Logo Goletty

Editorial
Journal Title Journal of Computers
Journal Abbreviation jcp
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (85 kb)
   
Title Editorial
Authors Luo, Qi; Sim, Ben K. M.
Abstract Knowledge discovery and data mining (KDD) have become areas of growing significance because of the recent increasing demand for KDD techniques, including those used in machine learning, databases, statistics, knowledge acquisition, data visualization, and high performance computing. Knowledge discovery and data mining can be extremely beneficial for the field of Artificial Intelligence in many areas, such as industry, commerce, government, education and so forth. The First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008) are sponsored by Institute of Computer Science, Social Informatics and Telecommunications Engineering (ICST), in cooperation with Ningbo University, China, Wuhan University of Science and Technology Zhongnan Branch, China, and Association for Computing Machinery (ACM). The workshop is hosted by the University of Adelaide, Australia on 23-24 January 2008. Out of more than 400 papers submitted to WKDD 2008 workshop, we have chosen 15 outstanding papers to be published in this special issue, track on Innovative Computing. All these papers have been reviewed in the second round and were recommended to contain 30% more new material to be accepted and published in this Special Issue. To have a quick look at some papers in this special issue, in the first paper, Wang Weixiang et al. give a new definition of T-F function for discrete global optimization. A T-F function satisfying this definition is proposed. Furthermore, they discuss the properties of the proposed T-F function and design a new discrete T-F function algorithm. Bo Meng gives a formal logic framework for receipt-freeness based on V. Kessler and H. Neumann logic. The framework is then applied to analyze receipt-freeness of two typical voting protocols: FOO and Meng Internet voting protocol. Wang Chu and Depei Qian have proposed a pattern oriented service design method. Chen Ling et al. have presented a modified Fisher discriminate analysis method for classifying stream data. To satisfy the real-time demand in classifying stream data, this method defines a new criterion for Fisher discriminate analysis. Based on the deep analysis of the relation between the concepts of security and trusted in computer system, Wei-Peng Liu et al. have proposed a novel secure terminal system Based on trusted hardware: U-Key. It describes the architecture design of the whole secure system and analyses the important security function implemented. Next, Zhou Yong has proposed an improved KNN text classification algorithm based on clustering center. Liu Yan et al. have proposed the design and implementation of an intelligence surveillance system which uses embedded multimedia server as core computing platform. They have carefully designed the embedded server based on MPSoC platform for the surveillance system whose key functionalities include heterogeneous multiprocessors environment set up, key algorithm porting and development framework design. Finally, Yongqing Wei et al. attempt to structure a risk evaluation model of high-technology project investment based on the uncertain linguistic variable and TOPSIS method. Firstly, this paper discusses the current situation of the research of the high-technology project investment. Then an evaluation indicators system is constructed and the evaluation procedures based on the uncertain linguistic and TOPSIS method. At last, this evaluation method is used to a practical example. We hope that the readers of this Special Issue enjoy reading and finding it useful in their future research. We first would like to thank the authors who worked hard to add substantial materials to the conference versions. Also, we would like to thank the editorial board of the Journal of Computers for his patience throughout this process.
Publisher ACADEMY PUBLISHER
Date 2009-03-01
Source Journal of Computers Vol 4, No 3 (2009): Special Issue: Selected Best Papers of WKDD 2008 - Track on Innovative Computin
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html.

 

See other article in the same Issue


Goletty © 2024