Recently, Internet use has increased rapidly especially in Asia, and the stock of IPv4 address has been exhausted. Fundamental solution for IPv4 address depletion is to migrate IPv6. However, since IPv6 is not compati...
详细信息
The proceedings contain 137 papers. The topics discussed include: learning environment for organizations it management supported by a simulation game;positive effects of reflective eportfolio on overseas exchange lear...
ISBN:
(纸本)9789898425508
The proceedings contain 137 papers. The topics discussed include: learning environment for organizations it management supported by a simulation game;positive effects of reflective eportfolio on overseas exchange learning experience;using learning tracking data to support students' self-monitoring;image capture for concrete programming - building schemata for problem solving;matrix and tensor factorization for predicting student performance;automatized memory techniques for vocabulary acquisition in a second language;a distributed virtual computer security lab;computer-aided self-assessment and independent learning in higher education;a research-based learning approach for undergraduate students - the internship program in research and innovation model;flexibility on learning process;toward a comprehensive quality assurance framework for continuing education in universities;and social mechanisms to motivate learning with remote experiments - design choices to foster online peer-based learning.
Widget is an increasingly popular technology and can be designed to perform various tasks. Easy to develop, easy to deploy, personalized, interactive, and less consumption of flow of mobile widget make it ideal for mo...
详细信息
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less *** the past few years different researchers have proposed differ...
详细信息
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less *** the past few years different researchers have proposed different solutions for providing security to *** most of the cases however,the solution is targeting a particular attack or multiple attacks but fails to find the root cause of *** this paper we use system level security for deploying the overall security in *** system level security is the security at node level as we believe that if nodes behave properly and in a coordinated fashion,the insecurity level will go drastically *** simulation results gives the advantage of using this approach
Integer factorization is an interesting but a hard problem and stays at the core of many security mechanisms. Conventional approaches to factor big integer numbers often require powerful computers and a great effort i...
详细信息
Cloud computing is a promising IT paradigm which enables the Internet39;s evolution into a global market of collaborating services. Cloud computing semantic interoperability plays a key role in making this a reality...
详细信息
The present paper presented the requirements of a digital human model used in the research of human factors in flight deck design and the methods to assess the workload, and established one model to evaluate the crew ...
详细信息
ISBN:
(纸本)9783642217982;9783642217999
The present paper presented the requirements of a digital human model used in the research of human factors in flight deck design and the methods to assess the workload, and established one model to evaluate the crew workload based on certain task.
The objective of this study is to explore the critical success factors for collaborative research and development (R&D) in a large scale construction project in China. Observations were mainly used to collect data...
详细信息
Web usage mining(WUM)is a type of web mining, which exploits data mining techniques to extract valuable information from navigation behavior of World Wide Web *** data should be preprocessed to improve the efficiency ...
详细信息
Web usage mining(WUM)is a type of web mining, which exploits data mining techniques to extract valuable information from navigation behavior of World Wide Web *** data should be preprocessed to improve the efficiency and ease of the mining *** it is important to define before applying data mining techniques to discover user access patterns from web *** main task of data preprocessing is to prune noisy and irrelevant data,and to reduce data volume for the pattern discovery *** paper mainly focus on data preprocessing stage of the first phase of web usage mining with activities like field extraction and data cleaning *** extraction algorithm performs the process of separating fields from the single line of the log *** cleaning algorithm eliminates inconsistent or unnecessary items in the analyzed data.
Removing shadows in color images is an important research problem in computer vision. In this paper, we propose a novel shadow removal approach, which effectively removes shadows from textured surfaces, yielding high ...
详细信息
暂无评论