Ridesharing has the great opportunity to reduce the consumption of energy and the emission of harmful gases, and to let people share the traffic costs with others. Most of the current ridesharing systems simply provid...
详细信息
Ridesharing has the great opportunity to reduce the consumption of energy and the emission of harmful gases, and to let people share the traffic costs with others. Most of the current ridesharing systems simply provide a number of candidates for users to choose. Time-consuming negotiation often discourages people from ridesharing. We propose a novel approach that assigns users to form ridesharing groups according to their routes and payments. Given a driver, our goal is to find a group of passengers who will pay the driver the most. Under the payment scheme, the passengers who share rides on the same route will equally share the expense with the driver. For the prompt response to an online system, our approach aims for the near-optimal group, where the available seats on the driver route are occupied by passengers as many as possible. Compared with the previous methods, the experiment results show that our approach incurs a little overhead but obtains answers of good quality, measured by the driver's saving, under various parameter settings.
MicroRNAs can regulate hundreds of target genes and play a pivotal role in a broad range of biological process. However, relatively little is known about how these highly connected miRNAs-target networks are remodelle...
详细信息
MicroRNAs can regulate hundreds of target genes and play a pivotal role in a broad range of biological process. However, relatively little is known about how these highly connected miRNAs-target networks are remodelled in the context of various diseases. Here we examine the dynamic alteration of context-specific miRNA regulation to determine whether modified microRNAs regulation on specific biological processes is a useful information source for predicting cancer prognosis. A new concept, Context-specific miRNA activity (CoMi activity) is introduced to describe the statistical difference between the expression level of a miRNA's target genes and non-targets genes within a given gene set (context).
Web applications are increasing at an enormous speed and its users are increasing at exponential speed. The evolutionary changes in technology have made it possible to capture the users' essence and interactions w...
详细信息
Web applications are increasing at an enormous speed and its users are increasing at exponential speed. The evolutionary changes in technology have made it possible to capture the users' essence and interactions with web applications through web server log file. Web log file is saved as text (.txt) file. Due to large amount of “irrelevant information” in the web log, the original log file can not be directly used in the web usage mining (WUM) procedure. Therefore the preprocessing of web log file becomes imperative. The proper analysis of web log file is beneficial to manage the web sites effectively for administrative and users' prospective. Web log preprocessing is initial necessary step to improve the quality and efficiency of the later steps of WUM. There are number of techniques available at preprocessing level of WUM. Different techniques are applied at preprocessing level such as data cleaning, data filtering, and data integration. In this paper, we will survey the preprocessing techniques to identify the issues and how WUM preprocessing can be improved for pattern mining and analysis.
Certificateless public key cryptography (CLPKC) eliminates certificate management in traditional public key infrastructure and solves the problem of the key escrow in identity-based cryptography. Certificateless signa...
详细信息
Privacy Preserving in data Mining (PPDM) is a process by which certain sensitive information is hidden during data mining without precise access to original dataset. Majority of the techniques proposed in the literatu...
详细信息
Privacy Preserving in data Mining (PPDM) is a process by which certain sensitive information is hidden during data mining without precise access to original dataset. Majority of the techniques proposed in the literature for hiding sensitive information are based on using Support and Confidence measures in the association rules, which suffer from limitations. In this paper we propose a novel architecture which acquired other standard statistical measures instead of conventional framework of Support and Confidence to generate association rules. Specifically a weighing mechanism based on central tendency is introduced. The proposed architecture is tested with UCI datasets to hide the sensitive association rules as experimental evaluation. A performance comparison is made between the new technique and the existing one. The new architecture generates no ghost rules with complete avoidance of failure in hiding sensitive association rules. We demonstrate that Support and Confidence are not the only measures in hiding sensitive association rules. This research is aimed to contribute to data mining areas where privacy preservation is a concern.
In Web Usage Mining (WUM), web session clustering plays a key role to classify web visitors on the basis of user click history and similarity measure. Swarm based web session clustering helps in many ways to manage th...
详细信息
In Web Usage Mining (WUM), web session clustering plays a key role to classify web visitors on the basis of user click history and similarity measure. Swarm based web session clustering helps in many ways to manage the web resources effectively such as web personalization, schema modification, website modification and web server performance. In this paper, we propose a framework for web session clustering at preprocessing level of web usage mining. The framework will cover the data preprocessing steps to prepare the web log data and convert the categorical web log data into numerical data. A session vector is obtained, so that appropriate similarity and swarm optimization could be applied to cluster the web log data. The hierarchical cluster based approach will enhance the existing web session techniques for more structured information about the user sessions.
Privacy Preserving data Mining (PPDM) is receiving a lot of attention recently by researchers from multiple domains, especially in Association Rule Mining. The outputs of Association Rule Mining often involve values o...
详细信息
Privacy Preserving data Mining (PPDM) is receiving a lot of attention recently by researchers from multiple domains, especially in Association Rule Mining. The outputs of Association Rule Mining often involve values of attributes that can be used to characterize the identities of the users. The relations between antecedents and consequents are also explicitly displayed. The purpose of preserving association rules is to minimize the risk of disclosing sensitive information to external parties. In this paper, we proposed a PPDM model for XML Association Rules (XARs). The proposed model identifies the most probable items called `sensitive items', and to modify their original data sources, so that the resultant XARs can have higher accuracy and stronger reliability. Such reliability is not addressed before in the literature in any kind of methodology used in PPDM domain and especially in XML association rules mining. Thus, the significance of the suggested model sets to open a new research dimension to the academia in order to control the sensitive information in a more unyielding line of attack.
Emergency evacuation in public places becomes a research focus in recent decades. One major objective of evacuation is to maximize the efficiency of the whole evacuation system. The paper proposes a multiobjective eva...
详细信息
ISBN:
(纸本)9781424473014
Emergency evacuation in public places becomes a research focus in recent decades. One major objective of evacuation is to maximize the efficiency of the whole evacuation system. The paper proposes a multiobjective evacuation route assignment model to plan an optimal egress route set for the individual evacuees. The three objectives in the proposed model are to minimize the total evacuation time, minimize the total travel distance of all the evacuees and minimize the congestion during the evacuation process. These objectives need to be satisfied simultaneously while some of them conflict with each other. The travel speed on each road segment is related with the time and the number of evacuees on it during a certain time period. The congestion of a road segment is modeled as the density of evacuees passing it in time and space dimensions. The evacuation route assignment problem can be treated as a combinatorial optimization problem. A multiobjective optimization model based genetic algorithm is adopted to solve the proposed evacuation routing problem. Wuhan Sport center in Wuhan city of China was taken as the experiment scenario to test the performance of the proposed algorithm. The results showed that it can provide some system optimal evacuation plans. Meanwhile, the multi-objective optimization model based genetic algorithm can produce a pareto optimal set rather than single optimal point, thus the model can give alternative strategies for the evacuation policy makers.
Requirements engineering is a sub discipline of Software engineering, which is an important and vital phase in the overall software engineering life cycle. Software as a final product is deemed to fail if it does not ...
详细信息
ISBN:
(纸本)9781424469826;9788988678183
Requirements engineering is a sub discipline of Software engineering, which is an important and vital phase in the overall software engineering life cycle. Software as a final product is deemed to fail if it does not fulfill the needs of its users. A number of contributions have been made to refine the requirements engineering process. Most of them attempted to link requirements to goals. This new trend is called as Goal-Oriented Requirement engineering (GORE). A number of goal-oriented RE methods have been subsequently derived by various researches. This paper reviews some of the significant research works done in GORE. The comparative study may serve as a guide for readers to select an appropriate goal-oriented technique for fulfilling his/her requirements engineering needs.
暂无评论