Analyzing the present situation of personalized recommendation system. Point out the limitation of similarity based on voting, and the disadvantage of the strict matching in calculating similarity. Put forward a new personalized recommendation method based on the statistics of item. Adopt the cloud model to calculate the similarity instead of traditional strict matching of cosine method. The experiments show that the system has better performance.
{"title":"Personalized Recommendation Based on Similarity of Cloud Model","authors":"Rong Luo, Yu-Xi Gong","doi":"10.1109/KAM.2009.190","DOIUrl":"https://doi.org/10.1109/KAM.2009.190","url":null,"abstract":"Analyzing the present situation of personalized recommendation system. Point out the limitation of similarity based on voting, and the disadvantage of the strict matching in calculating similarity. Put forward a new personalized recommendation method based on the statistics of item. Adopt the cloud model to calculate the similarity instead of traditional strict matching of cosine method. The experiments show that the system has better performance.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115465428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Logic animation, a new style of animation, was first proposed in the application of dynamic geometry software. The concept, features, and possible application prospects of logic animation are further introduced in details in this paper, compared with the traditional style of animation—time-sequential animation. Based on the design ideas of dynamic geometry software, Flash and game engine, the design of a logic animation-making software is also proposed, and finally the resulting software is illustrated with several examples, demonstrating its merits.
{"title":"Logic Animation and Logic Animation Platform","authors":"Mao Chen, Q. Ge, Qingtang Liu, Zhiguo Si","doi":"10.1109/KAM.2009.164","DOIUrl":"https://doi.org/10.1109/KAM.2009.164","url":null,"abstract":"Logic animation, a new style of animation, was first proposed in the application of dynamic geometry software. The concept, features, and possible application prospects of logic animation are further introduced in details in this paper, compared with the traditional style of animation—time-sequential animation. Based on the design ideas of dynamic geometry software, Flash and game engine, the design of a logic animation-making software is also proposed, and finally the resulting software is illustrated with several examples, demonstrating its merits.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Firms need to transfer and acquire new knowledge as they seek to opportunities for mutual learning and contributes to organizational members' ability to innovate in and finally contributes to enhance performance. In attempting to understand the antecedents and consequences of organizational knowledge transfer (KT), scholars have increasingly focused on how social capital fosters KT because it is a socializing mechanism. On the other hand, enterprise network offers a platform for KT. So understanding the process of KT in network context accurately and improve the efficiency is very important issues. This paper examines the barriers to KT among enterprise network. These barriers are exactly the study scope of social capital. So using a social capital framework, this article try to analyze the concrete effects of social capital to KT among enterprise networks from three dimensions which are structural, relational and cognitive ones. From the analysis, we conclude that the degree of structural dimension of social capital is positively with the opportunity, motivation and ability of KT and the degree of relational dimension and cognitive dimension of social capital is positively with the effect of KT.
{"title":"Research on the Knowledge Transfer among Enterprise Network: A Perspective from Social Capital","authors":"Yang Zhao, Ying Wang","doi":"10.1109/KAM.2009.200","DOIUrl":"https://doi.org/10.1109/KAM.2009.200","url":null,"abstract":"Firms need to transfer and acquire new knowledge as they seek to opportunities for mutual learning and contributes to organizational members' ability to innovate in and finally contributes to enhance performance. In attempting to understand the antecedents and consequences of organizational knowledge transfer (KT), scholars have increasingly focused on how social capital fosters KT because it is a socializing mechanism. On the other hand, enterprise network offers a platform for KT. So understanding the process of KT in network context accurately and improve the efficiency is very important issues. This paper examines the barriers to KT among enterprise network. These barriers are exactly the study scope of social capital. So using a social capital framework, this article try to analyze the concrete effects of social capital to KT among enterprise networks from three dimensions which are structural, relational and cognitive ones. From the analysis, we conclude that the degree of structural dimension of social capital is positively with the opportunity, motivation and ability of KT and the degree of relational dimension and cognitive dimension of social capital is positively with the effect of KT.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Car-following model is the vital portion of traffic flow theory which is the foundation for simulation, capacity, control, safety, and ITS. A scientific traffic flow model can properly deal with the severe conflicts between traffic application and demand , efficiently analyse and solve some actual traffic matters. Since the last decade of 20th century , researchers on various fields have recognized the complexity of traffic flow which has attracted many traffic scientists, mathematicians, physicists and economists into this area. The paper reviews the recent discoveries on and development of car-following model theories, and analyzes the main differences between the researchers from the Micro-Modeling. In the light of research practices and investigating the differences and relations of these research methods, we put forward some new views for further study of car following models.
{"title":"Car-Following Models Study Progress","authors":"B. Cao, Zhaosheng Yang","doi":"10.1109/KAM.2009.83","DOIUrl":"https://doi.org/10.1109/KAM.2009.83","url":null,"abstract":"Car-following model is the vital portion of traffic flow theory which is the foundation for simulation, capacity, control, safety, and ITS. A scientific traffic flow model can properly deal with the severe conflicts between traffic application and demand , efficiently analyse and solve some actual traffic matters. Since the last decade of 20th century , researchers on various fields have recognized the complexity of traffic flow which has attracted many traffic scientists, mathematicians, physicists and economists into this area. The paper reviews the recent discoveries on and development of car-following model theories, and analyzes the main differences between the researchers from the Micro-Modeling. In the light of research practices and investigating the differences and relations of these research methods, we put forward some new views for further study of car following models.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121530772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of the society, it is necessary to apply artificial intelligence to personal knowledge management. This paper researches on it. At first, this paper introduces the meaning of personal knowledge management and the meaning of artificial intelligence. And then introduce the problems in personal knowledge management at present. There are three problems:(1) The problem of information overload. (2) The problem of unstructured information. (3) The problem of tacit knowledge. At third, in order to solve these problems, introduce the application of artificial intelligence in personal knowledge management. The applications are: (1)The intelligent search of knowledge. (2) The automatic classification of knowledge. (3) The conversion of tacit knowledge. This paper explains the application detailed. Finally, summarize that the application of artificial intelligence in personal knowledge management is still at the initial stage, but it has a beautiful future.
{"title":"The Artificial Intelligence in Personal Knowledge Management","authors":"Lixin Diao, Mingzhang Zuo, Qiang Liu","doi":"10.1109/KAM.2009.269","DOIUrl":"https://doi.org/10.1109/KAM.2009.269","url":null,"abstract":"With the development of the society, it is necessary to apply artificial intelligence to personal knowledge management. This paper researches on it. At first, this paper introduces the meaning of personal knowledge management and the meaning of artificial intelligence. And then introduce the problems in personal knowledge management at present. There are three problems:(1) The problem of information overload. (2) The problem of unstructured information. (3) The problem of tacit knowledge. At third, in order to solve these problems, introduce the application of artificial intelligence in personal knowledge management. The applications are: (1)The intelligent search of knowledge. (2) The automatic classification of knowledge. (3) The conversion of tacit knowledge. This paper explains the application detailed. Finally, summarize that the application of artificial intelligence in personal knowledge management is still at the initial stage, but it has a beautiful future.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121550150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At present, the FAQ (Frequently-Asked Question) answering system cannot understand the user's questions at the concept level, so its efficiency needs to be improved. In this paper, a model of FAQ answering system based on concept is proposed. The system model consists of three components, which are concept-based preprocessing, extraction of question-answer pairs, and concept-based matching of sentences. On the one hand, the model proposes an index-based extracting method of question-answering pairs, to combine the extraction with the index mechanism for improving the speed of extraction. On the other hand, the model expands the user's question at the concept level, and proposes a concept based matching method between sentences, to match the user's question with the question-answering pairs. The concept based matching method concerns the synonymous meanings between sentences at the concept level. In addition, the experimental result shows the matching method is an efficient method.
{"title":"The Model Research of FAQ Answering System Based on Concept","authors":"Maoyuan Zhang, Tingting He, Fuquan Yang","doi":"10.1109/KAM.2009.288","DOIUrl":"https://doi.org/10.1109/KAM.2009.288","url":null,"abstract":"At present, the FAQ (Frequently-Asked Question) answering system cannot understand the user's questions at the concept level, so its efficiency needs to be improved. In this paper, a model of FAQ answering system based on concept is proposed. The system model consists of three components, which are concept-based preprocessing, extraction of question-answer pairs, and concept-based matching of sentences. On the one hand, the model proposes an index-based extracting method of question-answering pairs, to combine the extraction with the index mechanism for improving the speed of extraction. On the other hand, the model expands the user's question at the concept level, and proposes a concept based matching method between sentences, to match the user's question with the question-answering pairs. The concept based matching method concerns the synonymous meanings between sentences at the concept level. In addition, the experimental result shows the matching method is an efficient method.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The traditional authentication system used certificates, magnetic cards, or passwords to identify a person. It can easily cause forgery, missing or stealing. For this reason, this paper analyzed the merits of fingerprint which is unique, invariability, and uneasy forge. Then designed an intelligent authentication system used embedded technology and a new fingerprint sensor FPC1011C. The system has many advantages, such as small volume, lower power consumption, lower cost, safety and reliability, easy to install and to maintain, good practicality and so on. The validity and efficiency of the system was validated via test-experiment. The results show that this system has the superiority that traditional authentication system unable to realize. It can open a wide development and application space for fingerprint identification technology. Thus provide an ideal solution for personal identification and information security problems, which the current society has faced.
{"title":"Study and Design of Intelligent Authentication System Based on Fingerprint Identification","authors":"Fengling Wang, Yuanyi Zhang","doi":"10.1109/KAM.2009.247","DOIUrl":"https://doi.org/10.1109/KAM.2009.247","url":null,"abstract":"The traditional authentication system used certificates, magnetic cards, or passwords to identify a person. It can easily cause forgery, missing or stealing. For this reason, this paper analyzed the merits of fingerprint which is unique, invariability, and uneasy forge. Then designed an intelligent authentication system used embedded technology and a new fingerprint sensor FPC1011C. The system has many advantages, such as small volume, lower power consumption, lower cost, safety and reliability, easy to install and to maintain, good practicality and so on. The validity and efficiency of the system was validated via test-experiment. The results show that this system has the superiority that traditional authentication system unable to realize. It can open a wide development and application space for fingerprint identification technology. Thus provide an ideal solution for personal identification and information security problems, which the current society has faced.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Association rule discovery plays an important role in knowledge discovery and data mining, and efficiency is especially crucial for an algorithm to find frequent patterns from a large database. In this paper, a new algorithm called LogApriori algorithm is proposed by the idea of reducing unnecessary scanning of database in Apriori algorithm. The correctness of LogApriori algorithm is proved in this paper, and the performance of LogApriori algorithm is better than Apriori algorithm theoretically and practically. The success of LogApriori algorithm indicates that the strategy of producing itemsets with different number of items in one scanning can indeed find frequent patterns correctly and effectively.
{"title":"An Efficient Algorithm for Association Mining","authors":"Kan Jin","doi":"10.1109/KAM.2009.55","DOIUrl":"https://doi.org/10.1109/KAM.2009.55","url":null,"abstract":"Association rule discovery plays an important role in knowledge discovery and data mining, and efficiency is especially crucial for an algorithm to find frequent patterns from a large database. In this paper, a new algorithm called LogApriori algorithm is proposed by the idea of reducing unnecessary scanning of database in Apriori algorithm. The correctness of LogApriori algorithm is proved in this paper, and the performance of LogApriori algorithm is better than Apriori algorithm theoretically and practically. The success of LogApriori algorithm indicates that the strategy of producing itemsets with different number of items in one scanning can indeed find frequent patterns correctly and effectively.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124167296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Immune Clonal Selection Algorithm (ICSA), based on the clonal selection theory proposed by Burnet, has gained much attention in the last decade. ICSA can exploit and explore the solution space in parallel and effectively. However, antibody random initialization and premature convergence are two problems of ICSA. To solve these problems, chaotic initialization mechanism and quantum interference mechanism are introduced into ICSA. Simulation results based on the traveling salesman problems have demonstrated the efficiency and robustness of the novel Clonal Selection Algorithm.
{"title":"Chaotic Immune Clonal Selection Algorithm and Its Application","authors":"Hongwei Dai, Cunhua Li","doi":"10.1109/KAM.2009.85","DOIUrl":"https://doi.org/10.1109/KAM.2009.85","url":null,"abstract":"Immune Clonal Selection Algorithm (ICSA), based on the clonal selection theory proposed by Burnet, has gained much attention in the last decade. ICSA can exploit and explore the solution space in parallel and effectively. However, antibody random initialization and premature convergence are two problems of ICSA. To solve these problems, chaotic initialization mechanism and quantum interference mechanism are introduced into ICSA. Simulation results based on the traveling salesman problems have demonstrated the efficiency and robustness of the novel Clonal Selection Algorithm.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122528686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of multimedia network technology, the traditional teaching modes and learning styles have undergone profound changes. Collaborative learning is just a new teaching mode that comes into being under contemporary teaching circumstance. It is important to train students' cooperative spirit and innovative consciousness. But current collaborative learning system faces with some issues such as security of document. In this paper, we present a model of document security management in cooperative learning system. This scheme provides joint-mode authentication. It can choose authentication mode according to the need of documents' security level and simultaneously provide learning resource authentication.
{"title":"Study of Document Security Management in Cooperative Learning System","authors":"Xin Yu, Yu Bai, Hongyu Sheng","doi":"10.1109/KAM.2009.248","DOIUrl":"https://doi.org/10.1109/KAM.2009.248","url":null,"abstract":"With the rapid development of multimedia network technology, the traditional teaching modes and learning styles have undergone profound changes. Collaborative learning is just a new teaching mode that comes into being under contemporary teaching circumstance. It is important to train students' cooperative spirit and innovative consciousness. But current collaborative learning system faces with some issues such as security of document. In this paper, we present a model of document security management in cooperative learning system. This scheme provides joint-mode authentication. It can choose authentication mode according to the need of documents' security level and simultaneously provide learning resource authentication.","PeriodicalId":192986,"journal":{"name":"2009 Second International Symposium on Knowledge Acquisition and Modeling","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}