{"title":"Research of performance evaluation of course design based on rough set theory","authors":"Hong Liu, Yinxiao Ma","doi":"10.1109/ICCSE.2009.5228398","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228398","url":null,"abstract":"The evaluation of course design performance is very important for universities to manage students' practical teaching performance effectively. Aim at such drawbacks of conventional evaluation methods as more dependence on teachers' experience and subjective estimation, difficult to evaluate accurately, the paper presented a performance evaluation method based on rough set theory. Where, firstly the principle of rough set theory is introduced, then a performance evaluation procedure based on reduction attributes is given, and applying the approach, a case is also given to realize the performance evaluation of data structure course design, whose result fits to practice. Such the result shows that the approach is practical and useful in the evaluation of students' course design performance.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"450 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Anquan, Gan Dengwen, Y. Qinghong, Wang Lan, Lin Yunqing
{"title":"Research and practice of the PBL model for data structure curriculum","authors":"Jie Anquan, Gan Dengwen, Y. Qinghong, Wang Lan, Lin Yunqing","doi":"10.1109/ICCSE.2009.5228320","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228320","url":null,"abstract":"Data Structure is the specialized core course for students majoring in Computer Science and Technology, which has considerable difficulty not only in learning but also in teaching. Project-based Learning(PBL) model is an important means for learning, it had been introduced to the curriculum in the past few years. We conducted Project-based Learning research and practice making full use of network platform, our course group has conducted in-depth research on the Project-based Learning theory and put it into teaching practice in Data Structure. The research shows, it acquires an obviously good effect in teaching practice. This paper describes the Project-based Learning theory, and presents the authors' actual achievement in research and practice of the PBL teaching model for Data Structure.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116188371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Making XML schema to support multilingual markup","authors":"Ning Li, Yingai Tian, Qi Liang","doi":"10.1109/ICCSE.2009.5228475","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228475","url":null,"abstract":"Understanding and exchanging XML documents with multilingual markups is a common requirement. This paper proposes a schema design method to support multilingual markup of XML based on two attributes introduced for every element to be transformed, i.e., locID and attrList. It ensures that all XML instances derived from the translated schema no matter what language used and how the name is translated can be well understood by the program developed for the original language after transformation. The transformation process is rather automatic, low cost and straightforward; also semantics of elements and attributes are precisely reserved. An example of email is illustrated to show the effect of the method.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on mobile agent resources search applied in P2P network","authors":"Wang Chunzhi, Hengfeng Liu, C. Hongwei, Luo Cong","doi":"10.1109/ICCSE.2009.5228435","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228435","url":null,"abstract":"It is an important prerequisite for sharing resources in p2p network to find and locate resources in an efficient and accurate way. In this paper, we study the p2p network resource locating technology, based on the analysis with current searching strategy's insufficiency, come up with a relatively superior solution applying mobile agent, and at the mean time analyses its advantages and offer the strategy for realizing it.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122174751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discussion about teaching styles of discerete mathematics","authors":"Jiangqin Wu, Lanfen Lin, Sanyuan Zhang, Yu Qian","doi":"10.1109/ICCSE.2009.5228333","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228333","url":null,"abstract":"In this paper, different types of quizzes in class, the active engagement of the students in the class and the transparency of the evaluation system are proposed to enhance the teaching performance of discrete mathematics course.From our experineces, these methods efficient and effective for students to learn actively.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflections on the practice of bilingual approach in teaching network security and management","authors":"Wenjuan Jiang, Zhaohui Lu, Shuqian He","doi":"10.1109/ICCSE.2009.5228310","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228310","url":null,"abstract":"Bilingual Teaching is one of the important measures to bring China's higher education in line with international practices. However, there are many issues to be studied and discussed in this new teaching approach. Based on the practice and experience of bilingual approach in teaching the course of Network Security and Management, this paper explored the necessity and significance of offering bilingual teaching to undergraduates majoring in computer science, and the specific ways to implement bilingual teaching. In the meanwhile, problems that exist in the bilingual teaching initiatives are analyzed and summarized.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image threshold segmentation method with 2-D histogram based on multi-resolution analysis","authors":"Shuqian He, J. Ni, Lihua Wu, H. Wei, Sixuan Zhao","doi":"10.1109/ICCSE.2009.5228131","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228131","url":null,"abstract":"This paper proposed an auto-adaptive threshold method of two-dimensional (2-D) histogram based on multi-resolution analysis (MRA), decreasing the calculation complexity of 2-D histogram whereas improving the searching precision of multi-resolution threshold method. Such method originates from the extraordinary segmentation effects achieved by 2-D histogram threshold segmentation method through the spatial correlation of gray level and the flexibility as well as efficiency of the threshold searching of multi-resolution threshold segmentation method. Experiments results demonstrated that such method can obtain segmentation results similar with the exhaustive 2-D histogram method, whereas the calculation complexity decreases exponentially with the increase of resolution level.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategy and simulation of trust cluster based key management protocol for ad hoc networks","authors":"Li Xu, Xiaoding Wang, Jinbo Shen","doi":"10.1109/ICCSE.2009.5228445","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228445","url":null,"abstract":"Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose a hybrid decentralized key management protocol using the NS3 (New Secret Sharing Scheme) algorithm for ad hoc networks, covering the aspects of key deployment, key refreshment and key establishment. Both theoretical analysis and simulations indicate that the proposed protocol has less complexity and stronger security than some current strategies.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of industrial Ethernet adapter based on Ethernet/IP","authors":"T. Liu, W. Tang, H. Jiang","doi":"10.1109/ICCSE.2009.5228400","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228400","url":null,"abstract":"Aiming at application of industrial network, this paper adopted ARM9 microprocessor to construct the hardware system of an industrial Ethernet adapter, developed I/O interface driver under Windows CE.NET operating system and completed the application software of the industrial Ethernet adapter based on EADK software platform. In addition, with the help of EIPScan, EDITT, PCU-ETHIO Ethernet/IP scanner, etc, a complete test was given to the communication adapter. Test results demonstrate that the industrial Ethernet adapter has not only good performance in stability, real-time property of data transmission but also bright prospects in application.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex cepstrum based single channel speech dereverberation","authors":"Shen Xizhong, M. Guang","doi":"10.1109/ICCSE.2009.5228535","DOIUrl":"https://doi.org/10.1109/ICCSE.2009.5228535","url":null,"abstract":"A new method of blind dereverberation of single channel is proposed to solve the existing problem about the study of speech signal. Firstly, segmentation of speech signal with variant length is proposed on the sampled speech signal to obtain relatively accurate estimation of the subsequent cepstrum, and the complex cepstrum is applied to the valid segments. Then, the pre-estimation of the room impulse response is obtained, and so is the inverse-filter solution. Finally, single channel blind deconvolution is used by taking the inverse-filter as the initial parameter of the algorithm. Simulations and experiments demonstrate its validity and robusty.","PeriodicalId":303484,"journal":{"name":"2009 4th International Conference on Computer Science & Education","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}