2010 Second International Workshop on Education Technology and Computer Science (ETCS 2010) Wuhan, China 6 - 7 March 2010 Volume 1 Pages 1 – 839 IEEE Catalog Number: CFP1008G-PRT ISBN: 978-1-4244-6388-6 1 / 3 2010 Second International Workshop on Education Technology and Computer Science ETCS 2010 Table of Contents Volume - 1 Message from the Workshop Chairs - Volume 1...........................................................................xix Organizing Committee - Volume 1..........................................................................................................xx Committee Members - Volume 1.............................................................................................................xxi Reviewers - Volume 1....................................................................................................................................xxii Second International Workshop on Education Technology and Computer Science Applying Keyword Map Based Learner Profile to a Recommender System for Group Learning Support .......................................................................................................................................3 Xin Wan, Qimanguli Jamaliding, Fumihiko Anma, and Toshio Okamoto Persian Accents Identification Using an Adaptive Neural Network ....................................................................7 Azam Rabiee and Saeed Setayeshi Text Watermarking Using Combined Image-plus-Text Watermark .................................................................11 Zunera Jalil and Anwar M. Mirza Analysis and Utilizing of the Error Models in Network Education with NS3 .................................................15 Anbao Wang and Zhenwen Liu Double Chains Quantum Genetic Algorithm with Application in Training of Process Neural Networks .....................................................................................................................................19 Maojun Cao and Fuhua Shang A 3-layer Dynamic CAPTCHA Implementation ..................................................................................................23 JingSong Cui, WuZhou Zhang, Yang Peng, Yu Liang, Bang Xiao, JingTing Mei, Da Zhang, and Xia Wang v Numerical Simulation for the Rock Slope Angle Design in Civil Engineering ...............................................27 Jian-qin Fang, Cai-kui Lin, and Hong-jun Yang Approaches in Evaluations of Internet Topology Modeling ...............................................................................31 Ye Xu and Zhuo Wang Data Mining of Ultraviolet Spectral Data Using a Partial Least Squares with Data Fusion ........................................................................................................................................................35 Ling Gao and Shouxin Ren Improved Multivariate Calibration Based on Least Square Support Vector Machines .....................................................................................................................................................................39 Shouxin Ren and Ling Gao Realization Technologies in a Virtual Endoscopy System ..................................................................................43 Peng Yang-jun, He Ming-xiang, Lu Xin-ming, and Shi Jiao-ying A New Noise-resistant Algorithm for Edge Detection ........................................................................................47 Xikui Sun and Genyun Sun A Multi-QoS Objective Optimization Routing for Hierarchical Satellite Networks .....................................................................................................................................................................51 Fei Long, Fuchun Sun, and Zhian Yang A QoS Routing Scheme Based on Ground Station for LEO Satellite Networks .............................................55 Zhian Yang, Fei Long, and Fuchun Sun A New Method to Compute Chinese Text Concept .............................................................................................59 Feng Yang, Luo Sen-Lin, Pan Li-Min, Liu Li-Li, and Chen Kai-Jiang An Algorithm for Identifying Useful Structure in Graphs Clustering ...............................................................63 Dongming Chen and Xiaowei Xu A Correlation Coefficient Based Affine Parameter Estimation Algorithm for Image Watermark Detection ..............................................................................................................................67 Xiaojun Tang, Qingxiu Du, and Shuwu Zhang Extraction of Human Body Skeleton Based on Silhouette Images ....................................................................71 Jianhao Ding, Yigang Wang, and Lingyun Yu Applying Wavelet Support Vector Machine to Analog Circuit Fault Diagnosis .............................................75 Zuo Lei, Hou Ligang, Zhang Wang, and Wu Wuchen Mixed-coding Differential Evolution Algorithm for Integer Programming .....................................................79 Changshou Deng, Bingyan Zhao, Anyuan Deng, and Changyong Liang Fusion of Multiple Features for Chinese Organization Names Recognition Based on SVM ...........................................................................................................................................................82 Feng Li-ping and Fu He-fang Neural Networks with Limited Precision Weights and Its Application in Embedded Systems ...............................................................................................................................................86 Bao Jian, Chen Yu, and Yu Jinshou Combinatorial Optimization Technology Application for the Risk Optimization of Crime Prevention System ............................................................................................................92 Guo Xi, Hu Ruimin, Peng Yongjun, Lv Haitao, and Bu Hao vi An Efficient Automated Trust Negotiation Framework Supporting Adaptive Policies ........................................................................................................................................................................96 Bailing Liu, Hongwei Lu, and Yizhu Zhao Improving Efficiency of Security Schemes in Automated Trust Negotiation ................................................100 Bailing Liu, Hongwei Lu, Yizhu Zhao, and Feng Ge A New Classifier for Multi-Class Problems Based on Negative Selection Algorithm ..................................................................................................................................................................105 Ye Lian and Xing Yong-kang The Automatic Recognition and Classification of Ground Objects in Hyperspectral Images Based on the Projection Pursuit Method ..................................................................109 Han Ling, Zhang Ruolan, and Zhang Li Motion Detection and Target Contour Extraction Based on Monitor System ...............................................113 Xiaoping Li, Tao Li, Feng Ling, and Jianqiang Xu A Routing Protocol for Large-scale Wireless Sensor Networks ......................................................................117 Zhongyu Cao, Wei Zhang, and Gang Lu Research on Color’s Effect on Learning Efficiency and Its Use in Multimedia Courseware ...............................................................................................................................................................121 Haitao Su and Xiaowei Ma Yaw Rate Control of Active Front Steering Based on Fuzzy-logic Controller ..............................................125 Qiang Li, Guobiao Shi, Yi Lin, and Jie Wei Tamper-proofing Software Watermarking Scheme Based on Constant Encoding ...................................................................................................................................................................129 Zhu Jian-qi, Wang Ai-min, and Liu Yan-heng A Lightweight Framework for Code Generation from B Formal Specification ............................................133 Xiaoli Liu and Rongqiang Fan Web Information Extraction Based on Hybrid Conditional Model .................................................................137 Rong Li, Chun-qin Pei, and Jia-heng Zheng A Low Hardware Cost 2D Vector Graphic Rendering Algorithm for Supersampling Antialiasing .............................................................................................................................141 Yong-Luo Shen, Sang-Woo Seo, Yuan Zhang, and Hyeong-Cheol Oh Justifying the Bell’s Mathematical Formulation .................................................................................................145 Zhengjun Cao and Lihua Liu A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms ..............................................................................................................................................................149 Haider Abbas, Christer Magnusson, Louise Yngström, and Ahmed Hemani A Simple Storage Mechanism for RSM by Using Container ...........................................................................154 Ting Zeng, Zhurong Zhou, Yan Tang, and Yuhui Qiu Practice of Environmental Education for Biodiversity Protection in the Mountains of Southwest China .......................................................................................................................158 Jinliang Wang, Xie Min, Miaoyuan Zhu, and Yingxia Gao vii A Markov Chain Model for the Trend of E-Learning .......................................................................................162
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages45 Page
-
File Size-