Traditional technologies for enterprise applications integration (EAI), such as CORBA and EJB/DCOM component or middleware, can not be handily extended in the systems for dynamic business requirements. To solve the pr...
详细信息
data mining is gaining societal momentum due to the ever increasing availability of large amounts of human data, easily collected by a variety of sensing technologies. data mining comes with unprecedented opportunitie...
详细信息
data mining is gaining societal momentum due to the ever increasing availability of large amounts of human data, easily collected by a variety of sensing technologies. data mining comes with unprecedented opportunities and risks: a deeper understanding of human behavior and how our society works is darkened by a greater chance of privacy intrusion and unfair discrimination based on the extracted patterns and profiles. Although methods independently addressing privacy or discrimination in data mining have been proposed in the literature, in this context we argue that privacy and discrimination risks should be tackled together, and we present a methodology for doing so while publishing frequent pattern mining results. We describe a combined pattern sanitization framework that yields both privacy and discrimination-protected patterns, while introducing reasonable (controlled) pattern distortion.
With the unceasing improvement of data mining and natural language processing technology, more and more researchers devote themselves to comment resources on the Web. While there are no readymade emotional corpora in ...
详细信息
With the unceasing improvement of data mining and natural language processing technology, more and more researchers devote themselves to comment resources on the Web. While there are no readymade emotional corpora in the financial and securities domain, emotional analysis applied in this field is still rare. As financial information is usually in the form of unstructured Web Text, this paper fully considers characteristics of financial information, and analyzes the emotion of Web Text by calculating their emotional inclination values based on evaluation scores of morpheme. For each document we compute an emotional value. Its symbol indicates the emotional inclination, and its absolute value reflects the emotional intensity. Thus, this can prevent the limitation of lacking emotional corpus in the financial and securities domain. Experimental results demonstrate that this presented scheme optimizes the existing main schemes to effectively analyze the emotional inclinations of Web financial information.
Currently, most works on interval valued problems mainly focus on attribute reduction (i.e., feature selection) by using rough set technologies. However, less research work on classifier building on interval-valued pr...
详细信息
Currently, most works on interval valued problems mainly focus on attribute reduction (i.e., feature selection) by using rough set technologies. However, less research work on classifier building on interval-valued problems has been conducted. It is promising to propose an approach to build classifier for interval-valued problems. In this paper, we propose a classification approach based on interval valued fuzzy rough sets. First, the concept of interval valued fuzzy granules are proposed, which is the crucial notion to build the reduction framework for the interval-valued databases. Second, the idea to keep the critical value invariant before and after reduction is selected. Third, the structure of reduction rule is completely studied by using the discernibility vector approach. After the description of rule inference system, a set of rules covering all the objects can be obtained, which is used as a rule based classifier for future classification. Finally, numerical examples are presented to illustrate feasibility and affectivity of the proposed method in the application of privacy protection.
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,...
详细信息
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%.
In this paper, chaos synchronization problem of the fractional order Coullet system in a master-slave pattern is investigated by using the nonlinear feedback control method. Suitable synchronization conditions are ana...
详细信息
this paper,the author defines Generalized Unique Game Problem (GUGP),where weights of the edges are allowed to be *** special types of GUGP are illuminated,GUGP-NWA,where the weights of all edges are negative,and GUGP...
this paper,the author defines Generalized Unique Game Problem (GUGP),where weights of the edges are allowed to be *** special types of GUGP are illuminated,GUGP-NWA,where the weights of all edges are negative,and GUGP-PWT(ρ),where the total weight of all edges are positive and the negative-positive ratio is at most ρ.
Recently, social tagging systems become more and more popular in many Web 2.0 applications. In such systems, Users are allowed to annotate a particular resource with a freely chosen a set of tags. These user-generated...
详细信息
Recently, social tagging systems become more and more popular in many Web 2.0 applications. In such systems, Users are allowed to annotate a particular resource with a freely chosen a set of tags. These user-generated tags can represent users' interests more concise and closer to human understanding. Interests will change over time. Thus, how to describe users' interests and interests transfer path become a big challenge for personalized recommendation systems. In this approach, we propose a variable-length time interval division algorithm and user interest model based on time interval. Then, in order to draw users' interests transfer path over a specific time period, we suggest interest transfer model. After that, we apply a classical community partition algorithm in our approach to separate users into communities. Finally, we raise a novel method to measure users' similarities based on interest transfer model and provide personalized tag recommendation according to similar users' interests in their next time intervals. Experimental results demonstrate the higher precision and recall with our approach than classical user-based collaborative filtering methods.
Detecting abnormalities in manufacturing process at an early stage is advantageous. This can be done by monitoring its Control Chart Patterns (CCPs). These patterns can be considered as time series data. Therefore, ac...
详细信息
Detecting abnormalities in manufacturing process at an early stage is advantageous. This can be done by monitoring its Control Chart Patterns (CCPs). These patterns can be considered as time series data. Therefore, accurate classification of CCPs is vital in the process control. There have been several types of CCPs classifiers with various degrees of accuracy. This work is concerned with implementation of a CCPs classifier based on neural networks and symbolic representation as its preprocessing method. CCPs are generated by the commonly used Generalized Autoregressive Conditional Heteroskedasticity (GARH) Model. Several of both feed forward and recurrent networks are investigated for the classifier. The symbolic representation of time series known as Symbolic Aggregate Approximation (SAX) is selected as its application was satisfactory in numerous similar works. In feed forward network, the Multilayer Perceptron network yields the best performance while Time-lag network yields the best performance for recurrent network. The results of neural network classifier which utilizes SAX in preprocessing in this work are superior than previous works which used the same CCPs model.
The existing query languages for XML (e.g., XQuery) require professional programming skills to be formulated, however, such complex query languages burden the query processing. In addition, when issuing an XML query, ...
详细信息
ISBN:
(纸本)9781467300421
The existing query languages for XML (e.g., XQuery) require professional programming skills to be formulated, however, such complex query languages burden the query processing. In addition, when issuing an XML query, users are required to be familiar with the content (including the structural and textual information) of the hierarchical XML, which is diffcult for common users. The need for designing user friendly interfaces to reduce the burden of query formulation is fundamental to the spreading of XML community. We present a twig-based XML graphical search system, called LotusX, that provides a graphical interface to simplify the query processing without the need of learning query language and data schemas and the knowledge of the content of the XML document. The basic idea is that LotusX proposes "position-aware" and "auto-completion" features to help users to create tree-modeled queries (twig pattern) by providing the possible candidates on-the-fly. In addition, complex twig queries (including order sensitive queries) are supported in LotusX. Furthermore, a new ranking strategy and a query rewriting solution are implemented to rank and rewrite the query effectively. We provide an online demo for LotusX system: http://***:8080/LotusX.
暂无评论