Scheduled Maintenance on May 23rd, 2017:
IEEE Xplore will undergo an upgrade from 1:00 - 4:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)

23-24 Jan. 2008

Filter Results

Displaying Results 1 - 25 of 154
  • First International Workshop on Knowledge Discovery and Data Mining - Cover

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • First International Workshop on Knowledge Discovery and Data Mining - Title

    Publication Year: 2008, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • First International Workshop on Knowledge Discovery and Data Mining - Copyright

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • First International Workshop on Knowledge Discovery and Data Mining - TOC

    Publication Year: 2008, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (275 KB)
    Freely Available from IEEE
  • Message from the WKDD 2008 Workshop Chairs

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (262 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the IITSI 2008 Symposium Chairs

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (289 KB) | HTML iconHTML
    Freely Available from IEEE
  • WKDD 2008 and IITSI 2008 Organizing Committee

    Publication Year: 2008, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (288 KB)
    Freely Available from IEEE
  • WKDD 2008 and IITSI 2008 Committee Members

    Publication Year: 2008, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE
  • Advancing Knowledge Discovery and Data Mining

    Publication Year: 2008, Page(s):3 - 5
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Knowledge discovery and data mining have become areas of growing significance because of the recent increasing demand for KDD techniques, including those used in machine learning, databases, statistics, knowledge acquisition, data visualization, and high performance computing. Knowledge discovery and data mining can be extremely beneficial for the field of Artificial Intelligence in many areas, su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge Management in the Ubiquitous Software Development

    Publication Year: 2008, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    The continuous technical advances have lead to the proliferation of very small and very cheap microprocessors, equipped with sensors and capacity of wireless communication. The information processing is becoming ubiquitous and it is being impregnated in all type of objects. In this article the general delineations set out towards a methodology of securing of the quality of software ubiquitous base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining

    Publication Year: 2008, Page(s):10 - 16
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    Network security has been a very important issue, since the rising evolution of the Internet. There has been an increasing need for security systems against the external attacks from the hackers. One important type is the intrusion detection system (IDS). There are two major categories of the analysis techniques of IDS: the anomaly detection and the misuse detection. Here we forcus on misuse detec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining High Utility Itemsets in Large High Dimensional Data

    Publication Year: 2008, Page(s):17 - 20
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    Existing algorithms for utility mining are inadequate on datasets with high dimensions or long patterns. This paper proposes a hybrid method, which is composed of a row enumeration algorithm (i.e., inter-transaction) and a column enumeration algorithm (i.e., two-phase), to discover high utility itemsets from two directions: Two-phase seeks short high utility itemsets from the bottom, while inter-t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Pruning Strategies for Sequential Pattern Mining

    Publication Year: 2008, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    In this paper, we systematically explore the search space of frequent sequence mining and present two novel pruning strategies, SEP (Sequence Extension Pruning) and IEP (Item Extension Pruning), which can be used in all Apriori-like sequence mining algorithms or lattice-theoretic approaches. With a little more memory overhead, proposed pruning strategies can prune invalidated search space and decr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperation Forensic Computing Research

    Publication Year: 2008, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    The network forensic computing is faced with the question of the complex network intrusion analyses. So a new concept of cooperation forensic computing is defined. Through to extend the theory of function dependency, a new method called probability function dependency relationships is proposed. Combined it with the Bayesian network and K2 algorithm, the network forensic computing algorithm called ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grasping Related Words of Unknown Word for Automatic Extension of Lexical Dictionary

    Publication Year: 2008, Page(s):31 - 35
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (946 KB) | HTML iconHTML

    An aim of this research is to grasp related words of unknown word. Currently, several lexical dictionaries have been developed for semantic retrieval such as WordNet and FrameNet. However, more new words are created in every day because of new trends, new paradigm, new technology, etc. And, it is impossible to contain all of these new words. The existing methods, which grasp the meaning of unknown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Website Structure Optimization Model for More Effective Web Navigation

    Publication Year: 2008, Page(s):36 - 41
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    A novel website structure optimization model for more effective web navigation is proposed. First, web page group with low access efficiency is discovered by its support and its topology average distance; Then a measure degree, website topology interest, which can overall indicate the website access efficiency is proposed as guidance rule to optimize the website hyperlink structure; Finally, users... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Average Fuzzy Direction Based Handwritten Chinese Characters Recognition Approach

    Publication Year: 2008, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    Since handwritten Chinese characters' style is uncertain and differs as people differ, this article brings forward a new Average Fuzzy Direction Code based on weight, so as to conquer traditional fuzzy arithmetic's shortcoming that is without enough generalization capability; At the same time it improves association rules in data mining and applies it to the process of handwritten Chinese characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Data Mining Technology Based on CIMS and its Application on Automotive Remanufacturing

    Publication Year: 2008, Page(s):48 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    Nowadays, with the development of computer technology, data mining has been widely used in various fields. This paper describes a CIMSMINER that combines the data mining with CIMS (computer integrated manufacturing system) and instructs its objectives, model, physical architecture and methods. Considering the characteristics of remanufacturing of automotive products in China, the CIMSMINER is used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study on Improving the Manufacturing Informatization Index System of China

    Publication Year: 2008, Page(s):53 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    The manufacturing informatization index system (MIIS) is an indispensable tool to measure the informatization level of Chinese manufacturing industry and evaluate the implementation effect of the manufacturing informatization engineering (MIE) conducted by the government of China. Thus far, the constructs of MIIS has not been validated. This study fills this void by employing structural equation m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centrality Research on the Traditional Chinese Medicine Network

    Publication Year: 2008, Page(s):59 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (511 KB) | HTML iconHTML

    Aiming at the complex data in the traditional Chinese medicine, a new way is proposed in this paper that data mining of complex relations to find out the potential information among different medicine objects. We turned the traditional Chinese medicine knowledge network into graph by using information from ontology, then adopted centrality algorithm to analyze and process this graph, and finally m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method Multi-Factor Trend Regression and its Application to Economy Forecast in Jiangxi

    Publication Year: 2008, Page(s):63 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    The principle of a new method called trend regression is introduced and applied to the economy forecast of Jiangxi Province. The method improved previous time series forecasting method in which only self-extension is done and multiple factors (variables) are not taken into consideration. Also, it got over the weakness of forecasting by general regression analysis that relies on simultaneous indepe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The BP Neural Network Optimizing Design Model for Agricultural Information Measurement Based on Multistage Dynamic Fuzzy Evaluation

    Publication Year: 2008, Page(s):68 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    The agricultural information level is on the initial stage in China, so we should pay more attention to its construction, but how to measure the agricultural information degree is a major issue. This paper overcomes the shortcoming of traditional linear agricultural information degree evaluation method, proposes a BP neural network evaluating method based on the multistage dynamic fuzzy judgment, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A PSO-Based Clustering Algorithm for Manufacturing Cell Design

    Publication Year: 2008, Page(s):72 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Different metaheuristic methods have been used to solve clustering problems. This paper addresses the problem of manufacturing cell formation using a modified particle swarm optimisation (PSO) algorithm. The main modification made to the original PSO algorithm consists on that in this work it is not used the vector of velocities as the standard PSO algorithm does. The proposed algorithm uses the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Association Rule Analysis of Spatial Data Mining Based on Matlab-A Case of Ancheng Township in China

    Publication Year: 2008, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    Though there are many methods for spatial data mining, it is also a desirable problem that how to carry out this operation fast. Matlab is called full-purpose calculation paper. And it has certain advantage in carrying out data mining because of its powerful matrix calculation function. According to the association rule method of data mining, spatial data of land use and slope was processed and ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced ART2 Neural Network for Clustering Analysis

    Publication Year: 2008, Page(s):81 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    The adaptive resonance theory 2 (ART2) neural network exhibits several properties which can be useful in the data mining and which are lacking in most other neural networks. But ART2 has deficiencies that the categories clustered by ART2 are very mutable to slight changes in training conditions. An improved ART2 with enhanced triplex matching mechanism, named as ETM-ART2, is presented to redress t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.