The present article offers a study of the development of Multimedia Computer Assisted Instruction (MCAI) in college English teaching from the perspective of its theoretical basis, connotations, limitations, properties as well as its practical meanings. The article points out that the best mode of college English teaching is to combine the traditional teaching method with MCAI and develop learners' autonomy.
{"title":"Multimedia Computer Assisted Instruction in College English Teaching","authors":"Liang Shuang","doi":"10.1109/ICCIS.2012.188","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.188","url":null,"abstract":"The present article offers a study of the development of Multimedia Computer Assisted Instruction (MCAI) in college English teaching from the perspective of its theoretical basis, connotations, limitations, properties as well as its practical meanings. The article points out that the best mode of college English teaching is to combine the traditional teaching method with MCAI and develop learners' autonomy.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The core group of mining and its marketing strategy are important parts in the research of web viral marketing(WVM). Since the existing marketing mechanisms can not fully take into account the key role of core group in the marketing process, the paper proposes a WVM core group marketing strategy (CGMS) to tackle this problem. CGMS overcomes the traditional marketing strategies' shortcomings which focus on the ex-post reward of customer's word of mouth behavior, or provide immediate compensation as incentives for the users according to their recommended behavior's costs. In addition, CGMS introduces the purchase rate concept. Based on user's purchase rate in network effects set (NES) of the core group, we combine with the core group's own properties to determine the marketing investment proportion so as to establish a rational CGMS. The experimental results indicate that the strategy can reduce the time consumption in the marketing mechanism, and improve the success rate of the recommended commodity effectively.
{"title":"Core Group Marketing Strategy in Web Viral Marketing","authors":"Xiufeng Xia, Na Wang, Xiaoming Li","doi":"10.1109/ICCIS.2012.114","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.114","url":null,"abstract":"The core group of mining and its marketing strategy are important parts in the research of web viral marketing(WVM). Since the existing marketing mechanisms can not fully take into account the key role of core group in the marketing process, the paper proposes a WVM core group marketing strategy (CGMS) to tackle this problem. CGMS overcomes the traditional marketing strategies' shortcomings which focus on the ex-post reward of customer's word of mouth behavior, or provide immediate compensation as incentives for the users according to their recommended behavior's costs. In addition, CGMS introduces the purchase rate concept. Based on user's purchase rate in network effects set (NES) of the core group, we combine with the core group's own properties to determine the marketing investment proportion so as to establish a rational CGMS. The experimental results indicate that the strategy can reduce the time consumption in the marketing mechanism, and improve the success rate of the recommended commodity effectively.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new method of compound noun analysis is proposed. It uses decomposition model and unregistered words recognition. The latter contains loanword nouns, name nouns and place name. Loanword noun is recognized based on it's formed by syllables which have low use frequency in Korean syllable. Name noun is recognized based on the characteristics of Korean name and the repeatability of the certain amount of syllables. Place name is recognized by consulting place name dictionary based on the analysis of model that the place names appear. The experimental results for compound noun analysis have an average accuracy of 98.2%. The accuracy of loanword nouns recognition and name nouns recognition is 92% and 95% separately.
{"title":"Compound Noun Analysis for Process of Korean Unregistered Word","authors":"Guanghe Jin, Zhang Li, Dapeng Qu, Xingwei Wang","doi":"10.1109/ICCIS.2012.109","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.109","url":null,"abstract":"In this paper, a new method of compound noun analysis is proposed. It uses decomposition model and unregistered words recognition. The latter contains loanword nouns, name nouns and place name. Loanword noun is recognized based on it's formed by syllables which have low use frequency in Korean syllable. Name noun is recognized based on the characteristics of Korean name and the repeatability of the certain amount of syllables. Place name is recognized by consulting place name dictionary based on the analysis of model that the place names appear. The experimental results for compound noun analysis have an average accuracy of 98.2%. The accuracy of loanword nouns recognition and name nouns recognition is 92% and 95% separately.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Obtaining temperature information is of great significance to distinguish borehole conditions, monitor oil-field performance, and optimize working system after hydrocarbon exploration and production started. Distributed temperature sensor is developed successively at home and abroad on the issue of gaining continuous temperature profile, which enables the obtainment of wellbore temperature profile over a certain period of time thus ensuring good reliability and accuracy. Fundamental ideas and characteristics of distributed temperature sensor measurement system are introduced in this paper, especially its application status in the process of hydrocarbon exploration and production both at home and abroad. Solutions are presented based on the current deficiency analysis and application prospects are also predicted.
{"title":"Application and Prospect of Distributed Temperature Sensor in Oil-Gas Exploration Development","authors":"Yang Chuan, Chen Ping, Ma Tianshou, Han Xiong","doi":"10.1109/ICCIS.2012.78","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.78","url":null,"abstract":"Obtaining temperature information is of great significance to distinguish borehole conditions, monitor oil-field performance, and optimize working system after hydrocarbon exploration and production started. Distributed temperature sensor is developed successively at home and abroad on the issue of gaining continuous temperature profile, which enables the obtainment of wellbore temperature profile over a certain period of time thus ensuring good reliability and accuracy. Fundamental ideas and characteristics of distributed temperature sensor measurement system are introduced in this paper, especially its application status in the process of hydrocarbon exploration and production both at home and abroad. Solutions are presented based on the current deficiency analysis and application prospects are also predicted.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salsa20 was proposed by Daniel Bernstein and is one of the finalists of eSTREAM project. Related-cipher attack was introduced by Hongjun Wu in 2002 and applied to block ciphers. The related ciphers can be considered as ciphers with the same round function, but with different round numbers. There has not been any related-cipher attack applied to Salsa20 stream cipher. In this paper, we apply related-cipher attack on stream cipher Salsa20, since Salsa20 uses flexible rounds (reduced-round versions of Salsa20) and the key schedule of Salsa20 is independent of the number of rounds. If a secret key is used in Salsa20/12 and Salsa20/8 to encrypt the same message, we can recover the 256-bit secret key with computational complexity of about 2224. The result shows that related-cipher attack may be also applied to stream ciphers.
{"title":"Related-Cipher Attack on Salsa20","authors":"Zeng-yu Shao, L. Ding","doi":"10.1109/ICCIS.2012.217","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.217","url":null,"abstract":"Salsa20 was proposed by Daniel Bernstein and is one of the finalists of eSTREAM project. Related-cipher attack was introduced by Hongjun Wu in 2002 and applied to block ciphers. The related ciphers can be considered as ciphers with the same round function, but with different round numbers. There has not been any related-cipher attack applied to Salsa20 stream cipher. In this paper, we apply related-cipher attack on stream cipher Salsa20, since Salsa20 uses flexible rounds (reduced-round versions of Salsa20) and the key schedule of Salsa20 is independent of the number of rounds. If a secret key is used in Salsa20/12 and Salsa20/8 to encrypt the same message, we can recover the 256-bit secret key with computational complexity of about 2224. The result shows that related-cipher attack may be also applied to stream ciphers.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R-tree is a crucial technique for spatial index. However, coverage and overlap produced by traditional methods are big side effects. In order to minimize the overlap and reduce the coverage, this paper proposes a new R-tree construction method based on clustering algorithm which can minimize the overlap and reduce the coverage to a great extent. This method resolves effectively the clustering storage for the adjacent data, and reduces the overlap between spatial nodes. Comparisons and experiments are conducted and performances are evaluated for this method. The results show that this method has high efficiency in querying.
{"title":"A New Approach of R-tree Construction","authors":"Shaoxi Li, De-peng Zhao, K. Bai","doi":"10.1109/ICCIS.2012.24","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.24","url":null,"abstract":"R-tree is a crucial technique for spatial index. However, coverage and overlap produced by traditional methods are big side effects. In order to minimize the overlap and reduce the coverage, this paper proposes a new R-tree construction method based on clustering algorithm which can minimize the overlap and reduce the coverage to a great extent. This method resolves effectively the clustering storage for the adjacent data, and reduces the overlap between spatial nodes. Comparisons and experiments are conducted and performances are evaluated for this method. The results show that this method has high efficiency in querying.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124818774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data integration of geospatial data in distributed and heterogeneous environment involves the use of semantic ontologies. In this kind of integration system, semantic technologies play an important role in improving performance and effectiveness of spatial queries. This paper focuses on methods of query optimization based on spatial semantics at the top level of semantic layer in central data integration systems. After analyzing the hybrid approach for spatial data integration, two categories of query optimization strategies are proposed based on detailed examination of special characteristics of spatial data. With spatial knowledge explicitly specified in ontologies and associated rules, spatial queries can be optimized intelligently.
{"title":"A Study of Spatial Query Optimization Based on Semantics in Data Integration","authors":"Fengyuan Zhong, Tingshan Zhang, Chengwu Wang","doi":"10.1109/ICCIS.2012.47","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.47","url":null,"abstract":"Data integration of geospatial data in distributed and heterogeneous environment involves the use of semantic ontologies. In this kind of integration system, semantic technologies play an important role in improving performance and effectiveness of spatial queries. This paper focuses on methods of query optimization based on spatial semantics at the top level of semantic layer in central data integration systems. After analyzing the hybrid approach for spatial data integration, two categories of query optimization strategies are proposed based on detailed examination of special characteristics of spatial data. With spatial knowledge explicitly specified in ontologies and associated rules, spatial queries can be optimized intelligently.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129531697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The classical fourth-order Runge-Katla integrator and the third-order force gradient symplectic integrator are used to solve the two-dimensional H'enon-Heiles system respectively. Numerical results, including the relative energy error, Poincare section, the largest Lyapunov exponent and Fast Lyapunov Indicator, are compared in detail. It is found that the Runge-Katla algorithm does not conserve the energy of the system, but the symplectic one does. On the other hand, the former method gives some spurious descriptions of the dynamics, while the latter one does not.
{"title":"Comparison of Runge-Kutta Algorithms and Symplectic Algorithms","authors":"Ming Zou, Liming Mei","doi":"10.1109/ICCIS.2012.106","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.106","url":null,"abstract":"The classical fourth-order Runge-Katla integrator and the third-order force gradient symplectic integrator are used to solve the two-dimensional H'enon-Heiles system respectively. Numerical results, including the relative energy error, Poincare section, the largest Lyapunov exponent and Fast Lyapunov Indicator, are compared in detail. It is found that the Runge-Katla algorithm does not conserve the energy of the system, but the symplectic one does. On the other hand, the former method gives some spurious descriptions of the dynamics, while the latter one does not.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129839342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile health (mHealth), as an important development direction of eHealth, is an innovative application of spatial information technology used in health field. In this paper, the key technology of location based mobile health system is studied and the system prototype is designed and implemented. The mobile monitoring terminal receives data collected by the physiological parameters measuring instrument, obtains location information through GPS/WiFi positioning module, and uploads data to the service center using GPRS communication. The service center, a Silver light based WebGIS system, monitors the location and physiological parameters of mobile monitoring terminal users, makes alarms and reminders through spatial analysis. The mobile health system with real-time monitoring, precise positioning, rapid analysis, visualization display, can be widely used in family sickbeds, geracomiums, empty-nest elders' care, chronic disease patients and other special populations or scenes.
{"title":"Design and Implementation of Location Based Mobile Health System","authors":"Lanlan Huang, Yubin Xu, Xiuwan Chen, Huaiyu Li, Yuhang Wu","doi":"10.1109/ICCIS.2012.118","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.118","url":null,"abstract":"Mobile health (mHealth), as an important development direction of eHealth, is an innovative application of spatial information technology used in health field. In this paper, the key technology of location based mobile health system is studied and the system prototype is designed and implemented. The mobile monitoring terminal receives data collected by the physiological parameters measuring instrument, obtains location information through GPS/WiFi positioning module, and uploads data to the service center using GPRS communication. The service center, a Silver light based WebGIS system, monitors the location and physiological parameters of mobile monitoring terminal users, makes alarms and reminders through spatial analysis. The mobile health system with real-time monitoring, precise positioning, rapid analysis, visualization display, can be widely used in family sickbeds, geracomiums, empty-nest elders' care, chronic disease patients and other special populations or scenes.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Chen, Shengju Tang, Zhangsheng Pan, Jiaxin Zhang, D. Guo
In order to establish the perceptual function model of products, we use image semantics words to express the perceptual capabilities of CNC machine tools in the study of their image modeling design. Consider the complexity of the image information, users tend to use a relatively vague image word to express their expectations of the product, however, due to the ambiguity and uncertainty of the image information itself, the shape feature information of a product often requires the use of multiple images words to describe. In order to solve the correlation problem among them, this paper uses the principle of semantics associated of product, filters the user's semantics, and obtains the representation semantic words to describe the shape characteristics of CNC machine tools and the correspondence between the relatively fuzzy images and the representation semantic words. This lays the foundation for the image design of CNC machine tools.
{"title":"Research on Kansei Image in Kansei-Based Design System for CNC Machine Tools","authors":"Bo Chen, Shengju Tang, Zhangsheng Pan, Jiaxin Zhang, D. Guo","doi":"10.1109/ICCIS.2012.247","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.247","url":null,"abstract":"In order to establish the perceptual function model of products, we use image semantics words to express the perceptual capabilities of CNC machine tools in the study of their image modeling design. Consider the complexity of the image information, users tend to use a relatively vague image word to express their expectations of the product, however, due to the ambiguity and uncertainty of the image information itself, the shape feature information of a product often requires the use of multiple images words to describe. In order to solve the correlation problem among them, this paper uses the principle of semantics associated of product, filters the user's semantics, and obtains the representation semantic words to describe the shape characteristics of CNC machine tools and the correspondence between the relatively fuzzy images and the representation semantic words. This lays the foundation for the image design of CNC machine tools.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130780519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}