ISSN : 1796-203X
Volume : 4    Issue : 3    Date : March 2009

Special Issue: Selected Best Papers of International Workshop on Knowledge Discovery and
Data Mining 2008 (WKDD 2008) - Track on Innovative Computing

Guest Editors: Qi Luo and Ben K. M. Sim

Qi Luo and Ben K. M. Sim
Page(s): 177-178
Full Text:
PDF (84 KB)

Knowledge discovery and data mining (KDD) have become areas of growing significance because
of the recent increasing demand for KDD techniques, including those used in machine learning,
databases, statistics, knowledge acquisition, data visualization, and high performance computing.
Knowledge discovery and data mining can be extremely beneficial for the field of Artificial
Intelligence in many areas, such as industry, commerce, government, education and so forth.

The First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008) are
sponsored by Institute of Computer Science, Social Informatics and Telecommunications
Engineering (ICST), in cooperation with Ningbo University, China, Wuhan University of Science and
Technology Zhongnan Branch, China, and Association for Computing Machinery (ACM). The
workshop is hosted by the University of Adelaide, Australia on 23-24 January 2008. Out of more than
400 papers submitted to WKDD 2008 workshop, we have chosen 15 outstanding papers to be
published in this special issue, track on Innovative Computing. All these papers have been
reviewed in the second round and were recommended to contain 30% more new material to be
accepted and published in this Special Issue.

To have a quick look at some papers in this special issue, in the first paper, Wang Weixiang et al.
give a new definition of T-F function for discrete global optimization. A T-F function satisfying this
definition is proposed. Furthermore, they discuss the properties of the proposed T-F function and
design a new discrete T-F function algorithm. Bo Meng gives a formal logic framework for
receipt-freeness based on V. Kessler and H. Neumann logic. The framework is then applied to
analyze receipt-freeness of two typical voting protocols: FOO and Meng Internet voting protocol.
Wang Chu and Depei Qian have proposed a pattern oriented service design method.

Chen Ling et al. have presented a modified Fisher discriminate analysis method for classifying
stream data. To satisfy the real-time demand in classifying stream data, this method defines a new
criterion for Fisher discriminate analysis. Based on the deep analysis of the relation between the
concepts of security and trusted in computer system, Wei-Peng Liu et al. have proposed a novel
secure terminal system Based on trusted hardware: U-Key. It describes the architecture design of
the whole secure system and analyses the important security function implemented.

Next, Zhou Yong has proposed an improved KNN text classification algorithm based on clustering
center. Liu Yan et al. have proposed the design and implementation of an intelligence surveillance
system which uses embedded multimedia server as core computing platform. They have carefully
designed the embedded server based on MPSoC platform for the surveillance system whose key
functionalities include heterogeneous multiprocessors environment set up, key algorithm porting
and development framework design.

Finally, Yongqing Wei et al. attempt to structure a risk evaluation model of high-technology project
investment based on the uncertain linguistic variable and TOPSIS method. Firstly, this paper
discusses the current situation of the research of the high-technology project investment. Then an
evaluation indicators system is constructed and the evaluation procedures based on the uncertain
linguistic and TOPSIS method. At last, this evaluation method is used to a practical example.

We hope that the readers of this Special Issue enjoy reading and finding it useful in their future
research. We first would like to thank the authors who worked hard to add substantial materials to
the conference versions. Also, we would like to thank the editorial board of the Journal of Computers
for his patience throughout this process.

Guest Editors:

Qi Luo
Chair, IEEE SMC Technical Committee on Education Technology and Training, USA
Wuhan Institute of Technology, China
Chair, Intelligent Information Technology Application Research Association, Hong Kong
Editor-in-Chief, International Journal of Intelligent Information Technology Application

Ben K. M. Sim
Associate Editor, IEEE Transactions on Systems, Man & Cybernetics, Part C
Guest Editor, IEEE Systems Journal (IEEE Systems Council)
Associate Editor, International Journal of Applied Systemic Studies (Inderscience)

Index Terms
Special Issue, Knowledge Discovery, Data Mining, Innovative Computing