Jianchao Han
California State University, Dominguez Hills
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jianchao Han.
international conference on future generation communication and networking | 2008
Jianchao Han; Juan C. Rodriguez; Mohsen Beheshti
Data mining techniques have been extensively applied in bioinformatics to analyze biomedical data. In this paper, we choose the Rapid-I¿s RapidMiner as our tool to analyze a Pima Indians Diabetes Data Set, which collects the information of patients with and without developing diabetes. The discussion follows the data mining process. The focus will be on the data preprocessing, including attribute identification and selection, outlier removal, data normalization and numerical discretization, visual data analysis, hidden relationships discovery, and a diabetes prediction model construction.
international conference on advanced software engineering and its applications | 2008
Jianchao Han; Juan C. Rodriguez; Mohsen Beheshti
Data mining techniques have been extensively applied in bioinformatics to analyze biomedical data. In this paper, we choose the Rapid-I’s RapidMiner as our tool to discover decision tree based diabetes prediction model from a Pima Indians Diabetes Data Set, which collects the information of patients with and without developing diabetes. Following the data mining process, our discussion will focus on the data preprocessing, including attribute identification and selection, outlier removal, data normalization and numerical discretization, visual data analysis, hidden relationships discovery, and a diabetes prediction model construction.
international conference on information technology: new generations | 2010
Eric Flior; Tychy Anaya; Cory Moody; Mohsen Beheshti; Jianchao Han; Kazimierz Kowalski
This research determines the feasibility of using an Exsys Corvid based expert system to detect and respond to network threats and appropriately administrate a Linux-based iptables firewall in real-time. In our implementation, we attempt to replace the human domain expert required for creating the expert system knowledge base with intrusion detection rules created by data-mining on network traffic. Our expert system will be used in conjunction with intrusion detection classification rules provided by the See5 data-mining tool, which have, in turn, been created based on the data fusion of normal and malicious network traffic from multiple network sensors.
international conference on information technology: new generations | 2012
Tomohiro Hayata; Jianchao Han; Mohsen Beheshti
Both agile software development and lean architecture have been studied in the software engineering field. Combining these two approaches has also been investigated. However, the existing research and practices only present the principles but fail to develop a framework of the software development for practitioners to follow. In this paper, a framework about how naïve agile practices could be fulfilled by introducing lean practices under the DCI (Data-Context-Interaction) paradigm is proposed. Lean practice is an end-user-focused and value-centric system design. In the proposed framework, lean architecture is complementary to agile principles and disciplines and supports agile development. This paper is exploring the possibilities of how agile methods can restore its lost insights and possibly be reinforced by lean thinking. Meanwhile, it is also examined what lean can do beyond agile. A new lean approach to building domain architecture comes from Data-Context-Interaction (DCI) paradigm which facilitates to represent the domain architecture intuitively. DCI approach allows us to successfully decouple between domain and business-logic features and provides an approach for lean practitioners to design system architecture much closer to the real-world domain. It is claimed that the investment into lean and agile methodologies go hand in hand from organizational to technical aspects by tying up with lean concepts as the backbone for agile methods. How lean makes it right and how agile makes it fast with the DCI paradigm will be demonstrated with an example. The main contribution to the software development will be presented.
international conference on information technology: new generations | 2009
Jianchao Han; Mohsen Beheshti; Kazimierz Kowalski; Joel Ortiz; Johnly Tomelden
A computer network intrusion detection and prevention system consists of collecting network traffic data, discovering user behavior patterns as intrusion detection rules, and applying these rules to prevent malicious and misuse. Many commercial off-the-shelf (COTS) products have been developed to perform each of these tasks. In this paper, the component-based software engineering approach is exploited to integrate these COTS products as components into a computerized system to automatically detect intrusion rules from network traffic data and prevent future potential attacks. The component-based software architecture of this kind of system is designed, COTS components are analyzed, adaptor components to compose COTS products are developed, and the system implementation is illustrated.
granular computing | 2006
Jianchao Han; Mohsen Beheshti
Discovering association rules is an important task of data mining research. Mining traditional association rules is built upon transaction databases. This technique, however, has some limitations. Each transaction merely contains binary items with each item either present or absent in a transaction. Another limitation is that only positive association rules are discovered. Mining fuzzy association rules and discovering negative association rules have been developed to overcome these limitations, respectively. In this paper, we combine these two approaches to propose a novel approach for mining both positive and negative fuzzy association rules. The interestingness measure for both positive and negative fuzzy association rule is proposed, the algorithm for mining these rules is described.
global communications conference | 2014
Basil Alhakami; Bin Tang; Jianchao Han; Mohsen Beheshti
We study overall storage overflow problem in sensor networks, wherein data-collecting base station is not available while more data is generated than available storage spaces in the entire network. Existing research designs a two-stage solution to solve this problem. It first aggregates overflow data to the size that can be accommodated by the available storage capacity in the network, and then offloads the aggregated data into the network to be stored. We refer to this naive two-stage solution as DAO-N. In this paper, we demonstrate that this approach does not necessarily achieve good performance. We propose a more unified method that is based upon data replication techniques, referred to as DAO-R, in order to improve the performance of DAO-N. Specifically, we design two energy-efficient data replication algorithms to integrate data aggregation and data offloading in DAO-N. We show via extensive simulations that DAO-R outperforms DAO-N by around 30% in terms of energy consumption under different network parameters.
international conference on information technology: new generations | 2012
Eugene Chamorro; Jianchao Han; Mohsen Beheshti
People use computers for all kind of activities: online gaming, shopping, entertainment, emails, face book, study, research, etc. At the same time, the risk of infection by malicious programs in these computers is rising. The main issue is that general users dont understand what a virus is and how computers get infected. On the other hand, many vendors produce antivirus software with different features to prevent or remove these viruses from peoples computers. General users dont understand the concept of each feature in these programs, nor is there a tool to advise users about what the features mean and help them select the right software for personal or business needs. The purpose of this paper is to create an advising system to assist general users to study about computer virus and antivirus, understand the various features of antivirus software products, and select right antivirus software to protect their computers.
international conference on information technology: new generations | 2011
Nathan Nikotan; Jianchao Han; Mohsen Beheshti
Multi-agent system can be implemented to exploit parallel processing of project scheduling. Since mathematical approaches cannot describe the complexity of real problems, and have difficulties to adapt the analysis to dynamics changes, therefore Monte Carlo simulation can be used to quantify the effects of risk and uncertainty in both project schedules and budgets. Also, genetic algorithms can be used to provide a prioritization of tasks. Within a multi-agent system, a broker Agent can assign project scheduling tasks to different worker Agents using different project scheduling algorithms.
international symposium on telecommunications | 2008
Mohsen Beheshti; Jianchao Han; Kazimierz Kowalski; Joel Ortiz; Johnly Tomelden; Damian Alvillar
Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns from the network traffic data. Some commercial tools for collecting network traffic data exist, such as SNORT. The traffic data collected from the network using these tools, however, usually doesnpsilat fit the format requirement of the input data for data mining systems. Thus transforming the network traffic data into the required format is mandate for a data mining system to induce network intrusion detection rules. In this paper, collecting the network packet information using SNORT is introduced, storing the collected data into the MySql database is presented, and selecting the significant data in the database and transforming them to the format of input data for a data mining system See5 is discussed. The data collection, selection, and transformation approaches illustrated in this paper have been used in the Information Fusion in Sensor Based Intrusion Detection System that is being under development in our Computer Security Research Laboratory. The system framework is briefly introduced and the preliminary results for data collection from multiple resources are illustrated.