In 2D animation processes, many simulated the movement and the deformation of a moving deformable object simultaneously. The binding of the movement and the deformation increased the complexity and restricted user'...
详细信息
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to p...
详细信息
Due to the advancement of digital media, a large number of electronic books are digitized from old paper books through digital cameras or scanners. The scanned image often contains the distractions such as noises outs...
详细信息
The rise of attacks and incidents need additional and distinct methods of response. This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Pr...
详细信息
This paper describes how, in large-scale multi-agent systems, each agent's adaptive selection of peer agents for collaborative tasks affects the overall performance and how this performance varies with the workloa...
详细信息
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to p...
详细信息
Mobile Ad Hoc networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to provide efficient end-to-end communication. Due to the diverse applications that use MANETs, such as battlefield, emergency services, and disaster discovery, MANETs offer many advantages to many organizations that need wireless roaming. For efficient and timely use, routing and synchronization are essential. Both are hot research topics in MANETs. This paper concentrates on routing, which is a challenging task and has seen a huge number of different strategies proposed, each claiming to provide an improvement over other strategies. These competing strategies make it quite difficult to determine which one may perform optimally under a number of different sets of network conditions as defined by their Quality of Service (QoS) offerings. This paper reviews some of the state-of-the-art and widely investigated MANET routing strategies in the literature. Moreover, a performance comparison of discussed routing protocol strategies is provided and suggestions are made to achieve improvement in performance of these protocols. This research is followed by presenting further research that will be pursued to define a radically most optimum set of strategies to satisfy different types of application domains.
This paper presents an approach to determine the impact on throughput on airport resources in relation with operating procedures at airports. Due to time and cost constraints, identification of shortages on airport re...
详细信息
ISBN:
(纸本)9781617823169
This paper presents an approach to determine the impact on throughput on airport resources in relation with operating procedures at airports. Due to time and cost constraints, identification of shortages on airport resources is not a trivial task. Identification and elimination of shortages at airports deals with discovering dependencies within a sequence of actions, and with the dependencies through which the different components are conditional with their related actions. Identifying of shortages at airports is of great value due to its immense impact in determining the throughput on airport resources depending on the overall operation of the airport.
In Web Usage Mining (WUM), web session clustering plays a key role to classify web visitors on the basis of user click history and similarity measure. Swarm based web session clustering helps in many ways to manage th...
详细信息
In Web Usage Mining (WUM), web session clustering plays a key role to classify web visitors on the basis of user click history and similarity measure. Swarm based web session clustering helps in many ways to manage the web resources effectively such as web personalization, schema modification, website modification and web server performance. In this paper, we propose a framework for web session clustering at preprocessing level of web usage mining. The framework will cover the data preprocessing steps to prepare the web log data and convert the categorical web log data into numerical data. A session vector is obtained, so that appropriate similarity and swarm optimization could be applied to cluster the web log data. The hierarchical cluster based approach will enhance the existing web session techniques for more structured information about the user sessions.
Privacy Preserving in data Mining (PPDM) is a process by which certain sensitive information is hidden during data mining without precise access to original dataset. Majority of the techniques proposed in the literatu...
详细信息
Privacy Preserving in data Mining (PPDM) is a process by which certain sensitive information is hidden during data mining without precise access to original dataset. Majority of the techniques proposed in the literature for hiding sensitive information are based on using Support and Confidence measures in the association rules, which suffer from limitations. In this paper we propose a novel architecture which acquired other standard statistical measures instead of conventional framework of Support and Confidence to generate association rules. Specifically a weighing mechanism based on central tendency is introduced. The proposed architecture is tested with UCI datasets to hide the sensitive association rules as experimental evaluation. A performance comparison is made between the new technique and the existing one. The new architecture generates no ghost rules with complete avoidance of failure in hiding sensitive association rules. We demonstrate that Support and Confidence are not the only measures in hiding sensitive association rules. This research is aimed to contribute to data mining areas where privacy preservation is a concern.
Privacy Preserving data Mining (PPDM) is receiving a lot of attention recently by researchers from multiple domains, especially in Association Rule Mining. The outputs of Association Rule Mining often involve values o...
详细信息
Privacy Preserving data Mining (PPDM) is receiving a lot of attention recently by researchers from multiple domains, especially in Association Rule Mining. The outputs of Association Rule Mining often involve values of attributes that can be used to characterize the identities of the users. The relations between antecedents and consequents are also explicitly displayed. The purpose of preserving association rules is to minimize the risk of disclosing sensitive information to external parties. In this paper, we proposed a PPDM model for XML Association Rules (XARs). The proposed model identifies the most probable items called `sensitive items', and to modify their original data sources, so that the resultant XARs can have higher accuracy and stronger reliability. Such reliability is not addressed before in the literature in any kind of methodology used in PPDM domain and especially in XML association rules mining. Thus, the significance of the suggested model sets to open a new research dimension to the academia in order to control the sensitive information in a more unyielding line of attack.
暂无评论