{"title":"Collaboration vs. Participation: The Role of Virtual Communities in a Web 2.0 World","authors":"L. Colazzo, A. Molinari, N. Villa","doi":"10.1109/ICETC.2009.26","DOIUrl":"https://doi.org/10.1109/ICETC.2009.26","url":null,"abstract":"The paper presents a discussion on different ways of interaction and collaboration among users of web applications oriented to learning. We discuss whether the recent \"social\" applications, such as Facebook or MySpace, follow a truly \"collaborative\" approach, very common after of the advent of Web 2.0, or a more simply \"participatory\" one. We will argue that virtual communities, if specifically adapted to life-long learning settings and not generalized to social networks, are more suitable for educational purposes, thus allowing a better use of social network tools like blogs, wikis etc.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121027761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionA Study on Holonic Control Architecture for Intelligent Car","authors":"Chao Yan, Wu Liqun","doi":"10.1109/ICETC.2009.52","DOIUrl":"https://doi.org/10.1109/ICETC.2009.52","url":null,"abstract":"Traffic incident influences on the security of people in the popularity of navigation. It is urgently necessary to develop intelligent vehicles by using new technologies and advanced methodologies. In this paper, a distributed multilevel holonic control architecture for intelligent car is presented by introducing the concept of holon, and the function of every holon level is analyzed. The cooperative model is established to study cooperation mechanisms among different holon level.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precautions in Team Leader's Selection: Impact on Business Success","authors":"I. Naqvi, K. Rehman, Babar Zaheer Butt","doi":"10.1109/ICETC.2009.44","DOIUrl":"https://doi.org/10.1109/ICETC.2009.44","url":null,"abstract":"Every business organization targets success in terms of minimum cost, maximum profit, and rich reputation etc. For achieving success in all these dimensions various factors are involved and one of them is selection and formation of team of right persons especially for senior management positions. Investigation revealed that many IT software houses collapsed in Pakistan due to inappropriate selection of the human resources at senior cadres of the management. The study considered personality type assessment of the candidate for senior management position as independent variable and effective strategic planning for business as dependent variable. Using random sampling the study selected a sample of 104 IT/Telecom organizations. The study used a self administered questionnaire for data collection. For analysis of data the study employed descriptive statistics, Pearson’s correlations and Partial Least Square (PLS) Regression using SPSS and Smart PLS software respectively. The results indicated that 50% of the IT organizations collapsed for inappropriate selection of senior managers. The study contributed a structured approach for making selection of the right person effective especially for leader’s selection.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Computer-Assisted Assessment and Diagnosis System for Arts Students-Oriented Computer Education","authors":"XiaoMing Cao, Xiangrui Wang","doi":"10.1109/ICETC.2009.53","DOIUrl":"https://doi.org/10.1109/ICETC.2009.53","url":null,"abstract":"Arts student -oriented computer education for the majority of colleges and universities, is a difficult task. By analyzing the characteristic of the arts students -oriented computer education, a new train of thought that using a computer-assisted assessment and diagnosis system (CAAD) as the learning environment for arts students in order to promote learning with automatic evaluation and supplement classroom teaching based on the topic of training has been proposed. Focusing on the system design, the paper detailed the system architecture design and features modular design and system security as well as confidentiality of that mechanism.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122005345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noise Reduction of Video Sequences Using Detection Method","authors":"Liangting Ma, Weizhen Sun, Guiquan Xi","doi":"10.1109/ICETC.2009.38","DOIUrl":"https://doi.org/10.1109/ICETC.2009.38","url":null,"abstract":"A noise reduction method of video sequences using moving and noise detection has been proposed in this paper. The proposed filtering method firstly divides pixels into stationary and large moving deviation. Afterwards, by a further detection, we divide the pixels of large moving deviation into noise causing and moving causing so as to use different filtering algorithm to obtain the desired effect. Experimental results have shown that, compared with the conventional adaptive temporal video denoising method, the proposed method protects the edge and detail part in the image more effective, and also overcomes the trailing phenomenon well. Meanwhile, the proposed method has a small computation load, so can be realized and combined with other spatial noise reduction algorithm easily. In a way, it has a certain application value.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discussion of Ability Cultivation of Computational Thinking in Course Teaching","authors":"Zhenrong Deng, Wenming Huang, Rongsheng Dong","doi":"10.1109/ICETC.2009.16","DOIUrl":"https://doi.org/10.1109/ICETC.2009.16","url":null,"abstract":"Computational thinking is taken for the fundamental skills for everyone, not just computer scientist, to learn and use. It remains to be explored in many aspects how to understand the essence of computational thinking and how cultivate the computational thinking ability of students. In the view of course teaching of computer science, this paper discusses the perception of the essence of computational thinking and presents a method for the cultivation of the computational thinking ability by using courses as carrier, and a case study of the course Data Structures and Algorithms.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128602953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using IFS as an Encryption Method","authors":"N. Al-Saidi, Muhammad Sd. Rushdan","doi":"10.1109/ICETC.2009.80","DOIUrl":"https://doi.org/10.1109/ICETC.2009.80","url":null,"abstract":"Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular “fractal –based” algorithms for both representation as well as compression of computer images have involved some implementation of the method of Iterated Function Systems (IFS) on complete metric spaces. Fractals are generated by simple, recursive calculations. This paper proposes a novel encryption method based on the theory of iterated function system (IFS). This approach exploits the main feature of fractals generated by IFS, so that any individual that happens to find the transformed message will not be able to understand it without the correct method that will reverse the transformation, usually through some contact/ agreement with the original.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Language Interpreter Based on Reusable Components","authors":"Genyuan Du, F. Miao","doi":"10.1109/ICETC.2009.15","DOIUrl":"https://doi.org/10.1109/ICETC.2009.15","url":null,"abstract":"ActiveX Scripting technology to be possible to make software easy to expand and improve its reusability, its main purpose is to make the applications controlled by a variety of scripting language and not be modified. The adoption of this technology can increase the efficiency of the development of new program and improve the quality of the program. The structure of Active Scripting technology as well as the principle of the script language interpreter was analyzed in this article. A script language interpreter was realized through the employment of reusable components. The result of the experiment shows that the interpreter works with enough stability and reliability.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Group Learning Based on Game Theory","authors":"Furong Liu, Baocong Jiao","doi":"10.1109/ICETC.2009.19","DOIUrl":"https://doi.org/10.1109/ICETC.2009.19","url":null,"abstract":"The group learning is a new way of learning which the new curriculum promote for the purpose of cultivating students' sense of teamwork. At present, group learning has been more and more popular among teachers in its' specific form. However, it is not difficult to find that the actuality of group learning were not satisfactory. In this paper, I will analyze the reasons for the status from the point of game theory, and then I propose some strategies for game analyzing.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125706492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Gui Simulation Program Designed for Teaching of Underground Power Cables","authors":"Yunus Biçen, F. Aras","doi":"10.1109/ICETC.2009.65","DOIUrl":"https://doi.org/10.1109/ICETC.2009.65","url":null,"abstract":"This paper presents a novel computer simulation program designed to aid teaching process in course of underground power cables for engineering students. The calculation of power cable ratings uses several different formulas and long analytical processes based on IEC 60287 and IEC 60853 standards. Therefore it is difficult to examine different variations such as power cable properties, installations and operation conditions, during the restrictive lesson time. For these reasons, a program has been developed to use for teaching process of the power cable course. The program allows the users to effectively learn the rating of underground power cables under different operation conditions with illustrative figures. The program details are presented and explained in this paper.","PeriodicalId":377688,"journal":{"name":"2009 International Conference on Education Technology and Computer","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129839603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}