The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two thr...
详细信息
The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two threads: pattern mining and pattern reasoning. Pattern mining means the automatic discovery of interesting user topic models. A novel topic structure is presented for this thread. Pattern reasoning means the utilization and maintenance of the interesting user topic models to determine if an input data is relevant to the specified topic. The innovation for this thread is the use of meta-knowledge for the discovered knowledge. In this way the system can trace errors to update inadequate subtopics in the user topic model. The experimental results show that all objectives we expect for the topic-oriented model are achievable.
Processing of a set of multi-level digital certificates, particularly path construction and validation, can be excessively resource consuming, and even impractical in some cases. This article introduces classification...
Processing of a set of multi-level digital certificates, particularly path construction and validation, can be excessively resource consuming, and even impractical in some cases. This article introduces classifications of certificate sets as “minimal”, “surplus”, and “deficient” and explains the new paradigm of a “recursive certificate” structure designed to provide the equivalent of a “minimal set” of conventional certificates containing only the necessary and sufficient information to minimize the effort to validate a certificate sequence, with a potential avoidance of duplication of validation previously handled by related Certification Authorities.
An ontology-based Web mining model tends to extract an ontology from user feedback and use it to search the right data from the Web to answer what users want. It is indubitable that we can obtain numerous discovered p...
详细信息
ISBN:
(纸本)9780769521008
An ontology-based Web mining model tends to extract an ontology from user feedback and use it to search the right data from the Web to answer what users want. It is indubitable that we can obtain numerous discovered patterns using a Web mining model. However, some discovered patterns might include uncertainties when we extract them. Also user profiles are changeable. Therefore, the difficult issue is how to use and maintain the discovered patterns. This paper presents a theoretical framework for this issue, which consists of automatic ontology extraction, reasoning on the ontology and capturing evolving patterns. The experimental results show that all objectives we expect for the theoretical framework are achievable.
In this paper, we propose a model for discovering frequent sequential patterns, phrases, which can be used as profile descriptors of documents. It is indubitable that we can obtain numerous phrases using data mining a...
详细信息
ISBN:
(纸本)9780769521008
In this paper, we propose a model for discovering frequent sequential patterns, phrases, which can be used as profile descriptors of documents. It is indubitable that we can obtain numerous phrases using data mining algorithms. However, it is difficult to use these phrases effectively for answering what users want. Therefore, we present a pattern taxonomy extraction model which performs the task of extracting descriptive frequent sequential patterns by pruning the meaningless ones. The model then is extended and tested by applying it to the information filtering system. The results of the experiment show that pattern-based methods outperform the keyword-based methods. The results also indicate that removal of meaningless patterns not only reduces the cost of computation but also improves the effectiveness of the system.
The world appears to us as complex and difficult to comprehend. Millennia of accumulated human experience were necessary to assemble the picture of our world that we have today. The purpose of general, systems theory,...
详细信息
The world appears to us as complex and difficult to comprehend. Millennia of accumulated human experience were necessary to assemble the picture of our world that we have today. The purpose of general, systems theory, is to formulate concepts and methods for analysing complex situations, processes and structures irrespective of their specific nature. At times the concepts of general systems theory appear too general to be useful. In this context it is important to remember that the purpose of these concepts is to provide us with a generic skeleton that we can adapt to the specific situation under analysis. It is like a master plan that lays out the general architecture for a construction. It helps in finding the most appropriate overall layout from which we can proceed with confidence to work out the details. We will show in this paper, how we can solve problems in general.
This paper describes a general procedure for the requirement compliant design of robots and how design knowledge can be captured and correlated with the stakeholder demands. The key part of the method is to make an in...
详细信息
This paper describes a general procedure for the requirement compliant design of robots and how design knowledge can be captured and correlated with the stakeholder demands. The key part of the method is to make an inventory of the stakeholder demands. We have created a structured list of demands for toy and educational robots based on a survey of product currently on the market. With this list it is possible to associate robot structures, functions and processes to the various demands. Thus the designer can determine which demands relate to which structure functions and processes and vice versa what requirements are affected by a given structure, function or process.
This paper studies the problem of creating artificial fish for real-time interactive virtual worlds aimed at desktop environments with hardware 3D support. The artificial fish developed have the ability to move, sense...
详细信息
Privilege Negotiation Agents migrate from the security servers of different adminstrative domains on the Internet to the user's Secure Client Agent Environment. They work cooperatively for trust establishment and ...
"It's not the Net, it's the Nodes" is a clear statement of fact. Security concerns in an Internet / Web connected information systems environment can largely be attributed to problems in basic comput...
ISBN:
(纸本)9781920682002
"It's not the Net, it's the Nodes" is a clear statement of fact. Security concerns in an Internet / Web connected information systems environment can largely be attributed to problems in basic computer security rather than related problems in the formats, protocols, technology and artefacts that comprise the associated datacommunications networks. Indeed, in many cases, the network equipment is itself composed of programmable computer systems. This paper examines the background to the rise, fall and recent rise again of interest in computer systems security through increased attention to "trusted systems" technologies and evaluation as well as to various "add-in" hardware/software sub-systems for general purpose machines. The recent "Trusted Computing Platform Alliance (TCPA)" and Microsoft's "Palladium" initiative, along with the emergence of attention being afforded to systems evaluation through the international standard IS 15408, all bring technical, legal and policy considerations to the security of systems over the next few years. However, are these initiatives of primary value to users or do they have other imperatives, such as enforcement of "digital rights management (DRM)" and copyright claims?
暂无评论