In order to use data information in the Internet, it is necessary to extract data from web pages. An HTT tree model representing HTML pages is presented. Based on the HTT model, a wrapper generation algorithm AGW is p...
详细信息
In order to use data information in the Internet, it is necessary to extract data from web pages. An HTT tree model representing HTML pages is presented. Based on the HTT model, a wrapper generation algorithm AGW is proposed. The AGW algorithm utilizes comparing and correcting technique to generate the wrapper with the native characteristic of the HTT tree structure. The AGW algorithm can not only generate the wrapper automatically, but also rebuild the data schema easily and reduce the complexity of the computing.
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intr...
详细信息
ISBN:
(纸本)0780378652
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intrusion detection using honey pot). This approach solves the problems previously mentioned. As a component, the honey pot cooperates with IDS, which increases flexibility, configurability and security of IDS. We also present the definition of the honey pot, the description of this approach and a discussion of design and implementation issues.
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and contr...
详细信息
ISBN:
(纸本)0780378652
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and control the network virus epidemic situation. In this paper, a distributed broadband network virus precaution model is introduced. It analyzes the data in the network and discovers the coming virus epidemic situation in time. The quantitative analysis of broadband network virus epidemic situation is given, too. According to the result, we can collect the scale, the speed and the direction of the epidemic situation. Consequently, we can establish effect control policy to reduce harm.
In recent years, there has been increased interest in using data mining techniques to extract temporal rules from temporal sequences. Local temporal rules, which only a subsequence exhibits, are actually very common i...
详细信息
Combining boosting and Support Vector Machine (SVM) is proved to be beneficial, but it is too complex to be feasible. This paper introduces an efficient way to boost SVM. It embraces the idea of active learning to dyn...
详细信息
In this paper, we introduce a new method to improve the performance of combining boosting and naive Bayesian. Instead of combining boosting and Naive Bayesian learning directly, which was proved to be unsatisfactory t...
详细信息
In this paper, a novel learning method for special Bayesian networks which consist of noisy-OR and noisy-AND nodes is introduced. This method can learn networks with hidden variables and discover hidden variables when...
详细信息
In this paper, a novel learning method for special Bayesian networks which consist of noisy-OR and noisy-AND nodes is introduced. This method can learn networks with hidden variables and discover hidden variables when necessary. Compared with previous techniques for learning Bayesian networks, it uses the information in the data to guide the search for useful revisions, and can greatly improve the efficiency of the algorithm. Furthermore, this method can also be used for theory refinement. The experiments demonstrate that its performance is comparable to that of other existing hybrid theory refinement systems, while the networks produced by this method have more precise semantics and are more easily understood. In addition, this method also provides a direct mechanism for incorporating knowledge expressed as propositional Horn-clause rules into a Bayesian network. This mechanism could potentially ease the process of building Bayesian networks.
Path-constrained robot trajectory planning in the vicinity of ordinary singularities is studied in this paper. First, the desired end-effector path is parameterized with an untimed variable q/sub 0/, by which the robo...
详细信息
ISBN:
(纸本)0780374908
Path-constrained robot trajectory planning in the vicinity of ordinary singularities is studied in this paper. First, the desired end-effector path is parameterized with an untimed variable q/sub 0/, by which the robot kinematics can be formulated as a nonlinear equation. The solution to this equation forms a spatial curve in the augmented joint space. Then the path-tracking problem can be fulfilled by computing the curve solution numerically. This produces a pseudo trajectory with respect to an artificial independent parameter s, which represents the arc-length of the solution curve. The trajectory with respect to time can be obtained naturally by arbitrarily assigning s(t). Numerical simulations are carried out to verify the algorithm.
*** is a boosting method specifically designed for solving multi-class, multi-label text categorization problems. Fabrizio Sebastiani et al. (2000) provided another idea to improve these base classifiers: combining tw...
详细信息
*** is a boosting method specifically designed for solving multi-class, multi-label text categorization problems. Fabrizio Sebastiani et al. (2000) provided another idea to improve these base classifiers: combining two or more weak hypotheses as a single base classifier. Its main problem is that the amount of hypotheses selected to combine is determined not by their importance, but by the boosting iteration times already performed. This paper proposes two dynamical ways for combining any number of hypotheses according to their importance. Experimental results show that the new ideas do improve the performance of boosting.
暂无评论