This paper describes the implementation of an educational Massively Multiplayer Online Role-Playing Game (MMORPG), named World of Wisdom (WoW). WoW is designed under the context of game design theory and game features...
详细信息
This paper describes the implementation of an educational Massively Multiplayer Online Role-Playing Game (MMORPG), named World of Wisdom (WoW). WoW is designed under the context of game design theory and game features extracted from surveys of popular MMORPGs. It is an open educational platform where students can “play exercises” instead doing them in the traditional paper way. Further, it provides an editor for teachers to create new game plots and content without the need of programming. As an aid for lectures, WoW can motivate the students to do the exercises more thoroughly. Finally, the paper presents both positive and negative experiences from the design and implementation of the game. We find that there are various theories that can benefit the design of educational MMORPGs. However, the key problem is how to choose and apply relevant theory to support the design, our experiences in the paper are examples that explore and explain this problem.
API interception means a particular way of interrupting API calls and altering the original API execution to the code supplied by the user. This paper introduces how to realize process concealment by Intercepting API,...
详细信息
API interception means a particular way of interrupting API calls and altering the original API execution to the code supplied by the user. This paper introduces how to realize process concealment by Intercepting API, and discusses several kinds of implemental ways of DLL injection and API interception with emphasis, which are the central techniques of the API Hook, then provides the key code for process concealment in practice.
The IEEE 802.16 standard provides a scheme for creating multi-hop relay networks, which can be deployed as a high speed wide area wireless network at low cost. Although the standard defines signaling mechanisms in mes...
详细信息
Link spam refers to unfairly gaining a high ranking on search engines for a web page by means of trickily manipulating the link graph to confuse the hyper-link structure analysis algorithms. It seriously affects the q...
详细信息
Estimation of prostate location and volume is essential in determining a dose plan for ultrasound-guided brachytherapy, a common prostate cancer treatment. However, manual segmentation of the prostate area is difficul...
详细信息
This paper proposes a teaching structure “with students as subject and teacher as leader” based on a popular open-source course management system(CMS)-MOODLE, and discusses the implementation of the pattern designed...
详细信息
This paper proposes a teaching structure “with students as subject and teacher as leader” based on a popular open-source course management system(CMS)-MOODLE, and discusses the implementation of the pattern designed for classroom assistant teaching, research-oriented learning, autonomous learning, and group collaboration learning.
Gene regulation is controlled by transcription factor proteins which themselves are encoded as genes. This gives a network of interacting genes which control the functioning of a cell. With the advent of genome wide e...
详细信息
Gene regulation is controlled by transcription factor proteins which themselves are encoded as genes. This gives a network of interacting genes which control the functioning of a cell. With the advent of genome wide expression measurements the targets of given transcription factor have been sought through techniques such as clustering. In this paper we consider the harder problem of finding a gene's regulator instead of its targets. We use a model-based differential equation approach combined with a Gaussian process prior distribution for unobserved continuous-time regulator expression profile. Candidate regulators can then be ranked according to model likelihood. This idea, that we refer to as ranked regulator prediction (RRP), is then applied to finding the regulators of Gata3, an important developmental transcription factor, in the development of ear hair cells.
Real-time detection is one of the most important issues in intrusion detection. When the network data is becoming huge and is of high dimensionality, real-time detection with high detection accuracy and low false alar...
详细信息
Real-time detection is one of the most important issues in intrusion detection. When the network data is becoming huge and is of high dimensionality, real-time detection with high detection accuracy and low false alarm rate is challenging for previous methods. In order to handle this problem appropriately, we propose a novel anomaly detection model based on neighborhood preserving and branch and bound tree, named as ADM-NP. In this method, high-dimensional network data is mapped to a lower dimension space, reducing the complexity of computation in anomaly detection algorithm. Besides, since branch and bound tree is adopted, the KNN searching in anomaly detection algorithm becomes faster. Empirical studies based on KDD CUP 99 data set demonstrate the effectiveness of our method.
Business process modeling plays a major role in industry and academia. As a result, current research focuses on its assistance. Business process modeling is a time-consuming task and its effort is hard to predict, and...
详细信息
ISBN:
(纸本)9783885792710
Business process modeling plays a major role in industry and academia. As a result, current research focuses on its assistance. Business process modeling is a time-consuming task and its effort is hard to predict, and a plethora of concepts exists for facilitating and improving it. A concept that has not been studied yet is prediction of the remaining effort of business process modeling. In this paper we tackle this issue and suggest a solution for measuring the progress of business process modeling. Our solution is based on the assumption that a reference model is given representing a best practice of a business process. In addition, a set of process variants exists for that reference model. Under these conditions, we propose two measurement approaches that base on the longest common subsequence algorithm and determine the effort required to complete business process modeling. The main benefit of the approaches is the possibility of effectively structuring and monitoring the development of business process modeling projects.
In the fall of 2009, a college of engineering and applied science at a public, Rocky Mountain region university embarked on a new inclusive excellence initiative called Broadening Opportunity through Leadership & ...
详细信息
In the fall of 2009, a college of engineering and applied science at a public, Rocky Mountain region university embarked on a new inclusive excellence initiative called Broadening Opportunity through Leadership & Diversity (BOLD). The BOLD Center is a new K-16 organizational structure to increase the performance, representation and retention through graduation of students who are underrepresented in engineering, including women, students of color, low income and first generation college attendees. A BOLD Center focus of concern is the declining retention rate of women that has dipped below that of men recently in our College. A survey consisting of 41 questions was distributed to all undergraduate engineering women in the college that incorporates scales from the Assessing Women in Engineering (AWE) assessment and from the Academic Pathways of People Learning Engineering Survey (APPLES). Five research questions were posed in the survey design: • Do women express a loss of interest during their program? • Is there a chilly climate for women in the college? • Do women?s self-efficacy levels change during the program? • Do academic performance levels play a role in women?s retention in engineering? • Do women have an adequate support structure in the college? The survey generated 116 responses from 2 solicitations, with women students represented from every major across all four undergraduate years. An unintended outcome was that the sample largely consists of women with high grade point averages. Thus, this paper offers insight on top performing women?s self-efficacy and their views on the college climate, the benefits from various support systems - advising, mentoring, social and financial - and the existing programming and initiatives that can play a role in their achievements. The results indicate that women students are interested and efficacious with respect to obtaining an engineering degree, and that the college climate is, on average, warm and accepting. Howev
暂无评论