By Topic

Knowledge Acquisition and Modeling (KAM), 2010 3rd International Symposium on

Date 20-21 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 121
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (690 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2010, Page(s):i - v
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):vi - xiv
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Research on intelligentized agile manufacturing system in distributed knowledge base architecture

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Intelligentized distributed system is advanced mode of network operation in agile manufacturing system. In intelligent agile manufacturing, Architecture of knowledge base directly influences intelligent level of manufacture. Application knowledge and reorganization are two sides of implement intelligent application. When application knowledge don't meet needs of application, starting reorganizatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The twitter-based research of personal knowledge management

    Publication Year: 2010, Page(s):5 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB) | HTML iconHTML

    This paper firstly discusses the necessity of conducting personal knowledge management in the web 2.0 technology environment. On this basis, the author describes the content and characteristics of Twitter, the concepts of personal knowledge management and its processes, and elaborates the features of Twitter's application in personal knowledge management. And then from the view of practical operat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing credit risks with knowledge management for financial banks

    Publication Year: 2010, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Nowadays, financial banks are operating in a knowledge society and there are more and more credit risks breaking out in banks. So, this paper first discusses the implications of knowledge and knowledge management, and then analyzes credit risks of financial banks with knowledge management. Finally, the paper studies ways for banks to manage credit risks with knowledge management. With the applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Existence and stability of periodic solution of impulsive BAM Type Cohen-Grossberg neural networks with delays

    Publication Year: 2010, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    In this paper, the existence and global exponential stability of periodic solution is investigated for a class of impulsive bidirectional associative memories neural networks that possesses a Cohen-Grossberg dynamics incorporating variable delays and time-variant coefficients. By using compressive mapping and Lyapunov functional, sufficient conditions are obtained to guarantee the existence and un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved maze algorithm in contour extraction of CAPTCHAs

    Publication Year: 2010, Page(s):16 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    An improved maze algorithm has been first advanced, combining with the rotation invariant theory, to extract the contour of CAPTCHAs which are slant and have random positions. First, take the CAPTCHAs as a maze, in which white pixels represents a potential route; Second, search towards “left-down” in the predefined direction and record the pixels which have been checked; Finally, get... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated risk management model for financial banks with knowledge management

    Publication Year: 2010, Page(s):20 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Modern financial banks are operating in a knowledge society and they are affected by various risks. In order to enhance the efficiency of risk management in banks, this paper first discusses the implications of financial risks, knowledge and knowledge management, and then presents an integrated risk management model with knowledge management. Finally, the paper studies ways for banks to manage ris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree automata and active XML

    Publication Year: 2010, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    An Active XML (AXML for short) is an XML document where some of the data is given explicitly while other parts are defined only intentionally by means of embedded calls to Web services. Tree automata are extended from traditional string automata and accept regular tree languages. In this paper, the connection between tree automata and AXML was surveyed. Specially, the methods of how to build the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The infrared characteristic research of typical target in scene matching

    Publication Year: 2010, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    In scene matching guidance, some infrared reference images of target area cannot truly reflect the current situation because of the meteorological factors. Therefore, a specific correction model is required. A theoretical computing model was constructed, in which the coefficiency was fitted by referring to the statistical data, and the statistical data of plastic cement and rock were computed to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Innovation strategies of firms in industrial clusters and role of government in knowledge service

    Publication Year: 2010, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Innovation strategies of firms in industrial clusters will change at different stages of the lifecycle of industrial cluster. Innovation ability and organizational forms of firms in cluster also evolve with the development of industrial clusters. Government policies and regulations contribute to cluster growth and technical innovation. But the role of government in cluster development also differs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved differential evolution based BP neural network for prediction of groundwater table

    Publication Year: 2010, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    Groundwater table often shows complex nonlinear characteristic. Back Propagation (BP) neural network is increasingly used to predict groundwater table. However man-made selecting the structure of BP neural network has blindness and expends much time, so differential evolution (DE) algorithm was adopted to automatically search BP neural network weight matrix and threshold matrix. In order to improv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The dual-level index model of text retrieval system based on concept

    Publication Year: 2010, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    The technology of concept extending has been researched to deal with the vocabulary mismatch problem for the text retrieval systems. It can not be avoided that the concept extending leads to more time cost of the retrieval systems. To aim at solving the problem, this paper puts forward a novel retrieval system, which is based on a dual-level index model. The dual-level index model introduces the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Damage effectiveness simulation in the smart ammunition design

    Publication Year: 2010, Page(s):44 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    The angle of site for smart ammunition terminal trajectory is difficult to be designed and the time of activating the fuse in the fuse-warhead coordination is difficult to be determined. A design for the damage effectiveness simulation able to be quantitatively evaluated was proposed to solve these problems. Based on the model of damage effectiveness, and the principle of maximizing the damage eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research of incentive strategies in CSCL

    Publication Year: 2010, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    With the development of network, people emphasis on cooperation online much more. While, CSCL provide a wonderful environment for us to online cooperate. However, how to play personal values better, how to stimulate individual to enter team active better in CSCL? These are still topics concerned by the public in social. Firstly, this paper made a survey about needs analysis of learners in CSCL; Se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General regression neural network forecasting model based on PSO algorithm in water demand

    Publication Year: 2010, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    There is a complicated non-linear relationship between the factors and water demand. General regression neural network (GRNN) was adopted to model the non-linear relationship in the study. The prediction performance of GRNN can vary considerably depending on smoothing parameter. The optimal smoothing parameter is usually determined empirically based on trial-and-error. Particle swarm optimization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification method of nonlinear systems with friction based on Genetic Algorithm

    Publication Year: 2010, Page(s):55 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB) | HTML iconHTML

    Genetic Algorithm (GA) is an optimization procedure which can be applied to the identification of the nonlinear structure of a dynamic model by using experimental data. In this paper, the GA is introduced to identify the precision stage with the nonlinear friction. By means of the GA approach with a nonlinear polynomial model, the structure as well as its coefficients can be modeled accurately, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel VLSI architecture of 8×8 integer DCT based on H.264/AVC FRext

    Publication Year: 2010, Page(s):59 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (842 KB) | HTML iconHTML

    H.264FRext video coding standard uses integer 8 × 8 discrete cosine transform (DCT) algorithm. It can preserve the detail image information better. Compared with the traditional cosine transform, integer DCT can avoid the mismatch problem, increase the computation speed, and is more feasible for hardware implementation. This paper proposes a novel two-dimension DCT hardware structure based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a home surveillance robot with self-recharging capabilities

    Publication Year: 2010, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1006 KB) | HTML iconHTML

    This paper presents the design and implementation of a home surveillance robot with self-recharging capabilities. The proposed robot has an ARM based hardware platform and a WinCE operating system. A docking algorithm based on the information fusion of encoders, electronic compasses and infrared sensors is proposed to realize the self-recharging capabilities. The simulation results of the docking ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flux and level prediction based on an wavelet neural network flood model

    Publication Year: 2010, Page(s):67 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    This paper uses wavelet neural networks for flood prediction. It presents an flood prediction model and give an rapid algorithm. The water flux and level are used as input and output variables in the prediction model. The analysis of time-frequency characteristic of wavelet transformation is given. The prediction precision is improved by combining low frequency feature vector with high frequency o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On 1-type positive implicative pseudo-BCK/BCI algebras

    Publication Year: 2010, Page(s):71 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    As a generalization of positive implicative BCK/BCI-algebras, the notions of 1-type positive implicative pseudo-BCK/BCI algebras are introduced, and some properties are investigated. By introducing the notions of 1-type positive implicative pseudo-BCK/BCI filter, 1-type positive implicative pseudo-BCK/BCI algebras are characterized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commutative pseudo-BCI algebras and commutative pseudo-BCI filters

    Publication Year: 2010, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    As a generalization of commutative BCI-algebra, the notion of commutative pseudo-BCI algebra is introduced, and some properties are investigated. The lattice structure of commutative pseudo-BCI algebra is discussed. By introducing the notion of commutative pseudo-BCI filter, commutative pseudo-BCI algebra is characterized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing effective SVM ensembles for image classification

    Publication Year: 2010, Page(s):80 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (702 KB) | HTML iconHTML

    This paper proposes a novel method for constructing SVM ensembles for achieving improved image classification performance. The use of an SVM ensemble, instead of a single classifier, normally aims at reducing the training complexity and improving the performance. SVM ensembles are constructed by combining a set of base classifiers. While the traditional combination methods primarily consider an in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auto-POS templates and mixed metrics for recognizing terms in scientific literature

    Publication Year: 2010, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    Automatic Term Recognition (ATR) is an important task for Knowledge Acquisition, which aims at acquiring formalized words which are not recorded in time in the glossary. In recent years, several statistical methods has proved to be effective, and emerging methods such as C-value, NC-Value, TermExtractor has shown great advantages on this task. However, few works have been done on the Metric mixing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.