{"title":"The development of a 3D interactive cartoon story for Grimm's Fairy Tales","authors":"Qiong Liu, Zhen Liu, Yuan Hong","doi":"10.1109/ICAIE.2010.5641422","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641422","url":null,"abstract":"Web3D based interactive story animations are popular. Learning knowledge by interactive cartoon animations on Internet is becoming a new manner for children education. Computer animation is playing a very important role in culture education. Most of the current cartoon animations for children education are not interactive, developments of three-dimensional e-learning software for children is a meaningful topic. A Web3d based story animation is set up in Virtools, the story is selected from Grimm' s Fairy Tales, in the demo system, users can explore the whole vivid virtual world, the interactive story can add interests for children users.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the small & middle enterprises' internal accounting control","authors":"L. Tang, Tao Sun","doi":"10.1109/ICAIE.2010.5641444","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641444","url":null,"abstract":"The development of small & middle enterprises has become more and more important in Chinese economy. But the small & middle enterprises' internal accounting control are not perfect. The issues concerning the internal accounting control of the small & middle enterprises have attracted more and more attentions. In this paper, the author provided some suggestions on it by analyzing the key problems in the small & middle enterprises' internal accounting control.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the crude oil shipping import security system evaluation","authors":"Zhang Hanyu, Pan Changhong, Fan Houming","doi":"10.1109/ICAIE.2010.5641486","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641486","url":null,"abstract":"With the development of China's economy, the nation's crude oil production is far from meeting the demand now. Therefore, China requires a large amount of crude oil imported from abroad to meet the domestic consumption demand. Except for small part oil importing from Russia, Kazakhstan and other countries through the pipeline and railway, most of the crude oil is imported from abroad through tankers. Thus the shipping security has become an issue need to be solved urgently in crude oil import in China. This paper analyzed the security system on the basis of the current status and constructed shipping security evaluation index system of China's crude oil imports, then we evaluated the shipping security of China's crude oil imports from 2005 to 2009 using the method of fuzzy comprehensive evaluation.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the application of instructional tacit resources platform in teaching","authors":"D. Wei, L. Qiu","doi":"10.1109/ICAIE.2010.5641110","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641110","url":null,"abstract":"This paper analyses the problems in teaching, and based on existing instructional tacit resources platform, it further analyses the application and effect of the platform's supplementary teaching in the process of the course in University: imaging optic and color science.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131273361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video copy detection based on temporal features of key frames","authors":"Zhijie Zhang, Ruijie Zhang, Chongxiao Cao","doi":"10.1109/ICAIE.2010.5641089","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641089","url":null,"abstract":"In this paper, an effective and efficient content-based video copy detection method is proposed. This method is based on temporal features of key frames. Firstly, each video is divided into shots, and each shot is represented by its key frame. Secondly, each key frame is divided into several sub-blocks, and variations of corresponding sub-blocks along key frame series are extracted as video fingerprint. Finally, fingerprints of query video and target video are compared to determine whether they are copies. Experimental results show that the proposed method is promising.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge transformation in teaching process and its optimization based on SECI model","authors":"Cheng-yu Lu, Zhi-ping Lu, Wen-fang Liu","doi":"10.1109/ICAIE.2010.5641425","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641425","url":null,"abstract":"SECI model has shown that tacit knowledge and explicit knowledge can be transformed into each other. Based on SECI model, this paper analyses the way of transformation of knowledge and summarizes the teaching process in colleges and universities firstly, and then builds up a teaching process model secondly. Thirdly, the process of knowledge transformation in teaching process is analyzed in this paper in detail. Finally, based on the analysed results from SECI model, this paper proposes five aspects contents of optimization and innovation for teaching process in colleges and universities.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"80 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133719672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on the relationship between reputation effect and the optimal contract of library e-literature procurement","authors":"Xin Zhang","doi":"10.1109/ICAIE.2010.5641046","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641046","url":null,"abstract":"This paper discusses the relationship between reputation and the optimal contract of library e-literature procurement. First, based on the principal-agent theory, a principal-agent model between a library and an e-literature provider is established. Second, we take hidden incentives of reputation as a constraint for the utility function of e-literature provider. With the study on the relationship between reputation effect and the optimal contract of library e-literature procurement, we find that reputation effect is a factor of the utility function of e-literature provider. This paper conludes that the labrary, in designing compensation contract of e-literature procurement, can use the reputation effect of e-literature provider to reduce their appropriate commission coefficients, and hence increase the expected utility of library.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131809788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering compatible objects by point neighborhood","authors":"Renxia Wan, Lixin Wang, Zijun Hao","doi":"10.1109/ICAIE.2010.5641428","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641428","url":null,"abstract":"In some cases, clustering objects into several compatible clusters is more rational than traditional clustering methods do. In this paper, we propose a new compatible clustering algorithm based on CompClustering[8], it adopts point neighborhood technique to replace the iterative mechanism of the latter. Experiments show that the proposed algorithm can get some consistent clustering results, and theory analysis also demonstrates that the proposed algorithm has lower computation consumption than CompClustering does.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Based on the Delphi method of deep excavation safety risk analysis","authors":"Yongjing Li, Chuqiu Wang","doi":"10.1109/ICAIE.2010.5641503","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641503","url":null,"abstract":"To prepare the construction and the construction of underground project risk assessment is necessary. The choice of evaluation theories the correctness of the evaluation result has an important influence. The paper briefly introduces the basic ideas of Delphi method. It focuses on the application of Delphi method for deep excavation engineering risk assessment procedure and standard. The analysis results show the Delphi method applied in underground engineering feasibility of risk analysis, scientific and reasonable.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy theory and AHP applied to urban rail transit operation opinion","authors":"Li Meng","doi":"10.1109/ICAIE.2010.5641083","DOIUrl":"https://doi.org/10.1109/ICAIE.2010.5641083","url":null,"abstract":"Increasingly, urban rail transit has become the focus of Social Economic Development. This paper sets up an analysis model of urban rail transit arrangement based on the application of Delphi and Analytical Hierarchy Process and analyzes the shortcomings of analytic hierarchy process. Furthermore, this paper proposes a design of a more comprehensive and more scientific evaluation index system of urban rail transit performance assessment. The proposed system calculates every index weight using the weighting method—G1, which is based on differential principle; it appraises comprehensive performance using fuzzy comprehensive evaluation method. Verification of the proposed system was done by conducting an experiment using the Shanghai rail transit systems to measure its performance status. Results provide the theoretical foundation for development and correction of Shanghai urban rail transit system.","PeriodicalId":216006,"journal":{"name":"2010 International Conference on Artificial Intelligence and Education (ICAIE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115226965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}