive models of different classes. Generally, the proposed approach outperforms other methods, especially in terms of false positive rate.
{"title":"Application of Fuzzy Association Rules in Intrusion Detection","authors":"Kaixing Wu, Juan Hao, Chunhua Wang","doi":"10.1109/ICICIS.2011.72","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.72","url":null,"abstract":"Intrusion detection system (IDS) is based on data mining technology in this paper. Association rule mining which is a method of data mining will make the boundaries of intervals hard. It will increase the information loss. In this paper, a novel framework based on data mining techniques is proposed for designing IDS. In this framework, the classification engine, which is actually the core of the IDS, uses fuzzy association rules for building classifiers. Particularly, the fuzzy association rule sets are exploited as descriptive models of different classes. Generally, the proposed approach outperforms other methods, especially in terms of false positive rate.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"15 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with weighted pseudo almost auto orphic functions, which is associated with the optimal control problem of distributed parameter system, especially in the nonlinear evolution equation. Applying the Banach fixed point theorem, we prove some existence results for weighted pseudo almost automorphic mild solution to a class of integro differential equations in Banach space.
{"title":"Weighted Pseudo Almost Automorphic Solution to a Class of Integrodifferential Equations","authors":"Chou-li Lu, Xiaoqiu Song, Li-li Zhou","doi":"10.1109/ICICIS.2011.42","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.42","url":null,"abstract":"This paper is concerned with weighted pseudo almost auto orphic functions, which is associated with the optimal control problem of distributed parameter system, especially in the nonlinear evolution equation. Applying the Banach fixed point theorem, we prove some existence results for weighted pseudo almost automorphic mild solution to a class of integro differential equations in Banach space.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117067802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is important how to solve the environmental and resources laws and legislation of China. Through We analysis these laws and legislation problem about environment and resources in China, we think: Based on the situation, learn from advanced foreign experience and improve the legal system of China's environmental resource, Actively promote the scientific and democratic legislation, legislation to ensure the quality of environmental resources, Adhere to the "establishment, change, waste," both to ensure that existing laws and regulations of the coherence and effectiveness, Comprehensive integration of environmental management tools, establishment of government regulation, market guidance and public participation in the legal institutional framework, Research focus on legislation to improve the efficiency and effectiveness of legislative decision-making.
{"title":"System Analysis Environmental Resources Legislation in China","authors":"Lu Yali","doi":"10.1109/ICICIS.2011.24","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.24","url":null,"abstract":"It is important how to solve the environmental and resources laws and legislation of China. Through We analysis these laws and legislation problem about environment and resources in China, we think: Based on the situation, learn from advanced foreign experience and improve the legal system of China's environmental resource, Actively promote the scientific and democratic legislation, legislation to ensure the quality of environmental resources, Adhere to the \"establishment, change, waste,\" both to ensure that existing laws and regulations of the coherence and effectiveness, Comprehensive integration of environmental management tools, establishment of government regulation, market guidance and public participation in the legal institutional framework, Research focus on legislation to improve the efficiency and effectiveness of legislative decision-making.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122158159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to the requirement of "Educational Technology Competency Standards for Teachers", teaching staff should master the basic skills of the methods of common instructional media selection and development. The skills are common teaching priorities of "Modern Educational Technology" course. This thesis, using the web quest template to design the teaching contents of" Instructional Media Selection and Development", combined with the characteristics of professional and future career of students. This study has certain reference value on teaching design under the information technology environment and training normal school students' educational technology capacity.
{"title":"Instructional Design on \"Selection of Instructional Media\" Based on Webquest","authors":"Cui Jian, Xu Lei, W. Feng","doi":"10.1109/ICICIS.2011.146","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.146","url":null,"abstract":"According to the requirement of \"Educational Technology Competency Standards for Teachers\", teaching staff should master the basic skills of the methods of common instructional media selection and development. The skills are common teaching priorities of \"Modern Educational Technology\" course. This thesis, using the web quest template to design the teaching contents of\" Instructional Media Selection and Development\", combined with the characteristics of professional and future career of students. This study has certain reference value on teaching design under the information technology environment and training normal school students' educational technology capacity.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122585192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Server virtualization technology is the core of the dynamic resource scheduling, also is an effective solution of disaster recovery. Currently, the number of spreading servers in the data room is ever-increasing, data were heavily concentrated, the load on the server can not be understood, and can not b adjusted, it is difficult to make full use of server resources. This article from the perspective of server virtualization to discuss the dynamic allocaton of server CPU, memory, hard drives and other resources based on application load. As virtualized servers can be activated, and can be restarted within a limited time to create an important server, virtualization server in a short time has quickly become one of the more cost-effective solutions of disaster recovery management capabilities.
{"title":"Application of Server Virtualization Technology in Enterprise Information","authors":"Xianmin Wei","doi":"10.1109/ICICIS.2011.13","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.13","url":null,"abstract":"Server virtualization technology is the core of the dynamic resource scheduling, also is an effective solution of disaster recovery. Currently, the number of spreading servers in the data room is ever-increasing, data were heavily concentrated, the load on the server can not be understood, and can not b adjusted, it is difficult to make full use of server resources. This article from the perspective of server virtualization to discuss the dynamic allocaton of server CPU, memory, hard drives and other resources based on application load. As virtualized servers can be activated, and can be restarted within a limited time to create an important server, virtualization server in a short time has quickly become one of the more cost-effective solutions of disaster recovery management capabilities.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Along with the rapid development of social economy, resource crisis and environmental pollution problems are getting more and more serious, which impel the recycle and reuse of resource to obtain the unprecedented attention. It requires the manufacturing enterprises implement closed-loop supply chain management, realizing closed-loop flowing of materials in the supply chain while reducing resources consumption as well as waste emissions. The re-manufacturing closed-loop supply chain network optimization problem is discussed specially, and its general mixed integer programming mathematical model is put out to realize the optimal decision-making of multi-facility point location and the optimal flow distribution, and the mix integer programming method is chosen to solve the model. with the aid of the Lingo 8.0 software, the enterprise living example model is optimization solved, which proves the feasibility of the model, and provides the theory instruction for the enterprises when they construct and manage closed-loop supply chain.
{"title":"Optimization Design of Closed-loop Supply Chain Based on MILP Model","authors":"Zhang Peilin, Yang Long, Yin Ling","doi":"10.1109/ICICIS.2011.32","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.32","url":null,"abstract":"Along with the rapid development of social economy, resource crisis and environmental pollution problems are getting more and more serious, which impel the recycle and reuse of resource to obtain the unprecedented attention. It requires the manufacturing enterprises implement closed-loop supply chain management, realizing closed-loop flowing of materials in the supply chain while reducing resources consumption as well as waste emissions. The re-manufacturing closed-loop supply chain network optimization problem is discussed specially, and its general mixed integer programming mathematical model is put out to realize the optimal decision-making of multi-facility point location and the optimal flow distribution, and the mix integer programming method is chosen to solve the model. with the aid of the Lingo 8.0 software, the enterprise living example model is optimization solved, which proves the feasibility of the model, and provides the theory instruction for the enterprises when they construct and manage closed-loop supply chain.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Much research efforts have been devoted to develop protocols based on one criterion, majority of the routing protocols consider energy conservation or minimum bandwidth. But only one factor could not guarantee the requirements for quality of the service (Qos) in ad hoc networks. In this paper, a route protocol called Qos-AOMDV is proposed which considers two criteria. Both the balance of the route and power conservation is considered. Qos-AOMDV is based on cross-layer design, which could cooperate in sharing network-status information in different layers while maintaining the layers' separation to optimize overall network performance. Both the information in network layer and data link layer are combined to make a general criterion, so that it could satisfy the dynamics of ad hoc network. In the path selection phase, the destination nodes do not reply route request (RREQ) immediately. Route reply (RREP) is carried out based on the general cost criterion. In transmission phase, data is transmitted in multiple paths one by one to balance the energy and the traffic loads in multiple paths. It is shown by simulation that QoS-AOMDV could achieve remarkable improvements in terms of end to end delay, throughput and lifetime as compared to AOMDV.
{"title":"QoS Multipath Routing Protocol Based on Cross Layer Design for Ad hoc Networks","authors":"Jian Chen, Zhen Li, Juanwei Liu, Yonghong Kuo","doi":"10.1109/ICICIS.2011.168","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.168","url":null,"abstract":"Much research efforts have been devoted to develop protocols based on one criterion, majority of the routing protocols consider energy conservation or minimum bandwidth. But only one factor could not guarantee the requirements for quality of the service (Qos) in ad hoc networks. In this paper, a route protocol called Qos-AOMDV is proposed which considers two criteria. Both the balance of the route and power conservation is considered. Qos-AOMDV is based on cross-layer design, which could cooperate in sharing network-status information in different layers while maintaining the layers' separation to optimize overall network performance. Both the information in network layer and data link layer are combined to make a general criterion, so that it could satisfy the dynamics of ad hoc network. In the path selection phase, the destination nodes do not reply route request (RREQ) immediately. Route reply (RREP) is carried out based on the general cost criterion. In transmission phase, data is transmitted in multiple paths one by one to balance the energy and the traffic loads in multiple paths. It is shown by simulation that QoS-AOMDV could achieve remarkable improvements in terms of end to end delay, throughput and lifetime as compared to AOMDV.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"642 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123048941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces the concepts of data mining and focuses on the most important and commonly used method of association rules mining. Then association rule mining is applied to the related teaching activities, and some information and rules are got. Using this information can better predict teaching situation and assess teaching effectiveness.
{"title":"Application of Association Rules in College Teaching","authors":"Huiping Wang, Ruowu Zhong","doi":"10.1109/ICICIS.2011.60","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.60","url":null,"abstract":"This paper introduces the concepts of data mining and focuses on the most important and commonly used method of association rules mining. Then association rule mining is applied to the related teaching activities, and some information and rules are got. Using this information can better predict teaching situation and assess teaching effectiveness.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117098505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we provide a method of constructing pairing-friendly elliptic curves on which the optimal pairing can be defined and the resulting curves have small ¦Ñ value approximate to 1. Our algorithm is explicit and works for arbitrary embedding degree k and large prime subgroup order r.
{"title":"Constructing Pairing-friendly Elliptic Curves with Small rho","authors":"Mingqiang Wang, Cai Jie","doi":"10.1109/ICICIS.2011.56","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.56","url":null,"abstract":"In this paper, we provide a method of constructing pairing-friendly elliptic curves on which the optimal pairing can be defined and the resulting curves have small ¦Ñ value approximate to 1. Our algorithm is explicit and works for arbitrary embedding degree k and large prime subgroup order r.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of modern education, and considering the shortcoming of current online exam system, a new projection of online exam system based on data mining is given, and the key implementation techniques and methods are also described.
{"title":"Design and Implementation of Online Exam System Based on Data Mining","authors":"Huiping Wang, Ruowu Zhong","doi":"10.1109/ICICIS.2011.59","DOIUrl":"https://doi.org/10.1109/ICICIS.2011.59","url":null,"abstract":"With the development of modern education, and considering the shortcoming of current online exam system, a new projection of online exam system based on data mining is given, and the key implementation techniques and methods are also described.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}