Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646236
Zhongzhi Pan, Wei Liu
Innovation strategies of firms in industrial clusters will change at different stages of the lifecycle of industrial cluster. Innovation ability and organizational forms of firms in cluster also evolve with the development of industrial clusters. Government policies and regulations contribute to cluster growth and technical innovation. But the role of government in cluster development also differs at different stages of cluster lifecycle.
{"title":"Innovation strategies of firms in industrial clusters and role of government in knowledge service","authors":"Zhongzhi Pan, Wei Liu","doi":"10.1109/KAM.2010.5646236","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646236","url":null,"abstract":"Innovation strategies of firms in industrial clusters will change at different stages of the lifecycle of industrial cluster. Innovation ability and organizational forms of firms in cluster also evolve with the development of industrial clusters. Government policies and regulations contribute to cluster growth and technical innovation. But the role of government in cluster development also differs at different stages of cluster lifecycle.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131448422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646147
Surong Dong, H. Zhou
In ground explosion test, due to the high temperature and pressure as well as the high shock wave current, it is required to be assisted by multiple robots to collect the data and survey the dangerous environment. A method making use of robot sensors to survey the test ground environment data and tracking propagation of shock wave through mobile robots is presented. Besides, an approach of multiple sensors data association is used to track diffraction propagation of shock waves at multi-explosive points. Due to the explosion shake, the measurement devices are easy to have faults, influencing the accuracy of measurement, therefore, to make use of robots implement the fault diagnosis is another important task. An explosion tunnel measurement system is taken as an example, by setting up a fault tree to assist the fault diagnosis. In addition, the process of knowledge base building is illustrated in the example.
{"title":"Multiple robots data association with fault diagnosis in explosion test","authors":"Surong Dong, H. Zhou","doi":"10.1109/KAM.2010.5646147","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646147","url":null,"abstract":"In ground explosion test, due to the high temperature and pressure as well as the high shock wave current, it is required to be assisted by multiple robots to collect the data and survey the dangerous environment. A method making use of robot sensors to survey the test ground environment data and tracking propagation of shock wave through mobile robots is presented. Besides, an approach of multiple sensors data association is used to track diffraction propagation of shock waves at multi-explosive points. Due to the explosion shake, the measurement devices are easy to have faults, influencing the accuracy of measurement, therefore, to make use of robots implement the fault diagnosis is another important task. An explosion tunnel measurement system is taken as an example, by setting up a fault tree to assist the fault diagnosis. In addition, the process of knowledge base building is illustrated in the example.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"16 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133435842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646155
Chengling Zhao, W. Zhou, Yanqin Wu
With the development of information technology and network information resources. The integration, exchange and retrieval of web-resource has become a problem that all the web-resources service system must be resolved. While the topic-map offers a solution to the integration of a large number of web-resources. This paper introduces the topic-map that is mainly used for describing knowledge structures and techniques associated with the theoretical basis of the topic maps. It analyzes the advantages of topic-map used in integration of web-resources and constructed a topic-map based model about web-resources service system.
{"title":"Personalized integration of web-resources based on topic-maps","authors":"Chengling Zhao, W. Zhou, Yanqin Wu","doi":"10.1109/KAM.2010.5646155","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646155","url":null,"abstract":"With the development of information technology and network information resources. The integration, exchange and retrieval of web-resource has become a problem that all the web-resources service system must be resolved. While the topic-map offers a solution to the integration of a large number of web-resources. This paper introduces the topic-map that is mainly used for describing knowledge structures and techniques associated with the theoretical basis of the topic maps. It analyzes the advantages of topic-map used in integration of web-resources and constructed a topic-map based model about web-resources service system.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"32 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646232
Jihong Qu, Yuepeng Li, Juan Zhou
Groundwater table often shows complex nonlinear characteristic. Back Propagation (BP) neural network is increasingly used to predict groundwater table. However man-made selecting the structure of BP neural network has blindness and expends much time, so differential evolution (DE) algorithm was adopted to automatically search BP neural network weight matrix and threshold matrix. In order to improve the convergence of DE algorithm, a chaotic sequence based on logistic map was introduced to self-adaptively adjust mutation factor. Furthermore, a self-adapting crossover probability factor was presented to improve the population's diversity and the ability of escaping from the local optimum. Study case shows that, compared with groundwater level prediction model based on traditional BP neural network, the new prediction model based on DE and BP neural network can greatly improve the convergence speed and prediction precision.
{"title":"Improved differential evolution based BP neural network for prediction of groundwater table","authors":"Jihong Qu, Yuepeng Li, Juan Zhou","doi":"10.1109/KAM.2010.5646232","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646232","url":null,"abstract":"Groundwater table often shows complex nonlinear characteristic. Back Propagation (BP) neural network is increasingly used to predict groundwater table. However man-made selecting the structure of BP neural network has blindness and expends much time, so differential evolution (DE) algorithm was adopted to automatically search BP neural network weight matrix and threshold matrix. In order to improve the convergence of DE algorithm, a chaotic sequence based on logistic map was introduced to self-adaptively adjust mutation factor. Furthermore, a self-adapting crossover probability factor was presented to improve the population's diversity and the ability of escaping from the local optimum. Study case shows that, compared with groundwater level prediction model based on traditional BP neural network, the new prediction model based on DE and BP neural network can greatly improve the convergence speed and prediction precision.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646314
Feng Zheng, Z. Cui
Network Environment keeps stable usually, but under some extreme cases, the network environment changes regularly. The campus network located at classrooms is a typical case. The right of classroom internet access has been changed according to curriculum schedule. Thus, the network managers have to re-configure the network devices frequently for permitting or forbidding student computers access internet. In this paper, the protocol of telnet was discussed and an idea of network devices automatic configuration based on Telnet, script language and database was prompted. The experiment program of the configuration management of network devices system based on Rujie switches was introduced in detail.
{"title":"The new way of configuration management of network devices under mutable environment","authors":"Feng Zheng, Z. Cui","doi":"10.1109/KAM.2010.5646314","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646314","url":null,"abstract":"Network Environment keeps stable usually, but under some extreme cases, the network environment changes regularly. The campus network located at classrooms is a typical case. The right of classroom internet access has been changed according to curriculum schedule. Thus, the network managers have to re-configure the network devices frequently for permitting or forbidding student computers access internet. In this paper, the protocol of telnet was discussed and an idea of network devices automatic configuration based on Telnet, script language and database was prompted. The experiment program of the configuration management of network devices system based on Rujie switches was introduced in detail.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114738971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646263
Zhibing Wang, Changyun Li, Junfeng Man
With the development of the Internet, electronic commerce has shown a rapid increase, in the open dynamic Internet how to establish a complete model for trust valuation, objectively representing the credits of trading parties and improving the security of online trade, has become the key issue. To solve the problem of behavior credit in e-trade, this paper presents a trust valuation method based on the behavior pattern showed in the process of e-trade. With this method, a Bayesian model for assessment is presented, composed of nodes of behavior pattern matching levels and nodes of credibility attributes; and the grade of the consumption credit index and that of the sale credit index can be inferred. The effectiveness of this method has been verified by an actual electronic trading platform.
{"title":"A Bayes-based method for trust valuation in electronic commerce","authors":"Zhibing Wang, Changyun Li, Junfeng Man","doi":"10.1109/KAM.2010.5646263","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646263","url":null,"abstract":"With the development of the Internet, electronic commerce has shown a rapid increase, in the open dynamic Internet how to establish a complete model for trust valuation, objectively representing the credits of trading parties and improving the security of online trade, has become the key issue. To solve the problem of behavior credit in e-trade, this paper presents a trust valuation method based on the behavior pattern showed in the process of e-trade. With this method, a Bayesian model for assessment is presented, composed of nodes of behavior pattern matching levels and nodes of credibility attributes; and the grade of the consumption credit index and that of the sale credit index can be inferred. The effectiveness of this method has been verified by an actual electronic trading platform.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"61 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124091059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646268
Weiwei Yu, K. Madani, C. Sabourin
CMAC neural network has been widely applied on the real-time control of the nonlinear systems, such as robot control, aerocraft control and etc. However, the required memory size increases exponentially with the input dimension of CMAC, it may conduct to serious computational challenges in its on-line application. In this paper, experimental protocol is used for illustrating how the structure of CMAC influence the approximation qualities and required memory size. It is found that an optimal structure carrying the minimum modeling error could be achieved. The self-optimizing algorithm is then developed to adjust the structure of CMAC neural network in order to accomplish the minimum modeling error with minimum required memory size, without increase the structure complexness of the network.
{"title":"Self-optimizing for the Structure of CMAC neural network","authors":"Weiwei Yu, K. Madani, C. Sabourin","doi":"10.1109/KAM.2010.5646268","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646268","url":null,"abstract":"CMAC neural network has been widely applied on the real-time control of the nonlinear systems, such as robot control, aerocraft control and etc. However, the required memory size increases exponentially with the input dimension of CMAC, it may conduct to serious computational challenges in its on-line application. In this paper, experimental protocol is used for illustrating how the structure of CMAC influence the approximation qualities and required memory size. It is found that an optimal structure carrying the minimum modeling error could be achieved. The self-optimizing algorithm is then developed to adjust the structure of CMAC neural network in order to accomplish the minimum modeling error with minimum required memory size, without increase the structure complexness of the network.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646275
Nansheng Pang, Y. Zhang, Hui-li Huang
Based on the consideration of the client and the contractor's joint project profit, a compromise thought that both the client and the contractor deviate from their respective ideal solutions by an equal percentage is proposed, an optimization model of payment scheduling with generalized precedence relations in the progress payment model is constructed. Ultimately, an example is given to demonstrate the effectiveness and practicality of the optimal model.
{"title":"Study of payment scheduling optimization with generalized precedence relations in the progress payment model","authors":"Nansheng Pang, Y. Zhang, Hui-li Huang","doi":"10.1109/KAM.2010.5646275","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646275","url":null,"abstract":"Based on the consideration of the client and the contractor's joint project profit, a compromise thought that both the client and the contractor deviate from their respective ideal solutions by an equal percentage is proposed, an optimization model of payment scheduling with generalized precedence relations in the progress payment model is constructed. Ultimately, an example is given to demonstrate the effectiveness and practicality of the optimal model.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123298279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646277
Zhu Weixing, Liu Xiangping
A real-time video surveillance system for piggery was designed to overcome the disadvantages of traditional observation methods for behavior of pigs. In this system, embedded system technology, H.264 video encoding technology and network communication technology were combined for real-time monitoring the behavior of pigs. According to directional centre-biased motion vector distribution and the characteristic that the motion in the horizontal direction is more impetuous than vertical direction in the surveillance video for piggery, thin diamond search (TDS) algorithm was proposed in this paper. The algorithm is based on thin diamond search pattern, and has the feature of fast speed while maintaining high precision of diamond search algorithm. The experimental results showed that the computation complexity and coding time of video coding are reduced in the TDS algorithm, so that the real-time performance of the surveillance video was improved significantly. This study provides a convenient way and low-cost method for remote monitoring of animal behavior. Therefore, the system has a wide application prospect in intelligent precision breeding industry.
{"title":"Real-time video surveillance system for piggery based on H.264 and embedded system","authors":"Zhu Weixing, Liu Xiangping","doi":"10.1109/KAM.2010.5646277","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646277","url":null,"abstract":"A real-time video surveillance system for piggery was designed to overcome the disadvantages of traditional observation methods for behavior of pigs. In this system, embedded system technology, H.264 video encoding technology and network communication technology were combined for real-time monitoring the behavior of pigs. According to directional centre-biased motion vector distribution and the characteristic that the motion in the horizontal direction is more impetuous than vertical direction in the surveillance video for piggery, thin diamond search (TDS) algorithm was proposed in this paper. The algorithm is based on thin diamond search pattern, and has the feature of fast speed while maintaining high precision of diamond search algorithm. The experimental results showed that the computation complexity and coding time of video coding are reduced in the TDS algorithm, so that the real-time performance of the surveillance video was improved significantly. This study provides a convenient way and low-cost method for remote monitoring of animal behavior. Therefore, the system has a wide application prospect in intelligent precision breeding industry.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-29DOI: 10.1109/KAM.2010.5646152
Zhou Zhengda, Zhou Jingli
As the amount of digital data growing explosively, data deduplication becomes an attractive technique for conserving the storage and network requirement. However, the tradeoff between redundancy for data availability and data duplicate elimination for storage utilization becomes an issue in the deduplication storage system. To address the issue, we proposed a novel data redundancy scheme to improve the data availability for the deduplication storage system. The key idea is to optimize the system-level availability by assigning an optimal replication degree for the individual data chunk based on its commonality in the data set. We present the design and implementation of the prototype of the high availability storage system and evaluate the feasibility and effectiveness of the optimization approach. The evaluation experiments demonstrated the approach is practical and effective.
{"title":"A novel data redundancy scheme for de-duplication storage system","authors":"Zhou Zhengda, Zhou Jingli","doi":"10.1109/KAM.2010.5646152","DOIUrl":"https://doi.org/10.1109/KAM.2010.5646152","url":null,"abstract":"As the amount of digital data growing explosively, data deduplication becomes an attractive technique for conserving the storage and network requirement. However, the tradeoff between redundancy for data availability and data duplicate elimination for storage utilization becomes an issue in the deduplication storage system. To address the issue, we proposed a novel data redundancy scheme to improve the data availability for the deduplication storage system. The key idea is to optimize the system-level availability by assigning an optimal replication degree for the individual data chunk based on its commonality in the data set. We present the design and implementation of the prototype of the high availability storage system and evaluate the feasibility and effectiveness of the optimization approach. The evaluation experiments demonstrated the approach is practical and effective.","PeriodicalId":160788,"journal":{"name":"2010 Third International Symposium on Knowledge Acquisition and Modeling","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130500146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}