Since the inception of the Internet in the mid-1990s, e-commerce has grown at a very rapid rate. Firms had realized that they could be pushed to the world stage of the knowledge-based economic by e-commerce. So, most of firms are stepping up to the adoption of those technologies for upgrading their businesses. Regarding the significant role of customers, the study of their behaviors influence on the adoption of e-commerce by the firms becomes a main stream in scholastic path. This paper aims to study the four customer behaviors which influence the adoption of e-commerce technologies by firms. The study results showed that the customer behaviors influence the adoption of e-commerce by firms.
{"title":"Research on the Adoption of Electronic Commerce Based on Customer's Behavior","authors":"Yuantao Jiang, Yuqin Sun","doi":"10.1109/WKDD.2009.129","DOIUrl":"https://doi.org/10.1109/WKDD.2009.129","url":null,"abstract":"Since the inception of the Internet in the mid-1990s, e-commerce has grown at a very rapid rate. Firms had realized that they could be pushed to the world stage of the knowledge-based economic by e-commerce. So, most of firms are stepping up to the adoption of those technologies for upgrading their businesses. Regarding the significant role of customers, the study of their behaviors influence on the adoption of e-commerce by the firms becomes a main stream in scholastic path. This paper aims to study the four customer behaviors which influence the adoption of e-commerce technologies by firms. The study results showed that the customer behaviors influence the adoption of e-commerce by firms.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124418743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The type of the workload is one of the key factors on database management system (DBMS) tuning. Different types of workload (OLTP, Online Transaction Processing and OLAP, Online Analytical Processing) mean different resource allocation strategies. In this paper, we present an approach to automatically identify a DBMS workload as either OLTP or OLAP. We use C5.0 algorithm to construct a set of classifiers based on the characteristics that differentiate OLTP and OLAP and then use the classifier to identify the workload type. The experiments show that the classifiers can be able to accurately identify the OLTP and OLAP workloads.
{"title":"Auto-recognizing DBMS Workload Based on C5.0 Algorithm","authors":"Zhixian Niu, L. Zong, Q. Yan, Zhenxing Zhao","doi":"10.1109/WKDD.2009.185","DOIUrl":"https://doi.org/10.1109/WKDD.2009.185","url":null,"abstract":"The type of the workload is one of the key factors on database management system (DBMS) tuning. Different types of workload (OLTP, Online Transaction Processing and OLAP, Online Analytical Processing) mean different resource allocation strategies. In this paper, we present an approach to automatically identify a DBMS workload as either OLTP or OLAP. We use C5.0 algorithm to construct a set of classifiers based on the characteristics that differentiate OLTP and OLAP and then use the classifier to identify the workload type. The experiments show that the classifiers can be able to accurately identify the OLTP and OLAP workloads.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
a novel model was proposed for short-term electricity price forecasting based on Rough set approach and improved Support Vector Machines¿SVM¿. Firstly, we can get reduced information table with no information loss by Rough set approach. And then, this reduced information is used to develop classification rules and train SVM, at the same time, we make use of the Particle Swarm Optimization to optimize the parameters. The effectiveness of our methodology was verified by experiments comparing BP neural networks with our approach.
{"title":"Short-Term Electricity Price Forecasting Based on Rough Sets and Improved SVM","authors":"Jinyu Tian, Yan Lin","doi":"10.1109/WKDD.2009.93","DOIUrl":"https://doi.org/10.1109/WKDD.2009.93","url":null,"abstract":"a novel model was proposed for short-term electricity price forecasting based on Rough set approach and improved Support Vector Machines¿SVM¿. Firstly, we can get reduced information table with no information loss by Rough set approach. And then, this reduced information is used to develop classification rules and train SVM, at the same time, we make use of the Particle Swarm Optimization to optimize the parameters. The effectiveness of our methodology was verified by experiments comparing BP neural networks with our approach.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134084155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to assure the quality of welding-assembly, A great deal body welding jigs are used during the all process of automobile body production. The structure of body welding jig have resemblance. It provides the technological support and achieved probability to develop the standardized design. The intelligent CAD technology based on knowledge, based on summing up design experience and field knowledge, can build a reused knowledge database and design planning model by abstracting, describing and maintaining, to offer some index method. By analyzing and describing function and structure character of the body welding jig, This paper builds knowledge base of typical body welding jig and introduces knowledge project into conventional CAD system, which will effectively support fast realization of intelligent CAD of body welding jig.
{"title":"Study on the Intelligent CAD Technology of Body Welding Jig Based on the Knowledge","authors":"Xiaoping Xiong, Quandong Jin, Pingping Jiang","doi":"10.1109/WKDD.2009.155","DOIUrl":"https://doi.org/10.1109/WKDD.2009.155","url":null,"abstract":"In order to assure the quality of welding-assembly, A great deal body welding jigs are used during the all process of automobile body production. The structure of body welding jig have resemblance. It provides the technological support and achieved probability to develop the standardized design. The intelligent CAD technology based on knowledge, based on summing up design experience and field knowledge, can build a reused knowledge database and design planning model by abstracting, describing and maintaining, to offer some index method. By analyzing and describing function and structure character of the body welding jig, This paper builds knowledge base of typical body welding jig and introduces knowledge project into conventional CAD system, which will effectively support fast realization of intelligent CAD of body welding jig.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the quick development and the combination of modern education technology, multimedia technology and network technology, multimedia network curriculum based on internet will become the major resource of future education. Network curriculum refers to the content of courses and teaching activities of a certain discipline displayed by the network. It not only helps to enhance students' initiatives and ability but also facilitates to realize the individualized teaching and learning by laying emphasis on the importance of learner focused method, to combine the classroom teaching with the extracurricular learning though network, curriculum extends classroom teaching and helps to solve the existing problems in current mode of classroom teaching. Basing on it, technologies of Personality, data mining and adaptive filtering are applied in the paper, while the model of personalized sports teaching network resources system (PSTNRS) is proposed. The resultmanifests that PSTNRS can support sports teaching better.
{"title":"Research on Personalized Sports Teaching Network Resources System","authors":"Luo Qi, Bin Wang","doi":"10.1109/WKDD.2009.237","DOIUrl":"https://doi.org/10.1109/WKDD.2009.237","url":null,"abstract":"With the quick development and the combination of modern education technology, multimedia technology and network technology, multimedia network curriculum based on internet will become the major resource of future education. Network curriculum refers to the content of courses and teaching activities of a certain discipline displayed by the network. It not only helps to enhance students' initiatives and ability but also facilitates to realize the individualized teaching and learning by laying emphasis on the importance of learner focused method, to combine the classroom teaching with the extracurricular learning though network, curriculum extends classroom teaching and helps to solve the existing problems in current mode of classroom teaching. Basing on it, technologies of Personality, data mining and adaptive filtering are applied in the paper, while the model of personalized sports teaching network resources system (PSTNRS) is proposed. The resultmanifests that PSTNRS can support sports teaching better.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115455399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Text clustering is an important task of text mining. The purpose of text clustering is grouping similar text documents together efficiently to meet human interests in information searching and understanding. The procedure of clustering should involve a cognitive process of text understanding or comprehension.This paper introduces an innovative research effort, CogHTC, a hierarchical text clustering algorithm, inspired by cognitive situation models. CogHTC extracts representative features from four elaborately selected cognitive situation dimensions with consideration of the clustering efficiency.The experimental results testified good performance of CogHTC, and revealed that the clustering results of CogHTC are class or domain sensitive, and CogHTC performed better on Cross-Class Clustering than Inner- Class Clustering.
{"title":"A Hierarchical Text Clustering Algorithm with Cognitive Situation Dimensions","authors":"Yi Guo, Zhiqing Shao, Nan Hua","doi":"10.1109/WKDD.2009.17","DOIUrl":"https://doi.org/10.1109/WKDD.2009.17","url":null,"abstract":"Text clustering is an important task of text mining. The purpose of text clustering is grouping similar text documents together efficiently to meet human interests in information searching and understanding. The procedure of clustering should involve a cognitive process of text understanding or comprehension.This paper introduces an innovative research effort, CogHTC, a hierarchical text clustering algorithm, inspired by cognitive situation models. CogHTC extracts representative features from four elaborately selected cognitive situation dimensions with consideration of the clustering efficiency.The experimental results testified good performance of CogHTC, and revealed that the clustering results of CogHTC are class or domain sensitive, and CogHTC performed better on Cross-Class Clustering than Inner- Class Clustering.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114822904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For different kinds of scale networks, the different weight ciphers should be designed for adapting various operation environments. In wireless networks or RFID environment, the lightweight ciphers or ultra-lightweight ciphers have been paid more and more attention. At Internet environment, there exist some block cipher algorithms used in top layer but not published block ciphers announce to only design for the other layers. The standardized security protocols of block cipher are oriented to the public level which is seldom considered based on different secure situation in openness Internet environment. And in trusted platform, some modules still need heavy ciphers. So this paper’s approach is that it needs precise cryptographic system according to different networks and different functions. The scalable and flexible block cipher application is another approach to currently secure standard and the lightweight block cipher design should be paid more attention. In order to expending networks member number easily, some intelligent functions are combined in the design.
{"title":"A Comment to the Intelligent Functions of Different Weight Ciphers","authors":"Lan Luo, Zhiguang Qin, Shijie Zhou","doi":"10.1109/WKDD.2009.18","DOIUrl":"https://doi.org/10.1109/WKDD.2009.18","url":null,"abstract":"For different kinds of scale networks, the different weight ciphers should be designed for adapting various operation environments. In wireless networks or RFID environment, the lightweight ciphers or ultra-lightweight ciphers have been paid more and more attention. At Internet environment, there exist some block cipher algorithms used in top layer but not published block ciphers announce to only design for the other layers. The standardized security protocols of block cipher are oriented to the public level which is seldom considered based on different secure situation in openness Internet environment. And in trusted platform, some modules still need heavy ciphers. So this paper’s approach is that it needs precise cryptographic system according to different networks and different functions. The scalable and flexible block cipher application is another approach to currently secure standard and the lightweight block cipher design should be paid more attention. In order to expending networks member number easily, some intelligent functions are combined in the design.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116840279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under the circumstance of the complex, changeful and unpredictable network environment, in this article, a method which combines agent technology with grid technology, to deal with information security problem is clarified. Consequently, it provides the inner structure of information security coordination agent, and suggests an agent implementing mode and coordination processes of service grid. At the same time, aiming at the changing client requirement, Web-service-oriented information security resources access mode as well as vector expression and classification algorithm of topic node are put forward.
{"title":"Agent Implementing Mode of Information Security Grid","authors":"H. Ruo, Xie Zan Fu","doi":"10.1109/WKDD.2009.64","DOIUrl":"https://doi.org/10.1109/WKDD.2009.64","url":null,"abstract":"Under the circumstance of the complex, changeful and unpredictable network environment, in this article, a method which combines agent technology with grid technology, to deal with information security problem is clarified. Consequently, it provides the inner structure of information security coordination agent, and suggests an agent implementing mode and coordination processes of service grid. At the same time, aiming at the changing client requirement, Web-service-oriented information security resources access mode as well as vector expression and classification algorithm of topic node are put forward.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The premise of the enterprise that implements the product family architecture is the analysis to the sailed products history data, carrying on accuracy demarcation of the customer sets and products sets. But, the traditional cluster methods consist in simultaneous one partitioning of the set of products or the set of customers. In this paper we review the most widely used and successful biclustering techniques and use bicluster consist in simultaneous partitioning of the set of products and the set of customers. The bicluster algorithm is discussed. The results of the improved bicluster algorithm used in the product family architecture analysis show that, compared with traditional cluster methods, the quality of clustering results is enhanced obviously, the mining expression models are better, and the data possess a strong consistency with fluctuation on the condition.
{"title":"Bicluster Algorithm and Used in Market Analysis","authors":"Shuyong Liu, Yan Chen, Mingyuan Yang, Rui Ding","doi":"10.1109/WKDD.2009.224","DOIUrl":"https://doi.org/10.1109/WKDD.2009.224","url":null,"abstract":"The premise of the enterprise that implements the product family architecture is the analysis to the sailed products history data, carrying on accuracy demarcation of the customer sets and products sets. But, the traditional cluster methods consist in simultaneous one partitioning of the set of products or the set of customers. In this paper we review the most widely used and successful biclustering techniques and use bicluster consist in simultaneous partitioning of the set of products and the set of customers. The bicluster algorithm is discussed. The results of the improved bicluster algorithm used in the product family architecture analysis show that, compared with traditional cluster methods, the quality of clustering results is enhanced obviously, the mining expression models are better, and the data possess a strong consistency with fluctuation on the condition.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The author investigates the knowledge sharing and collaboration between a manufacturer and a third part logistics provider (3PLP) in the process of manufacturer’s inbound logistics outsourcing. From the perspective of the manufacturer, and following game theory, the analysis was focused on two scenarios, in which considered the influence of both sides prior logistics knowledge creation efforts or not respectively, the equilibrium values of the manufacturer’s participating level in logistics knowledge sharing and developing, the current collaboration efforts of logistics knowledge creation, and the optimal entire system profit were solved, and the relationships among the three system parameters in and cross of two scenarios were analyzed. The result shows that the manufacturer’s participation level in knowledge sharing and developing is a function of the ratio between dyadic marginal profits of the logistics collaboration performance, which is independent to the prior efforts of both sides. And the condition for manufacturer participating collaboration was identified. Then, the influence of prior efforts in logistics knowledge creation from two parts on system parameter was investigated as well.
{"title":"Collaboration in Knowledge Sharing and Developing in Inbound Logistics Outsourcing from Manufacturers Perspective","authors":"Zongwei Tao, Han Min","doi":"10.1109/WKDD.2009.134","DOIUrl":"https://doi.org/10.1109/WKDD.2009.134","url":null,"abstract":"The author investigates the knowledge sharing and collaboration between a manufacturer and a third part logistics provider (3PLP) in the process of manufacturer’s inbound logistics outsourcing. From the perspective of the manufacturer, and following game theory, the analysis was focused on two scenarios, in which considered the influence of both sides prior logistics knowledge creation efforts or not respectively, the equilibrium values of the manufacturer’s participating level in logistics knowledge sharing and developing, the current collaboration efforts of logistics knowledge creation, and the optimal entire system profit were solved, and the relationships among the three system parameters in and cross of two scenarios were analyzed. The result shows that the manufacturer’s participation level in knowledge sharing and developing is a function of the ratio between dyadic marginal profits of the logistics collaboration performance, which is independent to the prior efforts of both sides. And the condition for manufacturer participating collaboration was identified. Then, the influence of prior efforts in logistics knowledge creation from two parts on system parameter was investigated as well.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121681762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}