2009 International Symposium on Intelligent Ubiquitous Computing and Education最新文献

筛选
英文 中文
An Evaluation Model of Web-Based Distance Education for the Deaf Undergraduate 聋人本科网络远程教育评价模型研究
Li Qiang, Ma Ming
{"title":"An Evaluation Model of Web-Based Distance Education for the Deaf Undergraduate","authors":"Li Qiang, Ma Ming","doi":"10.1109/ICIC.2009.82","DOIUrl":"https://doi.org/10.1109/ICIC.2009.82","url":null,"abstract":"Based on the features and requirements of web-education, this paper designs a teaching evaluation model for the deaf on web-based distance education. This paper is aimed to introduce the model, and introduces it on the aspects of web-teaching’ features and evaluation process.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"4 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113932409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fabric Weave Design Based on Cellular Automata Theory 基于元胞自动机理论的织物组织设计
Liu Suyi, Wan Qian, Zhang Heng
{"title":"Fabric Weave Design Based on Cellular Automata Theory","authors":"Liu Suyi, Wan Qian, Zhang Heng","doi":"10.1109/IUCE.2009.88","DOIUrl":"https://doi.org/10.1109/IUCE.2009.88","url":null,"abstract":"The article adopt cellular automata theory to avoid the unpredictable in process of pattern generated with the constraint of cellular automata rule, it makes the cellular automata iterate into ideal patterns. With the computer simulation we can get the three basic fabric weave patterns which are plain weave, twill, satin. Compared with the traditional fabric weave design, the fabric weave generation method is a new concept and algorithm.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120990969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Anti-Spam Method TOMO Based on Challenge-Response Technology 一种改进的基于挑战响应技术的反垃圾邮件TOMO方法
Peng Li, Miao Liu, Fan Zhang, Chunming Tang
{"title":"An Improved Anti-Spam Method TOMO Based on Challenge-Response Technology","authors":"Peng Li, Miao Liu, Fan Zhang, Chunming Tang","doi":"10.1109/IUCE.2009.98","DOIUrl":"https://doi.org/10.1109/IUCE.2009.98","url":null,"abstract":"after an analysis of some critical limitations of current challenge-response based email anti-spam techniques, the paper describes a solution to the deadlock problem and a way to dramatically improve the speed of the challenge-response process. It involves generating and maintaining email lists of trusted senders, and a backward-compatible extension to the SMTP protocol. In the end, the paper describes a realization of the above techniques.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prediction of Protein Coding Regions by Support Vector Machine 基于支持向量机的蛋白质编码区预测
Guo Shuo, Yi-sheng Zhu
{"title":"Prediction of Protein Coding Regions by Support Vector Machine","authors":"Guo Shuo, Yi-sheng Zhu","doi":"10.1109/IUCE.2009.141","DOIUrl":"https://doi.org/10.1109/IUCE.2009.141","url":null,"abstract":"With the exponential growth of genomic sequences, there is an increasing demand to accurately identify protein coding regions from genomic sequences. Despite many progresses being made in the identification of protein coding regions by computational methods during recent years, the performances and efficiencies of the prediction methods still need to be improved. A novel method to predict the position of coding regions is proposed. First, a support vector machine is used as a classifier to recognize the first nucleotide of a codon in a coding region. Then, according to the difference of the time frequency characteristics of the output values of the classifier analyzed by Short Time Fourier Transform, the position of coding regions can be accurately determinate. The algorithm is not only can predict coding regions, but also can identify the first nucleotide of the codon in coding regions. This is very significant for accurate translation into a protein sequence. The simulation results show the proposed method is more effective for coding regions prediction than the existing coding region discovery tools.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127364456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Novel Data Mining Algorithm for Web-Based Learning Community 一种新的基于web的学习社区数据挖掘算法
Yi Jiang, Wei Huang, Qingling Yue
{"title":"A Novel Data Mining Algorithm for Web-Based Learning Community","authors":"Yi Jiang, Wei Huang, Qingling Yue","doi":"10.1109/IUCE.2009.135","DOIUrl":"https://doi.org/10.1109/IUCE.2009.135","url":null,"abstract":"Web-based learning community allow educators to study how students learn (descriptive studies) and which learning strategies are most effective (causal/predictive studies).Since web-based learning community are capable of collecting vast amounts of student profile data, data mining and knowledge discovery techniques can be applied to find interesting relationships between attributes of students, assessments, and the solution strategies adopted by students. In this paper, we propose a new coevolutionary algorithm for the discovery of interesting association rules within a web-based learning community. Three coevolutionary operators are designed and the mining algorithm is realized in this paper. According to experimentation, the algorithm has been found suitable for association rule mining of the web-based learning community.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Support Vector Machine to Capital Flow Risks Prediction 支持向量机在资本流动风险预测中的应用
Xiping Wang
{"title":"Application of Support Vector Machine to Capital Flow Risks Prediction","authors":"Xiping Wang","doi":"10.1109/IUCE.2009.49","DOIUrl":"https://doi.org/10.1109/IUCE.2009.49","url":null,"abstract":"Under the opening economic circumstances, forecasting the risks of capital flow has special significance. For effectively early warning the risks associated with capital flow, this study applies support vector machine (SVM) to the domain of capital flow in an attempt to suggest a new model with better explanatory power and stability. To serve this purpose, a grid-search technique using 5-fold cross-validation is used to find out the best parameter value of kernel function of SVM. In addition, to evaluate the prediction accuracy of SVM, this study compares its performance with that of three-layer fully connected back-propagation neural networks (BPNs). The experiment results show that SVM outperforms the BPNs.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123285045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Research and Implementation of the Full Text Endorsement and Traces Reservation Technology on B/S Mode 基于B/S模式的全文背书与痕迹保留技术的研究与实现
Zhu Ai-hong, He Hai-yan, Lu Guo
{"title":"The Research and Implementation of the Full Text Endorsement and Traces Reservation Technology on B/S Mode","authors":"Zhu Ai-hong, He Hai-yan, Lu Guo","doi":"10.1109/IUCE.2009.144","DOIUrl":"https://doi.org/10.1109/IUCE.2009.144","url":null,"abstract":"The realization of full text endorsement and traces reservation function of the body of documents are essential component of many Web-based OA application systems. This paper presents a new kind method of realizing the full text endorsement and traces reservation function in the integrated use of ASP.NET,ActiveX and WebDAV technologies. Users can directly annotate or audit the documents in IE browser. The key technologies involved and the steps to realize are elaborated.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"176 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TT-ERCR: A Flexible SNMP Management Method TT-ERCR:一种灵活的SNMP管理方法
Zeng Xi-yang, Cheng Chuanqing
{"title":"TT-ERCR: A Flexible SNMP Management Method","authors":"Zeng Xi-yang, Cheng Chuanqing","doi":"10.1109/IUCE.2009.143","DOIUrl":"https://doi.org/10.1109/IUCE.2009.143","url":null,"abstract":"SNMP is a application-layer management protocol based on TCP/IP. It uses UDP as transport-layer protocol and can manage the network device which supports agent process.SNMP is fit for network management frame of network device.This paper proposes a new network management method based on SNMP.This method adopts transparently transmitted private SNMP protocol to configuration system and query performance.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Quadratically Convergent Algorithm for Generalized Linear Complementarity Problem on Supply Chain Equilibrium Model 供应链均衡模型广义线性互补问题的二次收敛算法
Hongchun Sun
{"title":"A Quadratically Convergent Algorithm for Generalized Linear Complementarity Problem on Supply Chain Equilibrium Model","authors":"Hongchun Sun","doi":"10.1109/IUCE.2009.110","DOIUrl":"https://doi.org/10.1109/IUCE.2009.110","url":null,"abstract":"In this paper, we consider the generalized Linear complementarity problem on supply chain equilibrium model(GLCP). To solve the problem, we first establish the global error bound for the GLCP, and then propose a new type of solution method to solve the GLCP based on the error bound estimation. The global and quadratic rate of convergence for algorithm is established. These conclusions can be viewed as extensions of previously known results.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115562442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Realization of a Centralized Document Management Model Based on ASP.NET 基于ASP的集中式文档管理模型的研究与实现。网
Zhu Ai-hong, He Hai-yan
{"title":"Research and Realization of a Centralized Document Management Model Based on ASP.NET","authors":"Zhu Ai-hong, He Hai-yan","doi":"10.1109/IUCE.2009.145","DOIUrl":"https://doi.org/10.1109/IUCE.2009.145","url":null,"abstract":"Centralized Document Management is a prevalent model used by electronic document processing system on B/S mode. The paper firstly analyzes disadvantages of general Centralized Document Management Systems, then brings forward a new Centralized Document Management Model by combing the advantage of relational database system and file system. The model adopts different storage modes according to the security classification of documents, and it could not only guarantee secret documents’ security but also advance the access efficiency of non-secret documents.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信