This study proposed a new language which offers the possibility to query Geographic Information Systems (GIS) with visual queries. Following the progress of the society and the development of technology, there is much...
详细信息
作者:
Ougouti, N.S.Belbachir, H.Amghar, Y.Benharkat, N.A.System
Signal and Data Laboratory Departement of Computer Science Faculty of Science University of Science and Technology Oran Mohamed Boudiaf USTO P.O. Box 1505 El MNaouer Oran Algeria LIRIS
UMR 5205 Insa of Lyon 7 Avenue Jean Capelle F-69621 Villeurbanne CEDEX France
Access to distributed, heterogeneous and autonomous information sources, becomes possible with the Internet. These information sources are distinguished by the nature of information, namely, the ontological domain to ...
详细信息
An automated Intrusion Prevention Mechanism (AIPM) which comprises the functionalities of IDS,IPS,and auto configuring network devices is proposed to enhance network security. AIPM is a mechanism that includes automat...
详细信息
ISBN:
(纸本)9781424463473
An automated Intrusion Prevention Mechanism (AIPM) which comprises the functionalities of IDS,IPS,and auto configuring network devices is proposed to enhance network security. AIPM is a mechanism that includes automated intrusion prevention function and automated analysis of intrusion messages function. In addition,the ability of automatically detecting and analyzing network traffic allows AIPM to detect malicious attacks in almost real time. Likewise,the ability of automatically analyzing intrusion messages and network configuration enable AIPM to build a topological view and locate the source of a malicious attack. Results from the case studies show that AIPM imposes lower overhead than conventional method,which queries all pre-defined routers to block every interface irrespective of where the attack is launched. In summary,AIPM which incorporates the functionalities of IDS/IPS offers network protection against potential malicious acts without incurring additional overheads as compare to the conventional method.
Requirements Engineering is a sub discipline of Software Engineering, which is an important and vital phase in the overall software engineering life cycle. Software as a final product is deemed to fail if it does not ...
详细信息
ISBN:
(纸本)9781424469826;9788988678183
Requirements Engineering is a sub discipline of Software Engineering, which is an important and vital phase in the overall software engineering life cycle. Software as a final product is deemed to fail if it does not fulfill the needs of its users. A number of contributions have been made to refine the requirements engineering process. Most of them attempted to link requirements to goals. This new trend is called as Goal-Oriented Requirement Engineering (GORE). A number of goal-oriented RE methods have been subsequently derived by various researches. This paper reviews some of the significant research works done in GORE. The comparative study may serve as a guide for readers to select an appropriate goal-oriented technique for fulfilling his/her requirements engineering needs.
This paper deals with the vehicle and driver scheduling problems at UKM transportation department. Given daily sets of trips, drivers and non homogenous vehicles fleet, the aim is to schedule the resources in order to...
详细信息
The human immune system provides inspiration in the attempt of solving the knowledge acquisition bottleneck in developing ontology for semantic web application. In this paper, we proposed an extension to the Guided Ag...
详细信息
data preprocessing is an important step in data mining. It is used to resolve various types of problem in a large dataset in order to produce quality data. It consists of four steps, namely, data cleaning, integration...
详细信息
This paper deals with the vehicle and driver scheduling problems at UKM transportation department. Given daily sets of trips, drivers and non homogenous vehicles fleet, the aim is to schedule the resources in order to...
详细信息
This paper deals with the vehicle and driver scheduling problems at UKM transportation department. Given daily sets of trips, drivers and non homogenous vehicles fleet, the aim is to schedule the resources in order to cover, if possible, all the trip demands. The problem formulation has been done using sequential approach where an integer programming and goal programming models have been presented respectively for vehicle scheduling problem and driver scheduling problem.
data preprocessing is an important step in data mining. It is used to resolve various types of problem in a large dataset in order to produce quality data. It consists of four steps, namely, data cleaning, integration...
详细信息
data preprocessing is an important step in data mining. It is used to resolve various types of problem in a large dataset in order to produce quality data. It consists of four steps, namely, data cleaning, integration, reduction and transformation. The literature shows that each preprocessing step consists of various techniques. In order to develop quality data, a data miner must decide the most appropriate techniques in every step of data preprocessing. In this study, we focus on data reduction particularly data discretization as one important data preprocessing step. data reduction involves reducing the data distribution by reducing the range of continuous data into a range of values or categories. data discretization plays a major role in reducing the attribute intervals of data values. Finding an appropriate number of discrete values will improve the performance of the data mining modelling, particularly in terms of classification accuracy. This paper proposes four levels of data discretization taxonomy as follows: hierarchical and non-hierarchical; splitting, merging and combination; supervised and unsupervised combinations; and binning, statistic, entropy and other related techniques. The taxonomy is developed based on a detailed review of previous discretization techniques. More than fifty techniques are investigated, and the structure of the discretization approach is outlined. Guidelines on how to use the proposed taxonomy are also discussed.
暂无评论