Education, one of the major criteria to measure the advance of a country, has experienced tremendous impact in the era of globalization. Facing this fast changing world, how to guide and train students to adapt to the economic globalization and to be internationally competitive in terms of innovation and comprehensive quality deserves the higher education institutions to think about carefully in-depth. There are many challenges and choices in the internationalization trend of higher education. We also should maintain our own characteristics and achieve an international competitive advantage in the educational system worldwide and achieve our goal to cultivate real international talents. In this paper, the background and current situation is introduced first, relationship between internationalization and Chinese characteristics and standards to measure internationalization are then presented. Finally we use training international computer software engineers as an example to discuss some possible methods and our practices for internationalized education.
{"title":"Notice of RetractionChallenges and Choices in Internationalized China Higher Education: A Case Study of Training Computer Software Talents","authors":"Wenhong Tian, Feng Zhu","doi":"10.1109/ETCS.2010.118","DOIUrl":"https://doi.org/10.1109/ETCS.2010.118","url":null,"abstract":"Education, one of the major criteria to measure the advance of a country, has experienced tremendous impact in the era of globalization. Facing this fast changing world, how to guide and train students to adapt to the economic globalization and to be internationally competitive in terms of innovation and comprehensive quality deserves the higher education institutions to think about carefully in-depth. There are many challenges and choices in the internationalization trend of higher education. We also should maintain our own characteristics and achieve an international competitive advantage in the educational system worldwide and achieve our goal to cultivate real international talents. In this paper, the background and current situation is introduced first, relationship between internationalization and Chinese characteristics and standards to measure internationalization are then presented. Finally we use training international computer software engineers as an example to discuss some possible methods and our practices for internationalized education.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The digital community is the foundation for digital city construction. The paper introduces the technical route and work flow of the realization of digital community 3D modeling and virtual roaming. It mainly discusses the core techniques of model construction, texture mapping and scene optimization in 3D environment. Finally, it summarizes some technologies and methods in constructing digital community.
{"title":"The Realization of Digital Community 3D Modeling and Virtual Roaming","authors":"Rong Liu, Yan Luo, Yufeng Zhu, Ye Junjun","doi":"10.1109/ETCS.2010.362","DOIUrl":"https://doi.org/10.1109/ETCS.2010.362","url":null,"abstract":"The digital community is the foundation for digital city construction. The paper introduces the technical route and work flow of the realization of digital community 3D modeling and virtual roaming. It mainly discusses the core techniques of model construction, texture mapping and scene optimization in 3D environment. Finally, it summarizes some technologies and methods in constructing digital community.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The principle and functions of the intelligent temperature control system based on Microcontroller AT89S51 are studied, and the temperature measurement unit consists of the 1-Wire bus digital temperature sensor DS18B20. The system can be expected to detect the preset temperature, to display time, to save and print monitoring data. An alarm will be given by system if the temperature exceeds the upper and lower limit value of the temperature which can be set discretionarily and then automatic control is achieved, thus the temperature is achieved monitoring intelligently within a certain range. Basing on principle of the system, it is easy to make a variety of other non-linear control systems so long as the software design is reasonably changed. The system has been proved to be accurate, reliable and satisfied through field practice.
{"title":"Research and Design of Intelligent Temperature Control System","authors":"Huang Wen-tian, Li Jin-ping","doi":"10.1109/ETCS.2010.17","DOIUrl":"https://doi.org/10.1109/ETCS.2010.17","url":null,"abstract":"The principle and functions of the intelligent temperature control system based on Microcontroller AT89S51 are studied, and the temperature measurement unit consists of the 1-Wire bus digital temperature sensor DS18B20. The system can be expected to detect the preset temperature, to display time, to save and print monitoring data. An alarm will be given by system if the temperature exceeds the upper and lower limit value of the temperature which can be set discretionarily and then automatic control is achieved, thus the temperature is achieved monitoring intelligently within a certain range. Basing on principle of the system, it is easy to make a variety of other non-linear control systems so long as the software design is reasonably changed. The system has been proved to be accurate, reliable and satisfied through field practice.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124257567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Establishment of pairwise keys in wireless sensor networks is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, due to the resource constraints on sensor nodes, establishing pairwise keys in wireless sensor networks is not a trivial task. For the existing key pre-distribution schemes, as the number of compromised nodes increasing, the fraction of affected pairwise keys will increase quickly. As a result, a small number of compromised nodes may affect a large fraction of pairwise. This paper presents an improved key management scheme for wireless sensor networks, which take advantage of one-way hash function to alleviate the effect of compromised sensor nodes on the uncompromised sensor nodes and at the same time this method doesn’ t affect the connectivity between neighboring sensor nodes. The analysis shows that compared with existing schemes, the proposed scheme has better network resilience against node capture attack.
{"title":"A Pairwise Key Management Scheme Based on Hash Function for Wireless Sensor Networks","authors":"Wenqi Yu","doi":"10.1109/ETCS.2010.473","DOIUrl":"https://doi.org/10.1109/ETCS.2010.473","url":null,"abstract":"Establishment of pairwise keys in wireless sensor networks is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, due to the resource constraints on sensor nodes, establishing pairwise keys in wireless sensor networks is not a trivial task. For the existing key pre-distribution schemes, as the number of compromised nodes increasing, the fraction of affected pairwise keys will increase quickly. As a result, a small number of compromised nodes may affect a large fraction of pairwise. This paper presents an improved key management scheme for wireless sensor networks, which take advantage of one-way hash function to alleviate the effect of compromised sensor nodes on the uncompromised sensor nodes and at the same time this method doesn’ t affect the connectivity between neighboring sensor nodes. The analysis shows that compared with existing schemes, the proposed scheme has better network resilience against node capture attack.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces the background, the main contents and the knowledge structure of the multimedia CAI courseware in Engineering Mechanics course. This paper focuses on the basic ideas of the courseware design and development, such as the elements of teaching system, the design of system architecture, the analysis and selection of system development tool software, and the key technologies and their implementation in systems development. Finally this paper discusses the application of CAI Courseware System in Engineering Mechanics, and the experiences in the teaching process. Using the multimedia CAI courseware while teaching in the classroom, we can promote changes in teaching methods, in reform and development of teaching ideas and theory, and improve teaching quality and effectiveness.
{"title":"Development and Application of Multimedia CAI Courseware in Engineering Mechanics Course","authors":"Qingxiang Xu, Duanyang Zhao, Wuheng Zuo","doi":"10.1109/ETCS.2010.93","DOIUrl":"https://doi.org/10.1109/ETCS.2010.93","url":null,"abstract":"This paper introduces the background, the main contents and the knowledge structure of the multimedia CAI courseware in Engineering Mechanics course. This paper focuses on the basic ideas of the courseware design and development, such as the elements of teaching system, the design of system architecture, the analysis and selection of system development tool software, and the key technologies and their implementation in systems development. Finally this paper discusses the application of CAI Courseware System in Engineering Mechanics, and the experiences in the teaching process. Using the multimedia CAI courseware while teaching in the classroom, we can promote changes in teaching methods, in reform and development of teaching ideas and theory, and improve teaching quality and effectiveness.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"66 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the wide range of community needs, the rapid development of information technology and the rapid extension of the Internet, modern distance education has been more and more widely used. However, the current prevalence distance education system has series of drawbacks such as poor intelligence, lacking interactive tools, the loose knowledge structure, not high degree of resource sharing. According to Multi-Agent features and the process of daily teachers' guide for the students intelligent teaching process is analyzed based on Multi-Agent, and a new modern design models of distance education system is presented based on Multi-Agent. Its main functions and some of the key technologies of the system to achieve are discussed. The model of the intelligent Agent may obtain students' information. Using the repository to guide the students to realize the automatic answer to students.
{"title":"The Design of Distance Learning System Based on Multi-Agent","authors":"Wang Dong-sheng, Pan Wei-wei","doi":"10.1109/ETCS.2010.144","DOIUrl":"https://doi.org/10.1109/ETCS.2010.144","url":null,"abstract":"With the wide range of community needs, the rapid development of information technology and the rapid extension of the Internet, modern distance education has been more and more widely used. However, the current prevalence distance education system has series of drawbacks such as poor intelligence, lacking interactive tools, the loose knowledge structure, not high degree of resource sharing. According to Multi-Agent features and the process of daily teachers' guide for the students intelligent teaching process is analyzed based on Multi-Agent, and a new modern design models of distance education system is presented based on Multi-Agent. Its main functions and some of the key technologies of the system to achieve are discussed. The model of the intelligent Agent may obtain students' information. Using the repository to guide the students to realize the automatic answer to students.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114545036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A security situation assessment model is proposed in this paper. One of the math function and the rectification function are used to design the experience function in the theory of evidence. Then the theory of evidence is brought into the security situation assessment. From correlating and fusing the data which is provided by the sensors deployed in network to depicting the curve of security situation, we complete the whole process. We also verified the security situation assessment model and the algorithm, the results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence. At last the method of how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.
{"title":"Security Situation Assessment Based on the DS Theory","authors":"Feng Xuewei, Wang Dongxia, Ma Guoqing, Li Jin","doi":"10.1109/ETCS.2010.63","DOIUrl":"https://doi.org/10.1109/ETCS.2010.63","url":null,"abstract":"A security situation assessment model is proposed in this paper. One of the math function and the rectification function are used to design the experience function in the theory of evidence. Then the theory of evidence is brought into the security situation assessment. From correlating and fusing the data which is provided by the sensors deployed in network to depicting the curve of security situation, we complete the whole process. We also verified the security situation assessment model and the algorithm, the results show that the problem of network security situation assessment is resolved very well by the use of the theory of evidence. At last the method of how to apply this assessment model to large-scale network security situation assessment is introduced in this paper.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liqin Zhang, Jiangfeng Li, C. Kong, Liping Qu, Jianghong Zhu, Zhongda Chen, Yida Luo
Construction land suitability evaluation is essential for urban development decision. Back Propagation Neural Network (BPNN) is suitable for the non-linear issue. In this study, BPNN architecture has been set up, with 9 neurons of input layer and 4 of output layer. The neurons of input layer include indices related to topography, engineering geology, hydro-geology, and geo-hazard, which are determined based on analysis of Hangzhou land use conditions, suitable for Hangzhou and related urban region construction land suitability research. As the most important basis, learning and testing dataset are determined through Delphi and K-Means Clustering evaluation. The evaluation conclusion shows that conditions of topography features, layer of saturated soft soil, engineering geology, and salinity of groundwater, influence construction land suitability as predominant factors in Hangzhou. And the BPNN model has obvious advantages for land use suitability issues and related researches.
{"title":"Using Neural Network to Evaluate Construction Land Use Suitability","authors":"Liqin Zhang, Jiangfeng Li, C. Kong, Liping Qu, Jianghong Zhu, Zhongda Chen, Yida Luo","doi":"10.1109/ETCS.2010.446","DOIUrl":"https://doi.org/10.1109/ETCS.2010.446","url":null,"abstract":"Construction land suitability evaluation is essential for urban development decision. Back Propagation Neural Network (BPNN) is suitable for the non-linear issue. In this study, BPNN architecture has been set up, with 9 neurons of input layer and 4 of output layer. The neurons of input layer include indices related to topography, engineering geology, hydro-geology, and geo-hazard, which are determined based on analysis of Hangzhou land use conditions, suitable for Hangzhou and related urban region construction land suitability research. As the most important basis, learning and testing dataset are determined through Delphi and K-Means Clustering evaluation. The evaluation conclusion shows that conditions of topography features, layer of saturated soft soil, engineering geology, and salinity of groundwater, influence construction land suitability as predominant factors in Hangzhou. And the BPNN model has obvious advantages for land use suitability issues and related researches.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114693295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Packet analysis can be used in computer networks course to help students better understand the fundamental networking concepts and the principle of protocols. This paper presents a platform for understanding Computer network protocol based on packet analysis online and its use in a computer network course. The platform provides a channel for automatically analyzing the typical protocols implementation’s behavior by inspecting packet traces of the protocols’ activity, furthermore it can interprets the trace as a whole and show protocol interactions and the relationships between objects. The evaluation result shows that using the platform enhances student learning on networking protocols and interest in the subject of computer networks.
{"title":"Developing a Platform for Understanding Networking Protocols Based on Packet Analysis","authors":"Li Xiaojuan, Guan Yong, Wang Yanli, Wu Minhua","doi":"10.1109/ETCS.2010.73","DOIUrl":"https://doi.org/10.1109/ETCS.2010.73","url":null,"abstract":"Packet analysis can be used in computer networks course to help students better understand the fundamental networking concepts and the principle of protocols. This paper presents a platform for understanding Computer network protocol based on packet analysis online and its use in a computer network course. The platform provides a channel for automatically analyzing the typical protocols implementation’s behavior by inspecting packet traces of the protocols’ activity, furthermore it can interprets the trace as a whole and show protocol interactions and the relationships between objects. The evaluation result shows that using the platform enhances student learning on networking protocols and interest in the subject of computer networks.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117267638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Interaction testing has addressed some issues on how to select a small subset of test cases. In many systems where interaction testing is needed, the entire test suite is not executed because of time or budget constraints. It is important to prioritize the test cases in these situations. On the other hand, there are not always interactions among any factors in real systems. Moreover, some factors may need N-way (N≫2) testing since there is a closer relationship among them. We present a model for prioritized interaction testing with interaction relationship and propose a greedy algorithm for generating variable strength covering arrays with bias.
{"title":"Constructing Prioritized Interaction Test Suite with Interaction Relationship","authors":"Jianjun Yuan, Zuowen Jiang","doi":"10.1109/ETCS.2010.239","DOIUrl":"https://doi.org/10.1109/ETCS.2010.239","url":null,"abstract":"Interaction testing has addressed some issues on how to select a small subset of test cases. In many systems where interaction testing is needed, the entire test suite is not executed because of time or budget constraints. It is important to prioritize the test cases in these situations. On the other hand, there are not always interactions among any factors in real systems. Moreover, some factors may need N-way (N≫2) testing since there is a closer relationship among them. We present a model for prioritized interaction testing with interaction relationship and propose a greedy algorithm for generating variable strength covering arrays with bias.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}