Xuemin Zhang, Heng-sheng Zhang, Bin Yang, Di-fan Zhang, R. Zhou
{"title":"Reading Efficiency of Chinese Text Scrolling Style and Presentation Style on Computer Interface","authors":"Xuemin Zhang, Heng-sheng Zhang, Bin Yang, Di-fan Zhang, R. Zhou","doi":"10.1109/WKDD.2008.76","DOIUrl":"https://doi.org/10.1109/WKDD.2008.76","url":null,"abstract":"The present research studied the effects of page scrolling style, reading task and column on the efficiency of text reading from a monitor. The results indicated that participants could finish their reading task more quickly when the task was information search than when it was reading comprehension and that they read texts more efficiently in one-column format than in two-column format. However, concerning the page-scrolling style, participants finished information search task more quickly in scrolling-by-line style while the opposite occurred when the task was reading comprehension.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast and Optimal Method Based on Fuzzy Neural Networks for SINS Initial Alignment","authors":"X. Bo, Sun Feng, Yu Fei, Liu Fuqiang","doi":"10.1109/WKDD.2008.121","DOIUrl":"https://doi.org/10.1109/WKDD.2008.121","url":null,"abstract":"The paper presents an approach which applies LQ optimal control in Strap-down Inertial Navigation System (SINS) initial alignment. The detailed analysis process about this method has been shown, and anti-jamming designs were done for the approximate step-wise disturbance which appeared in the system, to gain the optimal control parameter, the fuzzy neural network is used in the method. Simulations are performed to validate the scheme for initial alignment, obtained the same precision to other alignment method. And the most splendid was that the using of the LQ optimal control reduces the alignment time consumedly much more quickly than other traditional method. What is discovered in the simulation is while the initial error angles were smaller than 10 degrees; error angle will converge to quite good precision in several seconds.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hua Yuan, Yi Li, Wenhui Li, Kong Zhao, Duo Wang, Rongqing Yi
{"title":"Combining Immune with Ant Colony Algorithm for Geometric Constraint Solving","authors":"Hua Yuan, Yi Li, Wenhui Li, Kong Zhao, Duo Wang, Rongqing Yi","doi":"10.1109/WKDD.2008.58","DOIUrl":"https://doi.org/10.1109/WKDD.2008.58","url":null,"abstract":"Geometric constraint problem can be transformed to an optimization problem which the objective function and constraints are non-convex functions. In this paper an evolutionary algorithm based on ant colony optimization algorithm and the immune system model is proposed to provide solution to the geometric constraints problem. In the new algorithm, affinity calculation process and pheromone trail lying is embedded to maintain diversity and carry out the global search and the local search in many directions rather than one direction around the same individual simultaneously. This new algorithm different with current optimization methods in that it gets the good solution by excluding bad solutions. The experimental results reported here will shed more light into how affects the hybrid algorithm's search power in solving geometric constraint problem.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Theoretical and Empirical Research on Organization Innovation from the Knowledge Management Perspective","authors":"Li He","doi":"10.1109/WKDD.2008.106","DOIUrl":"https://doi.org/10.1109/WKDD.2008.106","url":null,"abstract":"In the knowledge economy era, the organization's existing environment has changed enormously: innovation becomes the original driving force; knowledge occupies the core position of organizations' resource as strategic resource; the competition of organizations runs to global. In such background, knowledge management as the important sources of the corporations' competition superiority, gradually becomes the focus in enterprise management. On the base of synthetical comment to relevant theories such as knowledge management, organization learning and organization innovation, this article studies organization innovation's connotation, process and mechanism based on knowledge management systematically and thoroughly. It also validates the inner relationship of knowledge management, organization learning and organization innovation through empirical researches well as organization innovation mechanism based on knowledge management perspective.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Compliance Validation of Trusted Computing Applications","authors":"Qi Cui, Wenchang Shi","doi":"10.1109/WKDD.2008.25","DOIUrl":"https://doi.org/10.1109/WKDD.2008.25","url":null,"abstract":"Trusted computing (TC) is considered to be one of the newly developed technologies on improving computer security and creating a trustworthy environment. Although the Trusted Computing Group (TCG) has defined specifications/or TC, including that of trusted platform module (TPM), criteria on compliance testing is still not available. It is important that the design and implementation of TPM and other components follow the specifications, as incompliance may lead to crucial security impacts. In this paper, a test mechanism checking TPM commands is instrumented into TPM application, so that conformance to standards can be examined before TPM's functional execution to validate its compliance with the specifications. Furthermore, this paper also initially puts forward the concept of \"chain of compliance\", which enhances the trustworthiness of computing platforms by verifying the conformance of their components.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131131603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Terrorism Root Cause Analysis Based on Subjective Game Model","authors":"Dehai Liu","doi":"10.1109/WKDD.2008.37","DOIUrl":"https://doi.org/10.1109/WKDD.2008.37","url":null,"abstract":"Currently, international terrorism is overrunning allover the word that's induced by the very complex factors such as economic poverty, international political conflict, religion and national contradiction, culture and value difference between Western and Eastern. Game theory provides a suitable tool for the various conflict and cooperative problems, but under the basic hypothesis of fixed exterior environment, traditional game and evolutionary game theories are difficult to analyze the terrorism root in the dynamic complex environment. The paper uses subjective game model to analyze the terrorism root and generating condition in the changing environment, there are including the sensitive degree about the North-South gap under the background of economic globalizations, the economy and social developing foreground in depressed area, the responsive projects for the global poverty among the developing countries and developed countries.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133373517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Rapid System and Method for CV","authors":"Zhang Ning","doi":"10.1109/WKDD.2008.72","DOIUrl":"https://doi.org/10.1109/WKDD.2008.72","url":null,"abstract":"In this article, we give a new method \"mirror method\" which has not been used in Camera Calibration and computer vision. The method is easy to implement and has very good result. The essence in the method is to utilize mirror. So in the article, we use the method to implement camera calibration rapidly, and use it to implement 3D reconstructed.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131918828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tactics Analysis on Women Swimming Athletes in the 800m Freestyle Swimming Race Using Speed Coefficient Theory","authors":"Ting Liao","doi":"10.1109/WKDD.2008.145","DOIUrl":"https://doi.org/10.1109/WKDD.2008.145","url":null,"abstract":"Based on the results of 2004 Olympic Games, 2005 world swimming championships and 10th National Games Swimming Competition, a comprehensive analysis is done on the world's elite female athletes in the 800 m freestyle swimming about the physical distribution of projects and tactical characteristics. By the selection of the first to sixth's accomplishments, we make some changes and obtain the coefficients of velocity, which we can use to reflect the abilities of sub-athletes physical distribution of run-length features. Upon this theory, we review the tactical application of world elite athletes, identify the gap between Chinese athletes and the world elites, and provide the physical distribution model that is detailed, intuitive, \"easy-to-control\". Therefore we hope that Chinese athletes can learn from the reasonable physical distribution model, and apply to training practice. We also hope that this article can enhance the Chinese overall level of swimming, and provide the preparation for the 2008 Olympic Games as a reference.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132209645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research on Game Model of Business Incubation Network Trust Problems under Electronic Commerce","authors":"Heqiang Teng, Daohong Zhang, Renguo Jiang","doi":"10.1109/WKDD.2008.17","DOIUrl":"https://doi.org/10.1109/WKDD.2008.17","url":null,"abstract":"Firstly, this paper studies the credit mechanism of business incubation network under E-commerce, on the basis of credit mechanism. We put the method of building incubated enterprises virtual communities and customers virtual communities to increase the B to C e-commerce trust within the business incubation network. Then, on the basis of game theory analysis the trigger policy of incubated enterprises' dishonesty on the incubation network virtual communities, designing stimulating mechanism and restraint mechanism to ensure enterprise sincere sale on the incubation network virtual communities.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134584982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LGES: A Large Graph Embedding System","authors":"Weihua Zhou, Jingwei Huang","doi":"10.1109/WKDD.2008.156","DOIUrl":"https://doi.org/10.1109/WKDD.2008.156","url":null,"abstract":"Many convenient graph drawing tools have been developed to visualize the relational information among the large massive data sets. This paper presents a new system for drawing large undirected graphs in the two-dimensional and three-dimensional space, called LGES. It employs a fast novel algorithm to beautify the layouts, which adopts the multi-level method as the framework of the algorithm, and uses the improved force-directed algorithm to refine the single-level layouts. Experiments prove its high performance and nice results. It takes around 5 seconds to draw 10,000 vertex graphs in the two- dimensional space and around 40 seconds in the three- dimensional space. Moreover, the independent components provided by the LGES system are attractive for its further development and application.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}