Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810442
Yin Xu-ri
In the classical rough set theory, the use of the indiscernibility relation which is used in the complete information systems may be too rigid in some real situations. In order to process incomplete data, the indiscernibility relation needs to be extended. In this paper, after discussing the basic concepts and current research on the characteristic relation under incomplete data, a modified characteristic relation that is dependent on the number of missing values with respect to the number of the whole defined attributes for each object is introduced; the lower and upper approximation defined on this relation are proposed as well. Furthermore, we present some properties of this modified characteristic relation. The experiments show that this relation works effectively in incomplete information and generates object classification reasonably. This electronic document is a "live" template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document.
{"title":"A Modified Characteristic Relation for Incomplete Data","authors":"Yin Xu-ri","doi":"10.1109/KAMW.2008.4810442","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810442","url":null,"abstract":"In the classical rough set theory, the use of the indiscernibility relation which is used in the complete information systems may be too rigid in some real situations. In order to process incomplete data, the indiscernibility relation needs to be extended. In this paper, after discussing the basic concepts and current research on the characteristic relation under incomplete data, a modified characteristic relation that is dependent on the number of missing values with respect to the number of the whole defined attributes for each object is introduced; the lower and upper approximation defined on this relation are proposed as well. Furthermore, we present some properties of this modified characteristic relation. The experiments show that this relation works effectively in incomplete information and generates object classification reasonably. This electronic document is a \"live\" template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132236018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810416
Qing Li, Wendan Wu, Han-hong Jiang
Mobile ad hoc networks possess the following features: open transmission medium, dynamic topology structure, acentric management and distributed cooperation, and so on. Therefore, Ad Hoc Networks have high practical value, while at the same time it is difficult for which to guarantee the routing security, which is the most important component of the entire network's security, it is also a difficult problem to be solved completely. This paper analyzes the working principle of the AODV routing protocol, discusses the protocol's main potential safety problems - the problem of the black hole, proposes an solution based on the test of the destination node according to the significant vulnerabilities of some typical solutions already in existence, which not only solve the problem of the black hole effectively, but also eliminate the significant vulnerabilities existing in the original propose fundamentally.
{"title":"A Propose to Enhance the AODV Routing Protocols' Security of Ad hoc Networks","authors":"Qing Li, Wendan Wu, Han-hong Jiang","doi":"10.1109/KAMW.2008.4810416","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810416","url":null,"abstract":"Mobile ad hoc networks possess the following features: open transmission medium, dynamic topology structure, acentric management and distributed cooperation, and so on. Therefore, Ad Hoc Networks have high practical value, while at the same time it is difficult for which to guarantee the routing security, which is the most important component of the entire network's security, it is also a difficult problem to be solved completely. This paper analyzes the working principle of the AODV routing protocol, discusses the protocol's main potential safety problems - the problem of the black hole, proposes an solution based on the test of the destination node according to the significant vulnerabilities of some typical solutions already in existence, which not only solve the problem of the black hole effectively, but also eliminate the significant vulnerabilities existing in the original propose fundamentally.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134115698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810452
Yan Hui, Laiyongbo
In the paper we analyze the effects of different color spaces to color image dither impact and processing velocity and know that dither processing in RGB space is better judging by quality and velocity of image. A multidimensional element algorithmic method named looking-up table is proposed to make the color matching processing velocity heighten more than one amount degree. So that the required time of image processing is saved. With distances reciprocal as standard, we assign error to four points to make error assign better proportioned.
{"title":"Research of Color Image Error Diffusion Method with a New Matching Method","authors":"Yan Hui, Laiyongbo","doi":"10.1109/KAMW.2008.4810452","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810452","url":null,"abstract":"In the paper we analyze the effects of different color spaces to color image dither impact and processing velocity and know that dither processing in RGB space is better judging by quality and velocity of image. A multidimensional element algorithmic method named looking-up table is proposed to make the color matching processing velocity heighten more than one amount degree. So that the required time of image processing is saved. With distances reciprocal as standard, we assign error to four points to make error assign better proportioned.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132982902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810421
Zhaohua Long, Guofeng Wang
Analyzes the engineering environment in WLAN based on ECC, this paper describe a kind of dual signature scheme using multi-element authentication method by choosing appropriate ECC parameters. This scheme strengthen authentication for all the entities in WLAN, any party's identity should be checked by others when associating. The analytical results indicate that this scheme not only enhance the security of access control in wireless network environment, restrict the "Man-in-the-Middle" attacks, but also well support the bandwidth transport in wireless network.
{"title":"A Multi-element Authentication Method Based on ECDSA for Wireless Network","authors":"Zhaohua Long, Guofeng Wang","doi":"10.1109/KAMW.2008.4810421","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810421","url":null,"abstract":"Analyzes the engineering environment in WLAN based on ECC, this paper describe a kind of dual signature scheme using multi-element authentication method by choosing appropriate ECC parameters. This scheme strengthen authentication for all the entities in WLAN, any party's identity should be checked by others when associating. The analytical results indicate that this scheme not only enhance the security of access control in wireless network environment, restrict the \"Man-in-the-Middle\" attacks, but also well support the bandwidth transport in wireless network.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810669
Xia Li, Bei Wu
The paper proposes a concept segmentation method to extract meta-knowledge from the multi-source knowledge base. We improve the traditional structure-based extracting method by using the concept hierarchical partition. The concept and concept relationship can be described with ontology model, which can discover the semantic relationship between concepts. Then a self-learning of meta-knowledge model is set up which can optimize the meta-knowledge description. Finally an empirical study is carried out by implementing the meta-knowledge extraction process from multi-source knowledge bass for educational resources.
{"title":"Extracting Meta-knowledge from Multi-source Knowledge base with Concept Segmentation Method","authors":"Xia Li, Bei Wu","doi":"10.1109/KAMW.2008.4810669","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810669","url":null,"abstract":"The paper proposes a concept segmentation method to extract meta-knowledge from the multi-source knowledge base. We improve the traditional structure-based extracting method by using the concept hierarchical partition. The concept and concept relationship can be described with ontology model, which can discover the semantic relationship between concepts. Then a self-learning of meta-knowledge model is set up which can optimize the meta-knowledge description. Finally an empirical study is carried out by implementing the meta-knowledge extraction process from multi-source knowledge bass for educational resources.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132120118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810558
Cai Jianhuai, Lin Xiao, Yue Wuyi, Li Wei, Yin Zhao, Liao Maoqing
The thesis presented a heterogeneous players strategy using in RoboCup. The strategy used fuzzy evaluation to obtain the evaluation results of all heterogeneous players on various roles, and constructed a fuzzy inference system to dynamically select equal heterogeneous players for various roles. The simulation experiments and competition results show the application is feasible and effective.
{"title":"Application of Fuzzy Evaluation and Inference in RoboCup","authors":"Cai Jianhuai, Lin Xiao, Yue Wuyi, Li Wei, Yin Zhao, Liao Maoqing","doi":"10.1109/KAMW.2008.4810558","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810558","url":null,"abstract":"The thesis presented a heterogeneous players strategy using in RoboCup. The strategy used fuzzy evaluation to obtain the evaluation results of all heterogeneous players on various roles, and constructed a fuzzy inference system to dynamically select equal heterogeneous players for various roles. The simulation experiments and competition results show the application is feasible and effective.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132310283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810515
C. Chang, Yan Ma
The forest fire environment is complex. It is difficult to depict and quantitative analyze the relatives among all elements. The condition of fire scene also becomes more complicated. Everything can't be predicted or recurred. Multi-agent technology provides realizable methods for simulation of forest fire extinguishing with pneumatic extinguisher. In this paper, based on the current situation of simulation of forest fire extinguishing, we analyze the complex adaptive system's features, and design the model for forest fire extinguishing with pneumatic extinguisher system. According to the features of Multi-Agent, this paper introduces how to realize the simulation of forest fire extinguishing with pneumatic extinguisher using the develop tool-Mason.
{"title":"Simulation of Forest Fire Extinguishing with Pneumatic Extinguisher Based on Multi-Agent","authors":"C. Chang, Yan Ma","doi":"10.1109/KAMW.2008.4810515","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810515","url":null,"abstract":"The forest fire environment is complex. It is difficult to depict and quantitative analyze the relatives among all elements. The condition of fire scene also becomes more complicated. Everything can't be predicted or recurred. Multi-agent technology provides realizable methods for simulation of forest fire extinguishing with pneumatic extinguisher. In this paper, based on the current situation of simulation of forest fire extinguishing, we analyze the complex adaptive system's features, and design the model for forest fire extinguishing with pneumatic extinguisher system. According to the features of Multi-Agent, this paper introduces how to realize the simulation of forest fire extinguishing with pneumatic extinguisher using the develop tool-Mason.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"59 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810500
Chenghui Yang, Chuanjun Ren
Monitoring system always plays the great important role in many kinds of the controlling system. Communications between software and hardware becomes the core problem of the control system. In the system, choose the configuration software to develop the monitoring software system, which has features of well graphical intuitive. The entire electric locomotive monitoring system include some function module, and the monitoring software locomotive operations recorded by the whole locomotive of the acquisition, the top operations video capture, ID card information management, historical data query, print, and other full-featured and easy to use. Through contorting the main Real-time monitoring system and PLC system to achieve good communication and monitoring process. The monitoring software development well on the main station PLC control, greatly improved the electric locomotive of the entire operation by security.
{"title":"Communication Application on the Servicing Work Safety Supervision System for Electric Locomotive","authors":"Chenghui Yang, Chuanjun Ren","doi":"10.1109/KAMW.2008.4810500","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810500","url":null,"abstract":"Monitoring system always plays the great important role in many kinds of the controlling system. Communications between software and hardware becomes the core problem of the control system. In the system, choose the configuration software to develop the monitoring software system, which has features of well graphical intuitive. The entire electric locomotive monitoring system include some function module, and the monitoring software locomotive operations recorded by the whole locomotive of the acquisition, the top operations video capture, ID card information management, historical data query, print, and other full-featured and easy to use. Through contorting the main Real-time monitoring system and PLC system to achieve good communication and monitoring process. The monitoring software development well on the main station PLC control, greatly improved the electric locomotive of the entire operation by security.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122885230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810651
Lu Gao, Xiaoming Du, Zhongpeng Liu
This paper analyses the characteristics of military equipment information resources and the special demand of military equipment digital library. Based on the general digital library architecture combined the characteristics of military equipment information resource, it builds the architecture of military equipment digital library and the operation mechanism for military equipment digital library is discussed.
{"title":"Knowledge Management-Oriented Architecture Design of Military Equipment Digital Library","authors":"Lu Gao, Xiaoming Du, Zhongpeng Liu","doi":"10.1109/KAMW.2008.4810651","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810651","url":null,"abstract":"This paper analyses the characteristics of military equipment information resources and the special demand of military equipment digital library. Based on the general digital library architecture combined the characteristics of military equipment information resource, it builds the architecture of military equipment digital library and the operation mechanism for military equipment digital library is discussed.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122886885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810642
Hongbing Liu, Shengwu Xiong, Qiong Chen
Fast fuzzy support vector machines (FFSVMs) based on the convex hulls are proposed in this paper. Firstly, the convex hull of each class data is generated by using the quick hull algorithm, and the data points lying inside the convex hull are not important to form FSVMs and then discarded. Secondly, the reduced training set consisting of the convex points is used to train the FFSVMs. Thirdly, the benchmark two-class problems and multi-class problems datasets are used to test the effectiveness and validness of FFSVMs. The experiment results indicate that FFSVMs not only reduce the training set but also achieve the same or better performance compared with the traditional FSVMs.
{"title":"Fuzzy Support Vector Machines Based on Convex Hulls","authors":"Hongbing Liu, Shengwu Xiong, Qiong Chen","doi":"10.1109/KAMW.2008.4810642","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810642","url":null,"abstract":"Fast fuzzy support vector machines (FFSVMs) based on the convex hulls are proposed in this paper. Firstly, the convex hull of each class data is generated by using the quick hull algorithm, and the data points lying inside the convex hull are not important to form FSVMs and then discarded. Secondly, the reduced training set consisting of the convex points is used to train the FFSVMs. Thirdly, the benchmark two-class problems and multi-class problems datasets are used to test the effectiveness and validness of FFSVMs. The experiment results indicate that FFSVMs not only reduce the training set but also achieve the same or better performance compared with the traditional FSVMs.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124494238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}