Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810590
Ying Peng, Chanle Wu, Shujuan Peng, Jun Yue
In education field, presentation tools like PowerPoint are widely used and play important role in creating learning content. But the file formats of those presentation tools like ppt do not support web page format which is suitable for Web publishing. Those presentation tools file formats are usually need further format converting process, like converting ppt files to web page files or to swf files. To solve the problem, the paper designs and implements a simple presentation tool, and the file format is based on Web pages. The file of the simple presentation tool is composed of several web pages based on vml supported by IE, and each web page is relative to a slide, that is mean editing slide is editing web page. So the file generated by the simple presentation tool does not need further file format converting, more suitable for web content publishing. The paper introduces the architecture of the simple presentation tool, and its basic functions including textbox edit, picture edit, graphic edit, slide edit.
{"title":"A Simple Presentation Tool Based on Web Pages","authors":"Ying Peng, Chanle Wu, Shujuan Peng, Jun Yue","doi":"10.1109/KAMW.2008.4810590","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810590","url":null,"abstract":"In education field, presentation tools like PowerPoint are widely used and play important role in creating learning content. But the file formats of those presentation tools like ppt do not support web page format which is suitable for Web publishing. Those presentation tools file formats are usually need further format converting process, like converting ppt files to web page files or to swf files. To solve the problem, the paper designs and implements a simple presentation tool, and the file format is based on Web pages. The file of the simple presentation tool is composed of several web pages based on vml supported by IE, and each web page is relative to a slide, that is mean editing slide is editing web page. So the file generated by the simple presentation tool does not need further file format converting, more suitable for web content publishing. The paper introduces the architecture of the simple presentation tool, and its basic functions including textbox edit, picture edit, graphic edit, slide edit.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133876288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810427
Hua Hou, Zhihua Li, Pei Sun
A new access algorithm in cognitive radio systems is proposed inthis paper, which can decrease primary users' access delay effectively and guarantee the access throughput fairness among primary users and secondary users. In the time domain, primary users apply 1-persisten access policy and secondary users apply exponential backoff retransmission policy; while in the frequency domain primary users select several suitable subcarriers as access channels and secondary users select only the subcarrier with the least interference temperature as access channel. Simulations confirm the perfect performance of the proposed algorithm.
{"title":"A New Access Algorithm in Cognitive Radio Systems","authors":"Hua Hou, Zhihua Li, Pei Sun","doi":"10.1109/KAMW.2008.4810427","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810427","url":null,"abstract":"A new access algorithm in cognitive radio systems is proposed inthis paper, which can decrease primary users' access delay effectively and guarantee the access throughput fairness among primary users and secondary users. In the time domain, primary users apply 1-persisten access policy and secondary users apply exponential backoff retransmission policy; while in the frequency domain primary users select several suitable subcarriers as access channels and secondary users select only the subcarrier with the least interference temperature as access channel. Simulations confirm the perfect performance of the proposed algorithm.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134059902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810479
Weiwen Li, Xianmin Zhang, B. You, K. Zou
A novel endless polarization control algorithm based on simulated annealing (SA) algorithm is proposed. The application of the SA algorithm in a fast feedback polarization controller (PC) constructed by four electro-optic ceramic variable waveplates for the continuous conversion of the state of polarization (SOP) is presented. The experiment results show that the fluctuation of the light intensity in the desired output SOP is less than 2 % for a random input SOP. It is demonstrated that, this SA-based PC can run reset-freely and the response time is less than 400mus.
{"title":"Endless Polarization Control Based on Simulated Annealing Algorithm","authors":"Weiwen Li, Xianmin Zhang, B. You, K. Zou","doi":"10.1109/KAMW.2008.4810479","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810479","url":null,"abstract":"A novel endless polarization control algorithm based on simulated annealing (SA) algorithm is proposed. The application of the SA algorithm in a fast feedback polarization controller (PC) constructed by four electro-optic ceramic variable waveplates for the continuous conversion of the state of polarization (SOP) is presented. The experiment results show that the fluctuation of the light intensity in the desired output SOP is less than 2 % for a random input SOP. It is demonstrated that, this SA-based PC can run reset-freely and the response time is less than 400mus.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810629
Dongmei Xing
An approximate strategy is designed for the static data management in geometric network. If all parameters is given, a constant approximation ratio is achieved. Here, we suppose that the link cost don't satisfy triangle inequality, but the ratio of the maximum link cost to the minimum value is known.
{"title":"Approximation Algorithms for Data management in Geometric Network","authors":"Dongmei Xing","doi":"10.1109/KAMW.2008.4810629","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810629","url":null,"abstract":"An approximate strategy is designed for the static data management in geometric network. If all parameters is given, a constant approximation ratio is achieved. Here, we suppose that the link cost don't satisfy triangle inequality, but the ratio of the maximum link cost to the minimum value is known.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810416
Qing Li, Wendan Wu, Han-hong Jiang
Mobile ad hoc networks possess the following features: open transmission medium, dynamic topology structure, acentric management and distributed cooperation, and so on. Therefore, Ad Hoc Networks have high practical value, while at the same time it is difficult for which to guarantee the routing security, which is the most important component of the entire network's security, it is also a difficult problem to be solved completely. This paper analyzes the working principle of the AODV routing protocol, discusses the protocol's main potential safety problems - the problem of the black hole, proposes an solution based on the test of the destination node according to the significant vulnerabilities of some typical solutions already in existence, which not only solve the problem of the black hole effectively, but also eliminate the significant vulnerabilities existing in the original propose fundamentally.
{"title":"A Propose to Enhance the AODV Routing Protocols' Security of Ad hoc Networks","authors":"Qing Li, Wendan Wu, Han-hong Jiang","doi":"10.1109/KAMW.2008.4810416","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810416","url":null,"abstract":"Mobile ad hoc networks possess the following features: open transmission medium, dynamic topology structure, acentric management and distributed cooperation, and so on. Therefore, Ad Hoc Networks have high practical value, while at the same time it is difficult for which to guarantee the routing security, which is the most important component of the entire network's security, it is also a difficult problem to be solved completely. This paper analyzes the working principle of the AODV routing protocol, discusses the protocol's main potential safety problems - the problem of the black hole, proposes an solution based on the test of the destination node according to the significant vulnerabilities of some typical solutions already in existence, which not only solve the problem of the black hole effectively, but also eliminate the significant vulnerabilities existing in the original propose fundamentally.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134115698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810693
Qiang Liu, Mingzhang Zuo, Xia Zhang
The personal knowledge management in mobile learning is a new area. With the development of mobile learning, Personal knowledge management is necessary in mobile learning. This paper introduce the meaning of mobile learning and personal knowledge management. The tools of personal knowledge management in mobile learning include: (1) Tools to deal with the media. (2)Database;(3)Information management system; (4)Scheduling;(5)Web blog; (6)Community. This tools are a group. They have different application in different mobile equipment. Some tools are introduced how to use in this paper. The strategy of personal knowledge management in mobile learning: (1) Analyse the learner's demand of knowledge resources;(2) Choose the right personal knowledge management tools;(3)Establish their own knowledge management system;(4) Maintain personal knowledge management system;(5) The using and innovation of knowledge. There are two main problems in personal knowledge management in mobile learning in the future: (1) Technical problems;(2) Development of tools.
{"title":"The Personal Knowledge Management in Mobile Learning","authors":"Qiang Liu, Mingzhang Zuo, Xia Zhang","doi":"10.1109/KAMW.2008.4810693","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810693","url":null,"abstract":"The personal knowledge management in mobile learning is a new area. With the development of mobile learning, Personal knowledge management is necessary in mobile learning. This paper introduce the meaning of mobile learning and personal knowledge management. The tools of personal knowledge management in mobile learning include: (1) Tools to deal with the media. (2)Database;(3)Information management system; (4)Scheduling;(5)Web blog; (6)Community. This tools are a group. They have different application in different mobile equipment. Some tools are introduced how to use in this paper. The strategy of personal knowledge management in mobile learning: (1) Analyse the learner's demand of knowledge resources;(2) Choose the right personal knowledge management tools;(3)Establish their own knowledge management system;(4) Maintain personal knowledge management system;(5) The using and innovation of knowledge. There are two main problems in personal knowledge management in mobile learning in the future: (1) Technical problems;(2) Development of tools.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"24 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132532707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810558
Cai Jianhuai, Lin Xiao, Yue Wuyi, Li Wei, Yin Zhao, Liao Maoqing
The thesis presented a heterogeneous players strategy using in RoboCup. The strategy used fuzzy evaluation to obtain the evaluation results of all heterogeneous players on various roles, and constructed a fuzzy inference system to dynamically select equal heterogeneous players for various roles. The simulation experiments and competition results show the application is feasible and effective.
{"title":"Application of Fuzzy Evaluation and Inference in RoboCup","authors":"Cai Jianhuai, Lin Xiao, Yue Wuyi, Li Wei, Yin Zhao, Liao Maoqing","doi":"10.1109/KAMW.2008.4810558","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810558","url":null,"abstract":"The thesis presented a heterogeneous players strategy using in RoboCup. The strategy used fuzzy evaluation to obtain the evaluation results of all heterogeneous players on various roles, and constructed a fuzzy inference system to dynamically select equal heterogeneous players for various roles. The simulation experiments and competition results show the application is feasible and effective.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132310283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810536
Xiao Jiahe, Qin Yongyuan, Long Rui
In this paper, a LS-SVM model based RLG's scale factor temperature data modeling method is studied. Using traditional least square linear model to modeling nonlinear ring laser gyro scale factor test data has its intrinsic shortcoming, and sometimes it is difficult to meet the application requirements. Recently, nonlinear function approximation based modeling methods such as the BP networks are introduced to modeling the temperature data. But in the BP networks will suffer the problem of overfitting and the existence of many local minima. To avoid these shortcomings the LS-SVM is used to modeling the scale factor temperature data. Base on the analysis of the test scale factor data, the scale factor test data is modeled as the function of the temperature and its increment, and LS-SVM model is employed to estimate the nonlinear function. The simulation results show that the LS-SVM model can approach scale factor data accurately, and its precision is much higher than the least square model. The mean squared deviation of LS-SVM model is smaller than 0.51times10-6("/pulse). Base on considerately designed test procedure and large numbers of experimental data, a practical temperature model can be established.
{"title":"Modeling Temperature Data of RLG's Scale Factor Using LS-SVM","authors":"Xiao Jiahe, Qin Yongyuan, Long Rui","doi":"10.1109/KAMW.2008.4810536","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810536","url":null,"abstract":"In this paper, a LS-SVM model based RLG's scale factor temperature data modeling method is studied. Using traditional least square linear model to modeling nonlinear ring laser gyro scale factor test data has its intrinsic shortcoming, and sometimes it is difficult to meet the application requirements. Recently, nonlinear function approximation based modeling methods such as the BP networks are introduced to modeling the temperature data. But in the BP networks will suffer the problem of overfitting and the existence of many local minima. To avoid these shortcomings the LS-SVM is used to modeling the scale factor temperature data. Base on the analysis of the test scale factor data, the scale factor test data is modeled as the function of the temperature and its increment, and LS-SVM model is employed to estimate the nonlinear function. The simulation results show that the LS-SVM model can approach scale factor data accurately, and its precision is much higher than the least square model. The mean squared deviation of LS-SVM model is smaller than 0.51times10-6(\"/pulse). Base on considerately designed test procedure and large numbers of experimental data, a practical temperature model can be established.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132297291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810669
Xia Li, Bei Wu
The paper proposes a concept segmentation method to extract meta-knowledge from the multi-source knowledge base. We improve the traditional structure-based extracting method by using the concept hierarchical partition. The concept and concept relationship can be described with ontology model, which can discover the semantic relationship between concepts. Then a self-learning of meta-knowledge model is set up which can optimize the meta-knowledge description. Finally an empirical study is carried out by implementing the meta-knowledge extraction process from multi-source knowledge bass for educational resources.
{"title":"Extracting Meta-knowledge from Multi-source Knowledge base with Concept Segmentation Method","authors":"Xia Li, Bei Wu","doi":"10.1109/KAMW.2008.4810669","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810669","url":null,"abstract":"The paper proposes a concept segmentation method to extract meta-knowledge from the multi-source knowledge base. We improve the traditional structure-based extracting method by using the concept hierarchical partition. The concept and concept relationship can be described with ontology model, which can discover the semantic relationship between concepts. Then a self-learning of meta-knowledge model is set up which can optimize the meta-knowledge description. Finally an empirical study is carried out by implementing the meta-knowledge extraction process from multi-source knowledge bass for educational resources.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132120118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810442
Yin Xu-ri
In the classical rough set theory, the use of the indiscernibility relation which is used in the complete information systems may be too rigid in some real situations. In order to process incomplete data, the indiscernibility relation needs to be extended. In this paper, after discussing the basic concepts and current research on the characteristic relation under incomplete data, a modified characteristic relation that is dependent on the number of missing values with respect to the number of the whole defined attributes for each object is introduced; the lower and upper approximation defined on this relation are proposed as well. Furthermore, we present some properties of this modified characteristic relation. The experiments show that this relation works effectively in incomplete information and generates object classification reasonably. This electronic document is a "live" template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document.
{"title":"A Modified Characteristic Relation for Incomplete Data","authors":"Yin Xu-ri","doi":"10.1109/KAMW.2008.4810442","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810442","url":null,"abstract":"In the classical rough set theory, the use of the indiscernibility relation which is used in the complete information systems may be too rigid in some real situations. In order to process incomplete data, the indiscernibility relation needs to be extended. In this paper, after discussing the basic concepts and current research on the characteristic relation under incomplete data, a modified characteristic relation that is dependent on the number of missing values with respect to the number of the whole defined attributes for each object is introduced; the lower and upper approximation defined on this relation are proposed as well. Furthermore, we present some properties of this modified characteristic relation. The experiments show that this relation works effectively in incomplete information and generates object classification reasonably. This electronic document is a \"live\" template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132236018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}