Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579698
Xiao Jun
Traditional Web services, which are mainly technical specifications based on UDDI, provide service discovery by simple classification and key word matching, resulting in low precision ratio and recall ratio as well as low compatibility of service multiplexing and service composition. This paper, basing on Web service models and in combination with genetic algorithm, brings forward a multi-target optimization selection model based on similarity, QoS, matching degree, rating and feasibility of Web services, and provides an effective method for Web service discovery.
{"title":"Study on optimization selection model of Web service discovery based on genetic algorithm","authors":"Xiao Jun","doi":"10.1109/ICACTE.2010.5579698","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579698","url":null,"abstract":"Traditional Web services, which are mainly technical specifications based on UDDI, provide service discovery by simple classification and key word matching, resulting in low precision ratio and recall ratio as well as low compatibility of service multiplexing and service composition. This paper, basing on Web service models and in combination with genetic algorithm, brings forward a multi-target optimization selection model based on similarity, QoS, matching degree, rating and feasibility of Web services, and provides an effective method for Web service discovery.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5578957
Raymond Y. K. Lau
Personalized Web search systems have been explored to alleviate the problem of information overload by keeping track of a user's specific information retrieval (IR) preferences, and then pushing information to the user according to their preferences maintained in a user profile. Nevertheless, personalization and contextualization is always associated with a computational cost. Therefore, it is more advantageous for a personalized Web search system to evaluate the necessity of personalization for a query before invoking the personalization mechanism. Unfortunately, most of the existing personalized Web search approaches only blindly personalize users' queries without considering the characteristic of the queries or the searchers who issue those queries. The main contributions of our research work presented in this paper are two fold. First, a novel selective Web search personalization and contextualization method is developed to enhance the effectiveness of personalized Web search. Second, an inferential language model which can take into account the semantic and contextual information associated with a Web search scenario is developed to enhance the selective personalization and contextualization process. The results of our initial experiment show that the proposed selective personalization and contextualization method underpinned by inferential language modeling significantly outperforms a baseline method developed based on syntactic click entropy. To the best of our knowledge, this is the first inferential language modeling approach that has been successfully applied to Web search personalization and contextualization.
{"title":"Inferential language modeling for selective Web search personalization and contextualization","authors":"Raymond Y. K. Lau","doi":"10.1109/ICACTE.2010.5578957","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5578957","url":null,"abstract":"Personalized Web search systems have been explored to alleviate the problem of information overload by keeping track of a user's specific information retrieval (IR) preferences, and then pushing information to the user according to their preferences maintained in a user profile. Nevertheless, personalization and contextualization is always associated with a computational cost. Therefore, it is more advantageous for a personalized Web search system to evaluate the necessity of personalization for a query before invoking the personalization mechanism. Unfortunately, most of the existing personalized Web search approaches only blindly personalize users' queries without considering the characteristic of the queries or the searchers who issue those queries. The main contributions of our research work presented in this paper are two fold. First, a novel selective Web search personalization and contextualization method is developed to enhance the effectiveness of personalized Web search. Second, an inferential language model which can take into account the semantic and contextual information associated with a Web search scenario is developed to enhance the selective personalization and contextualization process. The results of our initial experiment show that the proposed selective personalization and contextualization method underpinned by inferential language modeling significantly outperforms a baseline method developed based on syntactic click entropy. To the best of our knowledge, this is the first inferential language modeling approach that has been successfully applied to Web search personalization and contextualization.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114963279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579645
M. Zobok, P. Tanuška, P. Važan
The article provides the general overview and base proposal of solution in the area of controlling the IT resources within the company. It points out some common deficits of integrating systems and running data transfers. Lack of functionality in some large systems is supplemented by using interim database and proposed SQL processing prior to data loads. Interim database is also used for storing the import result status and log functionality.
{"title":"The integration of processes within IT resources control","authors":"M. Zobok, P. Tanuška, P. Važan","doi":"10.1109/ICACTE.2010.5579645","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579645","url":null,"abstract":"The article provides the general overview and base proposal of solution in the area of controlling the IT resources within the company. It points out some common deficits of integrating systems and running data transfers. Lack of functionality in some large systems is supplemented by using interim database and proposed SQL processing prior to data loads. Interim database is also used for storing the import result status and log functionality.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115183770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579674
Weijian Huang, Yan An, Wei Du
In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed intrusion detection technology in electronic commerce. Distributed intrusion detection technology as the supplement of firewall has become an indispensable and important component of electronic commerce security.
{"title":"Distributed intrusion detection technology's research in electronic commerce","authors":"Weijian Huang, Yan An, Wei Du","doi":"10.1109/ICACTE.2010.5579674","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579674","url":null,"abstract":"In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed intrusion detection technology in electronic commerce. Distributed intrusion detection technology as the supplement of firewall has become an indispensable and important component of electronic commerce security.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115646268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579679
Fei Sun, Shi-ping Yang
Key Establishment protocol based on passwords or pre-shared security keys was difficulty to share the password or security keys in Coordinated-Control Framework Based on Agent. Through analyzing the working mechanism of CCFBA, one novel session Key Establishment Protocol with sharing no secret was proposed, based on the elliptic curve Diffie-Hellman algorithm. This protocol can provide identity authentication, forward secrecy, foil man-in-the-middle attacks.
{"title":"Based on the agent of elliptic curve Diffie-Hellman Key Establishment Protocol","authors":"Fei Sun, Shi-ping Yang","doi":"10.1109/ICACTE.2010.5579679","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579679","url":null,"abstract":"Key Establishment protocol based on passwords or pre-shared security keys was difficulty to share the password or security keys in Coordinated-Control Framework Based on Agent. Through analyzing the working mechanism of CCFBA, one novel session Key Establishment Protocol with sharing no secret was proposed, based on the elliptic curve Diffie-Hellman algorithm. This protocol can provide identity authentication, forward secrecy, foil man-in-the-middle attacks.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116017154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579491
Baozhu Li, Yue Liu, Guoxin Chu
Vehicular Ad hoc networks are one of the most advanced technologies for intelligent transportation system that allow vehicle-vehicle to form multi-hop ad hoc networks. Routing is one of the challenges in vehicular ad hoc networks because of the frequent change of its topology structure. In this paper, we propose a routing protocol (AODV_BD) for vehicular ad hoc networks that improves the Ad hoc On-Demand Distance Vector (AODV) routing protocol by making it reduce the packet delay. The simulating experiments provide an efficient approach to estimate the routing protocol performance of a VANET.
{"title":"Improved AODV routing protocol for vehicular Ad hoc networks","authors":"Baozhu Li, Yue Liu, Guoxin Chu","doi":"10.1109/ICACTE.2010.5579491","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579491","url":null,"abstract":"Vehicular Ad hoc networks are one of the most advanced technologies for intelligent transportation system that allow vehicle-vehicle to form multi-hop ad hoc networks. Routing is one of the challenges in vehicular ad hoc networks because of the frequent change of its topology structure. In this paper, we propose a routing protocol (AODV_BD) for vehicular ad hoc networks that improves the Ad hoc On-Demand Distance Vector (AODV) routing protocol by making it reduce the packet delay. The simulating experiments provide an efficient approach to estimate the routing protocol performance of a VANET.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116037976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579024
Liviu Badea
We introduce a novel multi-relational learning algorithm based on simultaneous nonnegative matrix factorizations, able to distinguish between “target” and “background” relations, deal with incomplete data and so-called “link” functions. The ability to handle incomplete data allows us to tackle both relation prediction and clustering. Moreover, the nonnegativity constraints are essential for the interpretability of the resulting clusters. We apply our approach to a large breast cancer dataset for which we find 5 subclasses that agree very well with the known subclassification of this disease, while emphasizing the main biological processes and genes involved in the corresponding subtypes.
{"title":"Multi-relational factorizations for cancer subclassification","authors":"Liviu Badea","doi":"10.1109/ICACTE.2010.5579024","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579024","url":null,"abstract":"We introduce a novel multi-relational learning algorithm based on simultaneous nonnegative matrix factorizations, able to distinguish between “target” and “background” relations, deal with incomplete data and so-called “link” functions. The ability to handle incomplete data allows us to tackle both relation prediction and clustering. Moreover, the nonnegativity constraints are essential for the interpretability of the resulting clusters. We apply our approach to a large breast cancer dataset for which we find 5 subclasses that agree very well with the known subclassification of this disease, while emphasizing the main biological processes and genes involved in the corresponding subtypes.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579520
D. Cao, Yunguo Gao, Huanli Li
Evaluation function is an important item to measure the quality of images in auto-focusing systems. This paper introduces four categories of evaluation functions which are respectively based on gradient, correlation, statistics and transform. These functions formally differ from each other and their performances are not consistent when dealing with different images. The same function also performs different when the processed images have different characteristics. Five commonly used functions from the four categories are verified and compared under different circumstances in order to validate their performances. The result provides references for variety of selections in the practical application.
{"title":"Auto-focusing evaluation functions in digital image system","authors":"D. Cao, Yunguo Gao, Huanli Li","doi":"10.1109/ICACTE.2010.5579520","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579520","url":null,"abstract":"Evaluation function is an important item to measure the quality of images in auto-focusing systems. This paper introduces four categories of evaluation functions which are respectively based on gradient, correlation, statistics and transform. These functions formally differ from each other and their performances are not consistent when dealing with different images. The same function also performs different when the processed images have different characteristics. Five commonly used functions from the four categories are verified and compared under different circumstances in order to validate their performances. The result provides references for variety of selections in the practical application.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579547
A. Azman, Qinggang Meng, E. Edirisinghe
Driver distractions can be categorized into 3 major parts:-visual, cognitive and manual. Visual and manual distraction on a driver can be physically detected. However, assessing cognitive distraction is difficult since it is more of an “internal” distraction rather than any easily measured “external” distraction. There are several methods available that can be used to detect cognitive driver distraction. Physiological measurements, performance measures (primary and secondary tasks) and rating scales are some of the well-known measures to detect cognitive distraction. This study focused on physiological measurements, specifically on a driver's eye and mouth movements. Six different participants were involved in our experiment. The duration of the experiment was 8 minutes and 49 seconds for each participant. Eye and mouth movements were obtained using the FaceLab Seeing Machine cameras and their magnitude of the r-values were found more than 60% thus proving that they are strongly correlated to each other.
{"title":"Non intrusive physiological measurement for driver cognitive distraction detection: Eye and mouth movements","authors":"A. Azman, Qinggang Meng, E. Edirisinghe","doi":"10.1109/ICACTE.2010.5579547","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579547","url":null,"abstract":"Driver distractions can be categorized into 3 major parts:-visual, cognitive and manual. Visual and manual distraction on a driver can be physically detected. However, assessing cognitive distraction is difficult since it is more of an “internal” distraction rather than any easily measured “external” distraction. There are several methods available that can be used to detect cognitive driver distraction. Physiological measurements, performance measures (primary and secondary tasks) and rating scales are some of the well-known measures to detect cognitive distraction. This study focused on physiological measurements, specifically on a driver's eye and mouth movements. Six different participants were involved in our experiment. The duration of the experiment was 8 minutes and 49 seconds for each participant. Eye and mouth movements were obtained using the FaceLab Seeing Machine cameras and their magnitude of the r-values were found more than 60% thus proving that they are strongly correlated to each other.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579662
D. Chang, Bo Zhang
As the logistics development trends towards regional integration, many scholars begin to pay attentions to the rationalization of regional logistics [1]. The concept of synergy is frequently proposed in the operation [2], however, the research on resources integration of regional logistics in order to share resource and collaborate is still in its infancy stage, and there is no systematic theoretical support. The paper constructs the resources integration system of regional logistics based on griddization management, analyzes the quantitative comparison of griddization and non-griddization resources integration of regional logistics, and sets up a service quality evaluation system. Comprehensive simulations and comparisons show that the griddization model is practically optimal and theoretically promising.
{"title":"Research on resources integration of regional logistics","authors":"D. Chang, Bo Zhang","doi":"10.1109/ICACTE.2010.5579662","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579662","url":null,"abstract":"As the logistics development trends towards regional integration, many scholars begin to pay attentions to the rationalization of regional logistics [1]. The concept of synergy is frequently proposed in the operation [2], however, the research on resources integration of regional logistics in order to share resource and collaborate is still in its infancy stage, and there is no systematic theoretical support. The paper constructs the resources integration system of regional logistics based on griddization management, analyzes the quantitative comparison of griddization and non-griddization resources integration of regional logistics, and sets up a service quality evaluation system. Comprehensive simulations and comparisons show that the griddization model is practically optimal and theoretically promising.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}