Applying Keyword Map Based Learner Profile to a Recommender System for Group Learning Support

Applying Keyword Map Based Learner Profile to a Recommender System for Group Learning Support

2010 Second International Workshop on Education Technology and Computer Science (ETCS 2010) Wuhan, China 6 - 7 March 2010 Volume 1 Pages 1 – 839 IEEE Catalog Number: CFP1008G-PRT ISBN: 978-1-4244-6388-6 1 / 3 2010 Second International Workshop on Education Technology and Computer Science ETCS 2010 Table of Contents Volume - 1 Message from the Workshop Chairs - Volume 1...........................................................................xix Organizing Committee - Volume 1..........................................................................................................xx Committee Members - Volume 1.............................................................................................................xxi Reviewers - Volume 1....................................................................................................................................xxii Second International Workshop on Education Technology and Computer Science Applying Keyword Map Based Learner Profile to a Recommender System for Group Learning Support .......................................................................................................................................3 Xin Wan, Qimanguli Jamaliding, Fumihiko Anma, and Toshio Okamoto Persian Accents Identification Using an Adaptive Neural Network ....................................................................7 Azam Rabiee and Saeed Setayeshi Text Watermarking Using Combined Image-plus-Text Watermark .................................................................11 Zunera Jalil and Anwar M. Mirza Analysis and Utilizing of the Error Models in Network Education with NS3 .................................................15 Anbao Wang and Zhenwen Liu Double Chains Quantum Genetic Algorithm with Application in Training of Process Neural Networks .....................................................................................................................................19 Maojun Cao and Fuhua Shang A 3-layer Dynamic CAPTCHA Implementation ..................................................................................................23 JingSong Cui, WuZhou Zhang, Yang Peng, Yu Liang, Bang Xiao, JingTing Mei, Da Zhang, and Xia Wang v Numerical Simulation for the Rock Slope Angle Design in Civil Engineering ...............................................27 Jian-qin Fang, Cai-kui Lin, and Hong-jun Yang Approaches in Evaluations of Internet Topology Modeling ...............................................................................31 Ye Xu and Zhuo Wang Data Mining of Ultraviolet Spectral Data Using a Partial Least Squares with Data Fusion ........................................................................................................................................................35 Ling Gao and Shouxin Ren Improved Multivariate Calibration Based on Least Square Support Vector Machines .....................................................................................................................................................................39 Shouxin Ren and Ling Gao Realization Technologies in a Virtual Endoscopy System ..................................................................................43 Peng Yang-jun, He Ming-xiang, Lu Xin-ming, and Shi Jiao-ying A New Noise-resistant Algorithm for Edge Detection ........................................................................................47 Xikui Sun and Genyun Sun A Multi-QoS Objective Optimization Routing for Hierarchical Satellite Networks .....................................................................................................................................................................51 Fei Long, Fuchun Sun, and Zhian Yang A QoS Routing Scheme Based on Ground Station for LEO Satellite Networks .............................................55 Zhian Yang, Fei Long, and Fuchun Sun A New Method to Compute Chinese Text Concept .............................................................................................59 Feng Yang, Luo Sen-Lin, Pan Li-Min, Liu Li-Li, and Chen Kai-Jiang An Algorithm for Identifying Useful Structure in Graphs Clustering ...............................................................63 Dongming Chen and Xiaowei Xu A Correlation Coefficient Based Affine Parameter Estimation Algorithm for Image Watermark Detection ..............................................................................................................................67 Xiaojun Tang, Qingxiu Du, and Shuwu Zhang Extraction of Human Body Skeleton Based on Silhouette Images ....................................................................71 Jianhao Ding, Yigang Wang, and Lingyun Yu Applying Wavelet Support Vector Machine to Analog Circuit Fault Diagnosis .............................................75 Zuo Lei, Hou Ligang, Zhang Wang, and Wu Wuchen Mixed-coding Differential Evolution Algorithm for Integer Programming .....................................................79 Changshou Deng, Bingyan Zhao, Anyuan Deng, and Changyong Liang Fusion of Multiple Features for Chinese Organization Names Recognition Based on SVM ...........................................................................................................................................................82 Feng Li-ping and Fu He-fang Neural Networks with Limited Precision Weights and Its Application in Embedded Systems ...............................................................................................................................................86 Bao Jian, Chen Yu, and Yu Jinshou Combinatorial Optimization Technology Application for the Risk Optimization of Crime Prevention System ............................................................................................................92 Guo Xi, Hu Ruimin, Peng Yongjun, Lv Haitao, and Bu Hao vi An Efficient Automated Trust Negotiation Framework Supporting Adaptive Policies ........................................................................................................................................................................96 Bailing Liu, Hongwei Lu, and Yizhu Zhao Improving Efficiency of Security Schemes in Automated Trust Negotiation ................................................100 Bailing Liu, Hongwei Lu, Yizhu Zhao, and Feng Ge A New Classifier for Multi-Class Problems Based on Negative Selection Algorithm ..................................................................................................................................................................105 Ye Lian and Xing Yong-kang The Automatic Recognition and Classification of Ground Objects in Hyperspectral Images Based on the Projection Pursuit Method ..................................................................109 Han Ling, Zhang Ruolan, and Zhang Li Motion Detection and Target Contour Extraction Based on Monitor System ...............................................113 Xiaoping Li, Tao Li, Feng Ling, and Jianqiang Xu A Routing Protocol for Large-scale Wireless Sensor Networks ......................................................................117 Zhongyu Cao, Wei Zhang, and Gang Lu Research on Color’s Effect on Learning Efficiency and Its Use in Multimedia Courseware ...............................................................................................................................................................121 Haitao Su and Xiaowei Ma Yaw Rate Control of Active Front Steering Based on Fuzzy-logic Controller ..............................................125 Qiang Li, Guobiao Shi, Yi Lin, and Jie Wei Tamper-proofing Software Watermarking Scheme Based on Constant Encoding ...................................................................................................................................................................129 Zhu Jian-qi, Wang Ai-min, and Liu Yan-heng A Lightweight Framework for Code Generation from B Formal Specification ............................................133 Xiaoli Liu and Rongqiang Fan Web Information Extraction Based on Hybrid Conditional Model .................................................................137 Rong Li, Chun-qin Pei, and Jia-heng Zheng A Low Hardware Cost 2D Vector Graphic Rendering Algorithm for Supersampling Antialiasing .............................................................................................................................141 Yong-Luo Shen, Sang-Woo Seo, Yuan Zhang, and Hyeong-Cheol Oh Justifying the Bell’s Mathematical Formulation .................................................................................................145 Zhengjun Cao and Lihua Liu A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms ..............................................................................................................................................................149 Haider Abbas, Christer Magnusson, Louise Yngström, and Ahmed Hemani A Simple Storage Mechanism for RSM by Using Container ...........................................................................154 Ting Zeng, Zhurong Zhou, Yan Tang, and Yuhui Qiu Practice of Environmental Education for Biodiversity Protection in the Mountains of Southwest China .......................................................................................................................158 Jinliang Wang, Xie Min, Miaoyuan Zhu, and Yingxia Gao vii A Markov Chain Model for the Trend of E-Learning .......................................................................................162

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    45 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us