Catálogo de publicaciones - libros
Computational Science and Its Applications: ICCSA 2005: International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV
Osvaldo Gervasi ; Marina L. Gavrilova ; Vipin Kumar ; Antonio Laganá ; Heow Pueh Lee ; Youngsong Mun ; David Taniar ; Chih Jeng Kenneth Tan (eds.)
En conferencia: 5º International Conference on Computational Science and Its Applications (ICCSA) . Singapore, Singapore . May 9, 2005 - May 12, 2005
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2005 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-25863-6
ISBN electrónico
978-3-540-32309-9
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2005
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2005
Cobertura temática
Tabla de contenidos
doi: 10.1007/11424925_1
Exploring Constructivist Learning Theory and Course Visualization on Computer Graphics
Yiming Zhao; Mingmin Zhang; Shu Wang; Yefang Chen
Constructivist learning theory has shown its advantages on learning system by improving students’ interests and ability. In this paper, we introduce some research works of constructivist learning theory and some successful methods from ACM/IEEE-CS CC2001 course. Application for GV (Graphics and Visual Computing) shows the power that integrating constructivist view of learning with the real learning environment. Based on theory, we analyze visualization methods of Computer Graphics course material, represent a new four-lay division of GV curriculum. And we introduce scaffolding learning method, which helps students improve knowledge exploring ability. CVCS1.1 and GraphVCF1.0 are two efficient virtual platforms used in our virtual learning process. Experiments show that constructivist view of learning and its application in GV bring more efficiency and convenience to build a virtual learning environment.
- Information and Communication Technology (ICT) Education Workshop | Pp. 1-9
doi: 10.1007/11424925_2
A Program Plagiarism Evaluation System
Young-Chul Kim; Jaeyoung Choi
In this paper, we introduce an evaluation system for identifying program similarity by comparing syntax-trees for the given programs. By using syntax-trees, this system is capable of distinguishing plagiarism in spite of changes in program styles such as indent, white space and comments. It can also recognize plagiarism patterns resulting from changes in program structure such as statement exchanges, code block and function. Syntax-trees are created after program parsing, so they have the advantage of performing syntax and semantic analysis automatically. We also introduce an evaluation algorithm for program similarity and a grouping algorithm for the sake of reducing the count of comparisons. The experiment and estimation proves that a grouping algorithm can reduce a lot of counts of comparison.
- Information and Communication Technology (ICT) Education Workshop | Pp. 10-19
doi: 10.1007/11424925_3
Integrated Development Environment for Digital Image Computing and Configuration Management
Jeongheon Lee; YoungTak Cho; Hoon Heo; Oksam Chae
In this paper, we present a system referred to as “Hello-Vision.” Hello-Vision is a software development environment that can be used in conjunction with research and application development in the area of image processing. It is an integrated environment that supports reusable image processing algorithm developments, systematic management of algorithms and related information. Hello-Vision’s function is to simplify image processing applications using the algorithms and to provide an ideal environment for the education of practical image processing engineers. Hello-Vision adopts a true object-oriented approach supporting well-separated data classes similar to IUE (Image Understanding Environment) classes. This process allows algorithm to be written by their functions without user interface programming by separating the interface layer from data processing functions. The user-defined functions are easily registered in the online algorithm management systems and treated as a system command. Hello-Vision is equipped with a visual programming environment where a user can easily create image- processing applications by manipulating visual command icons and user-defined function icons that are created automatically when they are registered. Hello-Vision also provides an ideal environment where instructors can register their lecture materials for image processing theory, which allows hands-on experimentation with Hello-Vision through user interaction.
- Information and Communication Technology (ICT) Education Workshop | Pp. 20-29
doi: 10.1007/11424925_6
Design and Implementation of a Web-Based Information Communication Ethics Education System for the Gifted Students in Computer
Woochun Jun; Sung-Keun Cho; Byeong Heui Kwak
While current school education on computers and communication for the gifted students has mainly focused on knowledge and skills on computer, ethical issues on computer knowledge and technologies have not been dealt with sufficiently. In this paper, we introduce a Web-based information communication ethics education system for the gifted elementary school students in computer. The proposed system has the following characteristics: First, our system provides comprehensive areas of information communication ethics issues for the gifted elementary school students in computer. Second, for the sake of active participation and arousing interests, avatars are used to explain contents and guide students with voice message. Third, for each subject, there are three steps, and to follow so that students can learn ethics by discussion rather than learning by heart. Fourth, for encouraging active communication between a teacher and students, various tools are supported. Finally, our system supports online survey or vote to check students’ changes in information communication ethics.
- Information and Communication Technology (ICT) Education Workshop | Pp. 48-55
doi: 10.1007/11424925_7
International Standards Based Information Technology Courses: A Case Study from Turkey
Mustafa Murat Inceoglu
In this study, two programs which are being implemented in Ege University [13] since 2002 are presented. These programs are based on international standards. One of the programs is for the students of the university, the other one is for the people who are unemployed or who want to be employed in Information Technology (IT) business. The first education program that covers all university students is based on the standard of international European Computer Driving License (ECDL). The second program is IT employment program that is based on the curriculum of American Computing Association (ACM). The design, implementation and results of both of these programs are discussed in this study.
- Information and Communication Technology (ICT) Education Workshop | Pp. 56-61
doi: 10.1007/11424925_8
Design and Implementation of the KORI: Intelligent Teachable Agent and Its Application to Education
Sung-il Kim; Sung-Hyun Yun; Mi-sun Yoon; Yeon-hee So; Won-sik Kim; Myung-jin Lee; Dong-seong Choi; Hyung-Woo Lee
Most of the intelligent tutoring system (ITS) is used to deliver knowledge and train skills based on the expert model. According to the theories of leaning, learning by teaching method is more efficient for enhancing motivation to learn and cognitive ability than learning by listening or learning by reading. For the purpose of developing an adaptive intelligent agent to enhance the motivation to learn, the new type of teachable agent were designed and implemented, the KORI (KORea university Intelligent agent), in which the user plays a role of a tutor by teaching the agent using a concept map, posing questions, and providing feedbacks. KORI consists of four independent modules: teach module, Q&A module, test module, and resource module. In teach module, the KORI’s knowledge is structured and organized through the concept map and the KORI makes new knowledge from the inference engine. In Q&A module, the KORI can provide answers to the users’ questions through an interactive window. It is expected that providing the user with the active role of teaching the agent enhance the motivation to learn and the positive attitude toward the subject matter as well as cognition.
- Information and Communication Technology (ICT) Education Workshop | Pp. 62-71
doi: 10.1007/11424925_10
Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments
Sang ho Kim; Choon Seong Leem
Security has been more crucial issue as targets of attacker are wide ranges from personal information to various things in ubiquitous computing environments. Portable computing devices such as cellular phone, PDA, and smart phone in such conditions have been exposured under security threats, which cause attacker to exploit malicious code and modification of storied data. In this paper we present security threats and their countermeasures in technical, manageable, and physical aspect of mobile portable computing devices. We believe that this paper will contributes on initiating a research on security issues of mobile portable computing devices and provide users with guidance to keep their information safe in mobile communication environments.
- Digital Device for Ubiquitous Computing Workshop | Pp. 79-85
doi: 10.1007/11424925_11
A Business Model (BM) Development Methodology in Ubiquitous Computing Environments
Choon Seong Leem; Nam Joo Jeon; Jong Hwa Choi; Hyoun Gyu Shin
Even though the importance of a Business Model (BM) in ubiquitous computing environments has been growing, current research mainly focuses only on technology. Without a proper evaluation method for a BM, a promising BM has not been verified. In this research, we suggested a BM development methodology for ubiquitous computing, which contains the Business Model Analysis (BMA) framework for analyzing a BM and the Business Model Feasibility Analysis (BMFA) framework for evaluating a BM. The methodology is composed of phases, activities, and tasks in detail and depth, having systematic relations to each other. A prospective BM of ubiquitous computing environments could be extracted by this methodology.
- Digital Device for Ubiquitous Computing Workshop | Pp. 86-95
doi: 10.1007/11424925_12
Developing Business Models in Ubiquitous Era: Exploring Contradictions in Demand and Supply Perspectives
Jungwoo Lee; Sunghwan Lee
This study reviews and analyzes contradictions embedded in two different perspectives looking at ubiquitous computing: demand-side and supply-side. It is argued here that these differences in perspective may contain contractions in terms of assumptions which may deter developers from properly conceiving future applications and services in ubiquitous computing. Five distinct aspects – anybody, anytime, anywhere, any service, and any device – were used as an analysis framework against ‘for me,’ ‘right now,’ ‘right here,’ ‘what I need,’ and ‘what I have.’ Underlying factors that makes differences are suggested and discussions are made. Implications are discussed and further research is suggested.
- Digital Device for Ubiquitous Computing Workshop | Pp. 96-102
doi: 10.1007/11424925_14
A Study on Value Chain in a Ubiquitous Computing Environment
Hong Joo Lee; Choon Seong Leem
As we enter the 21st century, the term “ubiquitous computing” is emerging. The emerging benefits of “ubiquitous computing” have the potential of fundamentally altering the way we live and work. Most companies are in business to win, and outperform their competitors. They adopt new technologies to fend off new competitors, reinforce an exciting competitive advantage, leapfrog competitors, or just to make money in new markets. Performance is critical. Only recently have companies been in a better position to comprehend how to use new technology such as ubiquitous computing. So now, too many companies are interested in using ubiquitous computing. Our research includes the following: First, we used previous research about the definition of business models and characteristics of ubiquitous computing. Second, we analyzed value chains for ubiquitous computing. Finally, we suggest a new value chain considering ubiquitous computing environment.
- Digital Device for Ubiquitous Computing Workshop | Pp. 113-121