In this paper, we propose a pre-processing technique to improve existing string similarity join algorithms using fuzzy clustering. Our approach first identifies groups of related attributes and then, using this inform...
详细信息
In this paper, we propose a pre-processing technique to improve existing string similarity join algorithms using fuzzy clustering. Our approach first identifies groups of related attributes and then, using this information, we apply existing string similarity join algorithms on these attributes. To identify the clustered attributes we use fuzzy techniques. This approach can be applied to the integration of knowledge bases and databases, as well as handle inconsistent values and naming conventions, incorrect or missing data values, and incomplete information from multiple sources with semi-compatible attributes or homogenous attributes. Using an experimental study, we have shown our preprocessing approach improves existing string similarity join algorithms by about 10 percent on precision and recall.
The spoofing threats in wireless network increases with its popularity. They are the generator of all other attacks in wireless network. Free availability of MAC address changing tools over internet makes adversary ea...
详细信息
The spoofing threats in wireless network increases with its popularity. They are the generator of all other attacks in wireless network. Free availability of MAC address changing tools over internet makes adversary ease in changing its identity as legitimate user. detection of adversary presence avoids the launching of other wireless attacks. Presently known anomaly detection methods leave some attacks undetected. This paper analyze the possible reasons for generating false positive and false negative in Forge Resistance Relationship spoof detection method and proposed an improved method with reduced false alarms. The comparison of detecting the anomalous packet between improved method and its parent Forge Resistance Relationship Method is done in various network scenarios.
Outlier detection is one of the common tasks in engineering applications. Its aim is to identify uncommon records from large amounts of data. Many efforts have been done to reach this goal. But different approach shou...
详细信息
Outlier detection is one of the common tasks in engineering applications. Its aim is to identify uncommon records from large amounts of data. Many efforts have been done to reach this goal. But different approach should be introduced according to different application area. In some engineering cases, much frequency uncommon records may appear in a short time. In this paper, a new method is put forward to identify these uncommon records. This method is constructed based on density-based outlier discovering method. In this method, a ratio factor is used to illustrate the high-density percentage of all records. If the ratio is under a threshold the high-density records would be considered as outlier, otherwise these records would be considered as normal. Experiments show this method could effectively discovery these rare high-density data.
Watermarking for 3D models is a challenging topic in the research of watermarking. Difficulties came up on maintaining pretty robustness and implementing blind detection of watermarks in previous related work. In orde...
详细信息
Watermarking for 3D models is a challenging topic in the research of watermarking. Difficulties came up on maintaining pretty robustness and implementing blind detection of watermarks in previous related work. In order to enhance the robustness and achieve blind detection, this paper proposed a novel blind watermarking algorithm for 3D models based on the triangular meshes in the local space. The scheme embedded the watermark by modifying the location of vertices within their related space. With this approach, watermarks could be detected without the original model. Experimental results showed that the algorithm guaranteed both satisfactory visual quality and robustness, with good performance against various attacks such as translation, rotation, scaling, model cropping, vertex permutation, etc.
Computer aided evaluation is objective, scientific and standardized, and automatic defects detection technology based on X-ray digitized images is the core of computer aided evaluation. However, for the slim line defe...
详细信息
Computer aided evaluation is objective, scientific and standardized, and automatic defects detection technology based on X-ray digitized images is the core of computer aided evaluation. However, for the slim line defect whose average width is not more than three pixels, such as some weak incomplete penetrations, cracks and so on, its contrast to background is extremely low, and normal X-ray defects detection algorithm can not detect it effectively. This paper proposes a special defect segmentation algorithm to detect this kind of defects. Firstly adaptive local threshold is performed column by column to extract slim line defects preliminarily, and then the improved Hough transform is utilized to eliminate the noise, and segment the line defects. Corresponding experimental results show that the proposed algorithm is effective to detect low-contrast slim line defects in X-ray digitized images of different grey ranges.
In this paper, we investigated a new feature set, called the histograms of multi-scale orientations (H-MSO), for vehicle representation and detection. The multi-scale orientations on image pixels are calculated using ...
详细信息
In this paper, we investigated a new feature set, called the histograms of multi-scale orientations (H-MSO), for vehicle representation and detection. The multi-scale orientations on image pixels are calculated using Gabor filters of different scale and orientation parameters. Firstly, we divide the image into cells, and calculate the histograms of multi-scale orientations in each cell by statistics. Then, the values of histogram bins are normalized in each four adjacent cells and are assembled to form the feature set. Finally, the feature set is used to train an SVM classifier for on-road vehicle detection. Experiments validate the proposed feature set and the detection algorithm.
Complex networks partitioning consists in identifying denser groups of nodes. This popular research topic has applications in many fields such as biology, social sciences and physics. This led to many different partit...
详细信息
Complex networks partitioning consists in identifying denser groups of nodes. This popular research topic has applications in many fields such as biology, social sciences and physics. This led to many different partition algorithms, most of them based on Newman's modularity measure, which estimates the quality of a partition. Until now, these algorithms were tested only on a few real networks or unrealistic artificial ones. In this work, we use the more realistic generative model developed by Lancichinetti et al. to compare seven algorithms: Edge-betweenness, Eigenvector, Fast Greedy, Label Propagation, Markov Clustering, Spinglass and Walktrap. We used normalized mutual information (NMI) to assess their performances. Our results show Spinglass and Walktrap are above the others in terms of quality, while Markov Clustering and Edge-Betweenness also achieve good performance. Additionally, we compared NMI and modularity and observed they are not necessarily related: some algorithms produce better partitions while getting lower modularity.
With the increased deployment of pervasive systems, there has been an explosive growth in the number of applications being developed for such systems. Distributed applications typically depend on the underlying middle...
详细信息
With the increased deployment of pervasive systems, there has been an explosive growth in the number of applications being developed for such systems. Distributed applications typically depend on the underlying middleware infrastructure to provide services to perform their tasks. Many applications rely on a service which can detect the termination of a distributed activity being performed by a set of entities. Existing algorithms for termination detection are based on the layering paradigm wherein the algorithm can monitor application level communication. Pervasive applications, however, may not be structured as strictly layered systems. This paper proposes algorithms for termination detection of distributed applications in pervasive systems. We propose two algorithms for this problem, and show that each performs better than the other under certain conditions. Subsequently, we propose an hybrid algorithm which combines the features of the two algorithms and provides performance comparable to the better of the two algorithms under different conditions.
We describe a novel architecture for network defense designed for scaling to very high data rates (100 Gb/s) and very large user populations. Scaling requires both efficient attack detection algorithms as well as appr...
详细信息
We describe a novel architecture for network defense designed for scaling to very high data rates (100 Gb/s) and very large user populations. Scaling requires both efficient attack detection algorithms as well as appropriate an execution environment. Our architecture considers the time budget of traffic data extraction and algorithmic processing, provides a suite of detection algorithms - each designed to present different and complementary views of the data-that generate many ¿traffic events,¿ and reduces false positives by correlating these traffic events into benign or malicious hypotheses.
In order to make wafer inspection more sensitive, it is necessary to create inspection care areas that better reflect the actual layout of features in each die. However, it is very time consuming and tedious to draw s...
详细信息
In order to make wafer inspection more sensitive, it is necessary to create inspection care areas that better reflect the actual layout of features in each die. However, it is very time consuming and tedious to draw such care areas manually. In this work, we proposed a novel method to generate suitable care areas using GDS. Two innovative ways were developed and enabled this method to be implemented in a mass production.
暂无评论