Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646233
Haitao Ma, Yuhui Zhao
An Active XML(AXML for short) is an XML document where some of the data is given explicitly while other parts are defined only intentionally by means of embedded calls to Web services. Tree automata are extended from traditional string automata and accept regular tree languages. In this paper, the connection between tree automata and AXML was surveyed. Specially, the methods of how to build the corresponding AXML document tree automata(AXTA) and AXML schema tree automata(ASTA) were presented, given an AXML document and an AXML schema specification respectively. Based on AXTA and ASTA, the relative problems about AXML such as document rewriting and schema rewriting are can be resolved efficiently.
{"title":"Tree automata and active XML","authors":"Haitao Ma, Yuhui Zhao","doi":"10.1109/KAM.2010.5646233","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646233","url":null,"abstract":"An Active XML(AXML for short) is an XML document where some of the data is given explicitly while other parts are defined only intentionally by means of embedded calls to Web services. Tree automata are extended from traditional string automata and accept regular tree languages. In this paper, the connection between tree automata and AXML was surveyed. Specially, the methods of how to build the corresponding AXML document tree automata(AXTA) and AXML schema tree automata(ASTA) were presented, given an AXML document and an AXML schema specification respectively. Based on AXTA and ASTA, the relative problems about AXML such as document rewriting and schema rewriting are can be resolved efficiently.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646166
Kieran R. C. Greer
This paper introduces a new hyper-heuristic framework for automatically searching and changing potential solutions to a particular problem. The solutions and the problem datasets are placed into a grid and then a game is played to try and optimise the total cost over the whole grid, using a randomising process. The randomisation could be compared to a simulated annealing approach, where the aim is to improve the solution space as a whole, possibly at the expense of certain better solutions. It is hoped that this will give the solution search an appropriate level of robustness to allow it to avoid local optima.
{"title":"A stochastic hyper-heuristic for optimising through comparisons","authors":"Kieran R. C. Greer","doi":"10.1109/KAM.2010.5646166","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646166","url":null,"abstract":"This paper introduces a new hyper-heuristic framework for automatically searching and changing potential solutions to a particular problem. The solutions and the problem datasets are placed into a grid and then a game is played to try and optimise the total cost over the whole grid, using a randomising process. The randomisation could be compared to a simulated annealing approach, where the aim is to improve the solution space as a whole, possibly at the expense of certain better solutions. It is hoped that this will give the solution search an appropriate level of robustness to allow it to avoid local optima.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646260
Chengling Zhao, Xirui Xia, Ximei Zhu
Teachers' continuing education is an important part of the teacher education development. It is helpful to improve the teachers' quality and promote education reform. There are many problems in current teachers' continuing education training, for example, limited scope, target lack of training and failing to sustain the training quality. This paper introduces the existing problems, learning characteristics and needs of the present teacher education. It analyzes the feasibility of micro mobile learning in teachers' continuing education based on clear concepts of micro content, micro learning and micro mobile learning, and presents the structure charts for independent learning, inquiry learning and collaborative learning which will be carried out in the teachers' continuing education from learners' perspective.
{"title":"Application research of micro mobile learning in teachers' continuing education","authors":"Chengling Zhao, Xirui Xia, Ximei Zhu","doi":"10.1109/KAM.2010.5646260","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646260","url":null,"abstract":"Teachers' continuing education is an important part of the teacher education development. It is helpful to improve the teachers' quality and promote education reform. There are many problems in current teachers' continuing education training, for example, limited scope, target lack of training and failing to sustain the training quality. This paper introduces the existing problems, learning characteristics and needs of the present teacher education. It analyzes the feasibility of micro mobile learning in teachers' continuing education based on clear concepts of micro content, micro learning and micro mobile learning, and presents the structure charts for independent learning, inquiry learning and collaborative learning which will be carried out in the teachers' continuing education from learners' perspective.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115360973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646218
Hao-feng Zhang, Ximei Zhu, Xirui Xia
As more and more technical equipments become an important part of our social and everyday life, micro learning will be a practical mode to achieve informal learning. This paper introduces the concept of micro learning, and then represents its connotations and characteristics. Through analyzing the application of the Integrated Micro Learning mode based on computers and mobile phones ??we conclude its feasibility and practicality. It not only creates a new learning space for informal learning, but provides an effective way for lifelong learning.
{"title":"Research on the application of integrated micro learning","authors":"Hao-feng Zhang, Ximei Zhu, Xirui Xia","doi":"10.1109/KAM.2010.5646218","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646218","url":null,"abstract":"As more and more technical equipments become an important part of our social and everyday life, micro learning will be a practical mode to achieve informal learning. This paper introduces the concept of micro learning, and then represents its connotations and characteristics. Through analyzing the application of the Integrated Micro Learning mode based on computers and mobile phones ??we conclude its feasibility and practicality. It not only creates a new learning space for informal learning, but provides an effective way for lifelong learning.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115498588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646209
Qinhua Huang, Weimin Ouyang
We checked the problem in LSB matching revisited algorithm, which is an efficient method in steganography. Some sorts of regions in images are not appropriate for applying LSB embedding. We propose a method to make regions selection on images to find suitable area. By counting on each pixel we can decide if it should be protected. The experiment results showed our method can impove the visual imperceptibility and undetectability of the LSB matching method.
{"title":"Protect fragile regions in steganography LSB embedding","authors":"Qinhua Huang, Weimin Ouyang","doi":"10.1109/KAM.2010.5646209","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646209","url":null,"abstract":"We checked the problem in LSB matching revisited algorithm, which is an efficient method in steganography. Some sorts of regions in images are not appropriate for applying LSB embedding. We propose a method to make regions selection on images to find suitable area. By counting on each pixel we can decide if it should be protected. The experiment results showed our method can impove the visual imperceptibility and undetectability of the LSB matching method.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646206
Ming-Hong Chen, Guo-ping Zhang
Tacit knowledge forms foundation and source of core-competitiveness and can play more significant role on technology innovation of firms. Firms need to develop tacit knowledge to gain competitive advantage. However, merely possession of knowledge does not guarantee an edge in competition. Quantity of tacit knowledge holders is smaller in intra-organization. To increase the quantity of tacit knowledge holders, tacit knowledge must be transferred in intra-organization. In this paper, we put forward categorizations of tacit knowledge and various transference model of tacit knowledge, and analyze relation of between disseminative capacity of knowledge senders and absorptive capacity of knowledge recipients in intra-organization. Theoretical analysis and simulation results convince us that pull-model applied to tacit knowledge flows to transfer, star-model and tree-model applied to socialization and externalization of tacit knowledge‥
{"title":"Tacit knowledge acquisition and sharing in intra-organization","authors":"Ming-Hong Chen, Guo-ping Zhang","doi":"10.1109/KAM.2010.5646206","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646206","url":null,"abstract":"Tacit knowledge forms foundation and source of core-competitiveness and can play more significant role on technology innovation of firms. Firms need to develop tacit knowledge to gain competitive advantage. However, merely possession of knowledge does not guarantee an edge in competition. Quantity of tacit knowledge holders is smaller in intra-organization. To increase the quantity of tacit knowledge holders, tacit knowledge must be transferred in intra-organization. In this paper, we put forward categorizations of tacit knowledge and various transference model of tacit knowledge, and analyze relation of between disseminative capacity of knowledge senders and absorptive capacity of knowledge recipients in intra-organization. Theoretical analysis and simulation results convince us that pull-model applied to tacit knowledge flows to transfer, star-model and tree-model applied to socialization and externalization of tacit knowledge‥","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646162
Lin Mei
This paper made an in-depth research on information resources and personalized service and research status of system implementation techniques, combined with the practical work of graduate design, the use of Ajax, database, network communication and ASP.NET and other technologies on information resources and personalized service system's overall architecture was design. The system uses a hierarchical distributed development model and AjaxWS asynchronous processing technology to solve client data transfer is slow and difficult site system compatibility issues. Meanwhile, this research completed a personalized recommendation, personalized information, the system design of three models, management and implementation, and address of the database consistency and user logon authentication and other system security issues. At present the prototype has been completed. System test is in good condition, indicating that overall system design is reasonable and measures to solve problems are feasible.
{"title":"Design of information resource of personalized services based on AjaxWS","authors":"Lin Mei","doi":"10.1109/KAM.2010.5646162","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646162","url":null,"abstract":"This paper made an in-depth research on information resources and personalized service and research status of system implementation techniques, combined with the practical work of graduate design, the use of Ajax, database, network communication and ASP.NET and other technologies on information resources and personalized service system's overall architecture was design. The system uses a hierarchical distributed development model and AjaxWS asynchronous processing technology to solve client data transfer is slow and difficult site system compatibility issues. Meanwhile, this research completed a personalized recommendation, personalized information, the system design of three models, management and implementation, and address of the database consistency and user logon authentication and other system security issues. At present the prototype has been completed. System test is in good condition, indicating that overall system design is reasonable and measures to solve problems are feasible.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"39 1-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646326
Xiaohong Zhang, Y. Lu, Xiaoyan Mao
As a generalization of positive implicative BCK/BCI-algebras, the notions of 1-type positive implicative pseudo-BCK/BCI algebras are introduced, and some properties are investigated. By introducing the notions of 1-type positive implicative pseudo-BCK/BCI filter, 1-type positive implicative pseudo-BCK/BCI algebras are characterized.
{"title":"On 1-type positive implicative pseudo-BCK/BCI algebras","authors":"Xiaohong Zhang, Y. Lu, Xiaoyan Mao","doi":"10.1109/KAM.2010.5646326","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646326","url":null,"abstract":"As a generalization of positive implicative BCK/BCI-algebras, the notions of 1-type positive implicative pseudo-BCK/BCI algebras are introduced, and some properties are investigated. By introducing the notions of 1-type positive implicative pseudo-BCK/BCI filter, 1-type positive implicative pseudo-BCK/BCI algebras are characterized.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646224
Guo-chang Li
Intelligentized distributed system is advanced mode of network operation in agile manufacturing system. In intelligent agile manufacturing, Architecture of knowledge base directly influences intelligent level of manufacture. Application knowledge and reorganization are two sides of implement intelligent application. When application knowledge don't meet needs of application, starting reorganization knowledge base architecture will get new application knowledge. This is second level knowledge base(shallow knowledge and depth knowledge) architecture. Research of knowledge base in agile manufacturing will provide implemented knowledge architecture for intelligent agile manufacturing system and enable whole system high knowledge.
{"title":"Research on intelligentized agile manufacturing system in distributed knowledge base architecture","authors":"Guo-chang Li","doi":"10.1109/KAM.2010.5646224","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646224","url":null,"abstract":"Intelligentized distributed system is advanced mode of network operation in agile manufacturing system. In intelligent agile manufacturing, Architecture of knowledge base directly influences intelligent level of manufacture. Application knowledge and reorganization are two sides of implement intelligent application. When application knowledge don't meet needs of application, starting reorganization knowledge base architecture will get new application knowledge. This is second level knowledge base(shallow knowledge and depth knowledge) architecture. Research of knowledge base in agile manufacturing will provide implemented knowledge architecture for intelligent agile manufacturing system and enable whole system high knowledge.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646199
Qinghui Zhou, A. Zhu, B. Chen
Control arithmetic is the key part of monitoring system because it is difficult to formulate exact mathematical model due to nonlinear and time-varying characteristic of construction machinery. In order to improve the running efficiency, a fuzzy PID controller is designed and realized in the monitoring system based on ARM. Besides, three encapsulation functions are designed to carry out data transfer between ARM and Matlab by UART series communication. And then, the fuzzy PID can be simulated and displayed by Matlab to evaluate the control effect. In the end, the experiment is made to validate the control arithmetic. The compared results show that the fuzzy PID controller is better than conventional PID used in monitoring system for construction machinery.
{"title":"A fuzzy PID controller of monitoring system for construction machinery based on ARM","authors":"Qinghui Zhou, A. Zhu, B. Chen","doi":"10.1109/KAM.2010.5646199","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646199","url":null,"abstract":"Control arithmetic is the key part of monitoring system because it is difficult to formulate exact mathematical model due to nonlinear and time-varying characteristic of construction machinery. In order to improve the running efficiency, a fuzzy PID controller is designed and realized in the monitoring system based on ARM. Besides, three encapsulation functions are designed to carry out data transfer between ARM and Matlab by UART series communication. And then, the fuzzy PID can be simulated and displayed by Matlab to evaluate the control effect. In the end, the experiment is made to validate the control arithmetic. The compared results show that the fuzzy PID controller is better than conventional PID used in monitoring system for construction machinery.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124387949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}