According to the different branches of city’s intersections and the traffic flow at different times, the program of intelligent traffic light controller based on VHDL is given and simulated by Quartus¿ by using hierarchical design thought. The simulation results show that the intelligent traffic light controller can realize the transition of 2-phase, 3-phase and 4-phase based on actual situations. The adaptability and applicability of the system can be strengthened by changing the phase.
{"title":"Design of Intelligent Traffic Light Controller Based on VHDL","authors":"Shuo Shi, H. Tian, Yandong Zhai","doi":"10.1109/WKDD.2009.19","DOIUrl":"https://doi.org/10.1109/WKDD.2009.19","url":null,"abstract":"According to the different branches of city’s intersections and the traffic flow at different times, the program of intelligent traffic light controller based on VHDL is given and simulated by Quartus¿ by using hierarchical design thought. The simulation results show that the intelligent traffic light controller can realize the transition of 2-phase, 3-phase and 4-phase based on actual situations. The adaptability and applicability of the system can be strengthened by changing the phase.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Text clustering is an important task of text mining. The purpose of text clustering is grouping similar text documents together efficiently to meet human interests in information searching and understanding. The procedure of clustering should involve a cognitive process of text understanding or comprehension.This paper introduces an innovative research effort, CogHTC, a hierarchical text clustering algorithm, inspired by cognitive situation models. CogHTC extracts representative features from four elaborately selected cognitive situation dimensions with consideration of the clustering efficiency.The experimental results testified good performance of CogHTC, and revealed that the clustering results of CogHTC are class or domain sensitive, and CogHTC performed better on Cross-Class Clustering than Inner- Class Clustering.
{"title":"A Hierarchical Text Clustering Algorithm with Cognitive Situation Dimensions","authors":"Yi Guo, Zhiqing Shao, Nan Hua","doi":"10.1109/WKDD.2009.17","DOIUrl":"https://doi.org/10.1109/WKDD.2009.17","url":null,"abstract":"Text clustering is an important task of text mining. The purpose of text clustering is grouping similar text documents together efficiently to meet human interests in information searching and understanding. The procedure of clustering should involve a cognitive process of text understanding or comprehension.This paper introduces an innovative research effort, CogHTC, a hierarchical text clustering algorithm, inspired by cognitive situation models. CogHTC extracts representative features from four elaborately selected cognitive situation dimensions with consideration of the clustering efficiency.The experimental results testified good performance of CogHTC, and revealed that the clustering results of CogHTC are class or domain sensitive, and CogHTC performed better on Cross-Class Clustering than Inner- Class Clustering.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114822904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under the circumstance of the complex, changeful and unpredictable network environment, in this article, a method which combines agent technology with grid technology, to deal with information security problem is clarified. Consequently, it provides the inner structure of information security coordination agent, and suggests an agent implementing mode and coordination processes of service grid. At the same time, aiming at the changing client requirement, Web-service-oriented information security resources access mode as well as vector expression and classification algorithm of topic node are put forward.
{"title":"Agent Implementing Mode of Information Security Grid","authors":"H. Ruo, Xie Zan Fu","doi":"10.1109/WKDD.2009.64","DOIUrl":"https://doi.org/10.1109/WKDD.2009.64","url":null,"abstract":"Under the circumstance of the complex, changeful and unpredictable network environment, in this article, a method which combines agent technology with grid technology, to deal with information security problem is clarified. Consequently, it provides the inner structure of information security coordination agent, and suggests an agent implementing mode and coordination processes of service grid. At the same time, aiming at the changing client requirement, Web-service-oriented information security resources access mode as well as vector expression and classification algorithm of topic node are put forward.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the quick development and the combination of modern education technology, multimedia technology and network technology, multimedia network curriculum based on internet will become the major resource of future education. Network curriculum refers to the content of courses and teaching activities of a certain discipline displayed by the network. It not only helps to enhance students' initiatives and ability but also facilitates to realize the individualized teaching and learning by laying emphasis on the importance of learner focused method, to combine the classroom teaching with the extracurricular learning though network, curriculum extends classroom teaching and helps to solve the existing problems in current mode of classroom teaching. Basing on it, technologies of Personality, data mining and adaptive filtering are applied in the paper, while the model of personalized sports teaching network resources system (PSTNRS) is proposed. The resultmanifests that PSTNRS can support sports teaching better.
{"title":"Research on Personalized Sports Teaching Network Resources System","authors":"Luo Qi, Bin Wang","doi":"10.1109/WKDD.2009.237","DOIUrl":"https://doi.org/10.1109/WKDD.2009.237","url":null,"abstract":"With the quick development and the combination of modern education technology, multimedia technology and network technology, multimedia network curriculum based on internet will become the major resource of future education. Network curriculum refers to the content of courses and teaching activities of a certain discipline displayed by the network. It not only helps to enhance students' initiatives and ability but also facilitates to realize the individualized teaching and learning by laying emphasis on the importance of learner focused method, to combine the classroom teaching with the extracurricular learning though network, curriculum extends classroom teaching and helps to solve the existing problems in current mode of classroom teaching. Basing on it, technologies of Personality, data mining and adaptive filtering are applied in the paper, while the model of personalized sports teaching network resources system (PSTNRS) is proposed. The resultmanifests that PSTNRS can support sports teaching better.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115455399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The author investigates the knowledge sharing and collaboration between a manufacturer and a third part logistics provider (3PLP) in the process of manufacturer’s inbound logistics outsourcing. From the perspective of the manufacturer, and following game theory, the analysis was focused on two scenarios, in which considered the influence of both sides prior logistics knowledge creation efforts or not respectively, the equilibrium values of the manufacturer’s participating level in logistics knowledge sharing and developing, the current collaboration efforts of logistics knowledge creation, and the optimal entire system profit were solved, and the relationships among the three system parameters in and cross of two scenarios were analyzed. The result shows that the manufacturer’s participation level in knowledge sharing and developing is a function of the ratio between dyadic marginal profits of the logistics collaboration performance, which is independent to the prior efforts of both sides. And the condition for manufacturer participating collaboration was identified. Then, the influence of prior efforts in logistics knowledge creation from two parts on system parameter was investigated as well.
{"title":"Collaboration in Knowledge Sharing and Developing in Inbound Logistics Outsourcing from Manufacturers Perspective","authors":"Zongwei Tao, Han Min","doi":"10.1109/WKDD.2009.134","DOIUrl":"https://doi.org/10.1109/WKDD.2009.134","url":null,"abstract":"The author investigates the knowledge sharing and collaboration between a manufacturer and a third part logistics provider (3PLP) in the process of manufacturer’s inbound logistics outsourcing. From the perspective of the manufacturer, and following game theory, the analysis was focused on two scenarios, in which considered the influence of both sides prior logistics knowledge creation efforts or not respectively, the equilibrium values of the manufacturer’s participating level in logistics knowledge sharing and developing, the current collaboration efforts of logistics knowledge creation, and the optimal entire system profit were solved, and the relationships among the three system parameters in and cross of two scenarios were analyzed. The result shows that the manufacturer’s participation level in knowledge sharing and developing is a function of the ratio between dyadic marginal profits of the logistics collaboration performance, which is independent to the prior efforts of both sides. And the condition for manufacturer participating collaboration was identified. Then, the influence of prior efforts in logistics knowledge creation from two parts on system parameter was investigated as well.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121681762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To discover process models from event logs has recently aroused many researchers’ interest in the area of process mining. Notwithstanding the interest and related efforts, existing algorithms are far from being satisfactory. For example, some researchers have proved that α-algorithm is capable of discovering the processes of the so-called SWF-nets without short loops; however, α-algorithm has been found to contain some severe limitations. This paper is therefore to introduce the notation of S-Coverable workflow nets, to reach theorems about the characteristics of Sound S-Coverable Workflow Nets, and to develop a new process mining algorithm, namely, algorithm S. On such basis, suggested in the paper is a new approach to dealing with the problem of hidden transition discovering, an approach that, by means of the pretreatment of such hidden tasks, allows algorithm S to discover process models that will help preserve better structures. Theorems thus reached are applicable not only to process mining, but also to process modeling and process model checking.
{"title":"Process Mining: Algorithm for S-Coverable Workflow Nets","authors":"Jianchun She, Dongqing Yang","doi":"10.1109/WKDD.2009.158","DOIUrl":"https://doi.org/10.1109/WKDD.2009.158","url":null,"abstract":"To discover process models from event logs has recently aroused many researchers’ interest in the area of process mining. Notwithstanding the interest and related efforts, existing algorithms are far from being satisfactory. For example, some researchers have proved that α-algorithm is capable of discovering the processes of the so-called SWF-nets without short loops; however, α-algorithm has been found to contain some severe limitations. This paper is therefore to introduce the notation of S-Coverable workflow nets, to reach theorems about the characteristics of Sound S-Coverable Workflow Nets, and to develop a new process mining algorithm, namely, algorithm S. On such basis, suggested in the paper is a new approach to dealing with the problem of hidden transition discovering, an approach that, by means of the pretreatment of such hidden tasks, allows algorithm S to discover process models that will help preserve better structures. Theorems thus reached are applicable not only to process mining, but also to process modeling and process model checking.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121914248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage. The solution combines four aspects into a whole secure system. Meanwhile, hardware equipments and combined symmetric key encryption technique are applied to encrypt the information. Consequently, network data security would be enhanced.
{"title":"Research on Data Protection System in Computer Network","authors":"Ying Li, Guifen Zhao, Tong Liu","doi":"10.1109/WKDD.2009.122","DOIUrl":"https://doi.org/10.1109/WKDD.2009.122","url":null,"abstract":"In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage. The solution combines four aspects into a whole secure system. Meanwhile, hardware equipments and combined symmetric key encryption technique are applied to encrypt the information. Consequently, network data security would be enhanced.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126201793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The discrimination of parameter probability distribution type is the key to structure reliability analysis. A support vector machine (SVM) intelligent recognition model of probability distribution law is presented aiming at traditional method disadvantage. The intelligent recognition model of probability distribution is constructed by SVM algorithm realization, network design and feature extraction, inward stress probability distribution type of a stem structural member is recognized by the model, recognition result is Weibull distribution, SVM has a good generalization ability and clustering ability by comparison between network recognition result and regression analysis, the experiment result shows total recognition rate achieved 98.25%, it provides a good new method for structure reliability analysis.
{"title":"Study on Parameter Distribution in Structure Reliability Analysis: Machine Learning Algorithm and Application","authors":"Y. Wan, Yangu Zhang","doi":"10.1109/WKDD.2009.169","DOIUrl":"https://doi.org/10.1109/WKDD.2009.169","url":null,"abstract":"The discrimination of parameter probability distribution type is the key to structure reliability analysis. A support vector machine (SVM) intelligent recognition model of probability distribution law is presented aiming at traditional method disadvantage. The intelligent recognition model of probability distribution is constructed by SVM algorithm realization, network design and feature extraction, inward stress probability distribution type of a stem structural member is recognized by the model, recognition result is Weibull distribution, SVM has a good generalization ability and clustering ability by comparison between network recognition result and regression analysis, the experiment result shows total recognition rate achieved 98.25%, it provides a good new method for structure reliability analysis.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the accuracy of vehicle detection, and to solve the gradually changing brightness of light in the background and the movement of the objects in the background, this paper presents an algorithm that fast adapts to the background generation and updating. Focus on the objects with similar gray background, and moving object missing caused easily by segmentation, the threshold segmentation and edge sharpening--the combination of methods is used here, to strengthen the edge of moving objects. The experimental result shows that: the algorithm can adapt to changes in the background, compensate the missing moving objects after segmentation, which has high robustness and excellent real-time performance.
{"title":"Vehicle Detection Based on Adaptive Background","authors":"Baoxia Cui, Shang Sun, Yong Duan","doi":"10.1109/WKDD.2009.117","DOIUrl":"https://doi.org/10.1109/WKDD.2009.117","url":null,"abstract":"In order to improve the accuracy of vehicle detection, and to solve the gradually changing brightness of light in the background and the movement of the objects in the background, this paper presents an algorithm that fast adapts to the background generation and updating. Focus on the objects with similar gray background, and moving object missing caused easily by segmentation, the threshold segmentation and edge sharpening--the combination of methods is used here, to strengthen the edge of moving objects. The experimental result shows that: the algorithm can adapt to changes in the background, compensate the missing moving objects after segmentation, which has high robustness and excellent real-time performance.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126217985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses the concepts of data warehouse technology and its importance for decision support system (DSS). The DSS as one kind smart software system of the important application value, provides, each kind of decision information as well as the commercial question solution for the enterprise. Thus Data warehouse can meet the requirements of the database management subsystems of DSS, and is fitted to form its technology frame. Then we put forth the structure of data warehouse and its main functional components. Along with widespread application of the data warehouse, DSS based on data warehouse arises at the historic moment. Begin with actual demand of the DSS, characteristic and the structure of the data warehouse have been analyzed. DSS based on the data warehouse technology is elaborated, and finally give the application example.
{"title":"Research of Decision Support System Based on Data Warehouse Techniques","authors":"Q. Han, Xiaoyan Gao","doi":"10.1109/WKDD.2009.96","DOIUrl":"https://doi.org/10.1109/WKDD.2009.96","url":null,"abstract":"This paper discusses the concepts of data warehouse technology and its importance for decision support system (DSS). The DSS as one kind smart software system of the important application value, provides, each kind of decision information as well as the commercial question solution for the enterprise. Thus Data warehouse can meet the requirements of the database management subsystems of DSS, and is fitted to form its technology frame. Then we put forth the structure of data warehouse and its main functional components. Along with widespread application of the data warehouse, DSS based on data warehouse arises at the historic moment. Begin with actual demand of the DSS, characteristic and the structure of the data warehouse have been analyzed. DSS based on the data warehouse technology is elaborated, and finally give the application example.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}