Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250290
Sun Yu, Liu Zhiping, Xie Ji-li
In this paper, a formal model of intelligent query systems is proposed. After giving the architecture of our intelligent query answering system, we discuss ontology environment, user models, and query answering module in detail, and then propose a formal model of intelligent query systems. Finally, the running process of this model is studied.
{"title":"A formal model of intelligent query answering systems","authors":"Sun Yu, Liu Zhiping, Xie Ji-li","doi":"10.1109/ICCSE.2015.7250290","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250290","url":null,"abstract":"In this paper, a formal model of intelligent query systems is proposed. After giving the architecture of our intelligent query answering system, we discuss ontology environment, user models, and query answering module in detail, and then propose a formal model of intelligent query systems. Finally, the running process of this model is studied.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120954101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250307
Yang Yu, Huiping Xu
This paper presents a Monitoring System for Xiaoqushan Seafloor Observatory in the East China Sea (XSOMS) to remotely monitor and control in situ multidisciplinary equipment performing individual and cooperative tasks. The monitoring architecture of XSOMS is first introduced, which contains three main components enabling bidirectional information flow of data and commands. Based on this, XSOMS is designed and developed utilizing socket, component, multithreading, and other programming technologies. The implemented XSOMS has been applied to the operational Xiaoqushan Seafloor Observatory and has demonstrated for its satisfactory usability and performance. Given this successful engineering trial, the proposed XSOMS design could be applicable and beneficial for similar efforts in future construction of seafloor observatory network both at home and abroad.
{"title":"Design and development of a monitoring system for Xiaoqushan Seafloor Observatory in the East China Sea","authors":"Yang Yu, Huiping Xu","doi":"10.1109/ICCSE.2015.7250307","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250307","url":null,"abstract":"This paper presents a Monitoring System for Xiaoqushan Seafloor Observatory in the East China Sea (XSOMS) to remotely monitor and control in situ multidisciplinary equipment performing individual and cooperative tasks. The monitoring architecture of XSOMS is first introduced, which contains three main components enabling bidirectional information flow of data and commands. Based on this, XSOMS is designed and developed utilizing socket, component, multithreading, and other programming technologies. The implemented XSOMS has been applied to the operational Xiaoqushan Seafloor Observatory and has demonstrated for its satisfactory usability and performance. Given this successful engineering trial, the proposed XSOMS design could be applicable and beneficial for similar efforts in future construction of seafloor observatory network both at home and abroad.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122871616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a Co-time Co-frequency Full-duplex (CCFD) system, the ability of Self-interference Cancellation (SIC) is limited if we use negative SIC or radio frequency SIC alone, so the residual Self-Interference Signal (SIS) needs to be further cancelled in digital domain. This paper proposed a digital Self-interference Cancellation algorithm based on spectral estimation, via establishing spectral estimation SIS model, we can analyze the spectrum of the SIS and digital transmitted signal. Then reconstruct the SIS and self-adaption cancellation via the second-order cyclic statistic information of signals. The simulation result shows that the proposed algorithm performance and convergence can effectively improved.
{"title":"A digital self-interference cancellation algorithm based on spectral estimation in co-time co-frequency full duplex system","authors":"Yujie Li, Lingyun Sun, Caidan Zhao, Lianfeng Huang","doi":"10.1109/ICCSE.2015.7250280","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250280","url":null,"abstract":"In a Co-time Co-frequency Full-duplex (CCFD) system, the ability of Self-interference Cancellation (SIC) is limited if we use negative SIC or radio frequency SIC alone, so the residual Self-Interference Signal (SIS) needs to be further cancelled in digital domain. This paper proposed a digital Self-interference Cancellation algorithm based on spectral estimation, via establishing spectral estimation SIS model, we can analyze the spectrum of the SIS and digital transmitted signal. Then reconstruct the SIS and self-adaption cancellation via the second-order cyclic statistic information of signals. The simulation result shows that the proposed algorithm performance and convergence can effectively improved.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250249
Mark Allison, Sui F. Joo
Today's classroom and learner cohorts are supported by new and innovative technology in an unprecedented manner. The pace of technological advancements however does present challenges to educators in keeping abreast of the state of the art while concurrently facilitating a learner-certered approach. Topics within software engineering are especially susceptible to this phenomena and demands a more individualized adaptive model to support significant learning. Although there is an abundance of sound theoretical models which may address the challenge, the literature is sparse as to contextualization, application or concrete operation. Within a blended classroom, we have implemented an adaptive approach to address the pace of technology advancements with consideration for the skillsets and declarative knowledge of the learner. In this paper we present our approach within a software testing and maintenance course and discuss the lessons learnt. We have based our approach on the scientific grounding of Vygotsky's zone of proximal development and discuss the necessary scaffolding, inherent challenges and present an evaluation based on pre/post testing.
{"title":"An adaptive delivery strategy for teaching software testing and maintenance","authors":"Mark Allison, Sui F. Joo","doi":"10.1109/ICCSE.2015.7250249","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250249","url":null,"abstract":"Today's classroom and learner cohorts are supported by new and innovative technology in an unprecedented manner. The pace of technological advancements however does present challenges to educators in keeping abreast of the state of the art while concurrently facilitating a learner-certered approach. Topics within software engineering are especially susceptible to this phenomena and demands a more individualized adaptive model to support significant learning. Although there is an abundance of sound theoretical models which may address the challenge, the literature is sparse as to contextualization, application or concrete operation. Within a blended classroom, we have implemented an adaptive approach to address the pace of technology advancements with consideration for the skillsets and declarative knowledge of the learner. In this paper we present our approach within a software testing and maintenance course and discuss the lessons learnt. We have based our approach on the scientific grounding of Vygotsky's zone of proximal development and discuss the necessary scaffolding, inherent challenges and present an evaluation based on pre/post testing.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117107743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250234
Hare Ram Sah, G. Gunasekaran
Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.
{"title":"Privacy preserving data mining using visual steganography and encryption","authors":"Hare Ram Sah, G. Gunasekaran","doi":"10.1109/ICCSE.2015.7250234","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250234","url":null,"abstract":"Steganography is the process of hiding a secret message within an ordinary message & extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to combine steganography and cryptography properties in such a way to make it harder to retrieve the image of the secret message. In this work, the image is sliced, the sliced images are stored and upon match with a search string query the original image is retrieved by merging the individual randomly ordered slices in a regular manner. The image slicing ensures privacy preserving and thread based mining reduces the time complexity of the search algorithm.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117111570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250242
M. T. Khan, M. U. Qadir, Fazal Nasir, C. D. de Silva
Fault tolerance is increasingly important for multirobot systems, especially those operating in an unknown and hazardous environments. This paper presents a framework for a fault tolerant multi-robot system that works cooperatively to achieve a common goal. The proposed methodology comprises four key phases: grouping of robots, task execution, fault detection, and fault tolerance. Initially robots are grouped based on their capabilities. Next, the process of task execution takes place during which components of the robots are monitored in real time to detect faults. Upon detection of partial or full failure of a robot, the other team members respond robustly, reliably, flexibly, and coherently while communicating with each other to regroup and perform remaining tasks in order to achieve the common goal. The proposed methodology is implemented in a group of simulated heterogeneous mobile robots that transport multiple objects cooperatively to a goal location in an unknown and unstructured environment.
{"title":"A framework for a fault tolerant multi-robot system","authors":"M. T. Khan, M. U. Qadir, Fazal Nasir, C. D. de Silva","doi":"10.1109/ICCSE.2015.7250242","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250242","url":null,"abstract":"Fault tolerance is increasingly important for multirobot systems, especially those operating in an unknown and hazardous environments. This paper presents a framework for a fault tolerant multi-robot system that works cooperatively to achieve a common goal. The proposed methodology comprises four key phases: grouping of robots, task execution, fault detection, and fault tolerance. Initially robots are grouped based on their capabilities. Next, the process of task execution takes place during which components of the robots are monitored in real time to detect faults. Upon detection of partial or full failure of a robot, the other team members respond robustly, reliably, flexibly, and coherently while communicating with each other to regroup and perform remaining tasks in order to achieve the common goal. The proposed methodology is implemented in a group of simulated heterogeneous mobile robots that transport multiple objects cooperatively to a goal location in an unknown and unstructured environment.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250398
Yan-hong Li, Zhao Bo, Jian-hou Gan
The chance to learn from the best educators of the top universities for free has attracted wide interests of millions who have registered for MOOCs across the world. As MOOCs have gained caused great repercussions, critical debate is brewing on the pedagogical effectiveness of MOOCs. The high attrition rate of students who register at the beginning of a MOOC is a major cause of concern regarding the long-term success, impact, and sustainability of MOOC. Having conducted many studies on the application of adaptive learning in personalized MOOC learning. This article describes the details of customized MOOC learning (CML) model, which contains MOOC cloud, personalized course map and adaptive MOOC learning system. The results indicate that providing a strong pedagogical framework and a personalized learning experience in a MOOC learning environment is very important.
{"title":"Make adaptive learning of the MOOC: The CML model","authors":"Yan-hong Li, Zhao Bo, Jian-hou Gan","doi":"10.1109/ICCSE.2015.7250398","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250398","url":null,"abstract":"The chance to learn from the best educators of the top universities for free has attracted wide interests of millions who have registered for MOOCs across the world. As MOOCs have gained caused great repercussions, critical debate is brewing on the pedagogical effectiveness of MOOCs. The high attrition rate of students who register at the beginning of a MOOC is a major cause of concern regarding the long-term success, impact, and sustainability of MOOC. Having conducted many studies on the application of adaptive learning in personalized MOOC learning. This article describes the details of customized MOOC learning (CML) model, which contains MOOC cloud, personalized course map and adaptive MOOC learning system. The results indicate that providing a strong pedagogical framework and a personalized learning experience in a MOOC learning environment is very important.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250267
Kostas Anagnostopoulos, A. Vakaloudis
Although internships contribute to the professional development of a junior engineer, it is not straightforward to achieve a fruitful outcome for either the intern or the hosting the organisation. We discuss a structured framework based on Agile and Scrum concepts with the goal of providing in a flexible manner a mixture of communication, technical and research skills. Not only interns get hands-on exposure to the aforementioned skills but the organisation can make use of their deliverables.
{"title":"Towards successful technical internships: An Agile-oriented training methodology","authors":"Kostas Anagnostopoulos, A. Vakaloudis","doi":"10.1109/ICCSE.2015.7250267","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250267","url":null,"abstract":"Although internships contribute to the professional development of a junior engineer, it is not straightforward to achieve a fruitful outcome for either the intern or the hosting the organisation. We discuss a structured framework based on Agile and Scrum concepts with the goal of providing in a flexible manner a mixture of communication, technical and research skills. Not only interns get hands-on exposure to the aforementioned skills but the organisation can make use of their deliverables.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115756219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250372
Chen Yuren
The past few years have witnessed the preliminary achievements in the informatization construction in China's colleges and universities. However, the information management of the personnel archives is still separated from university to university; what's more, the approach to the informatization construction of these archives has yet to be decided. This paper intends to discuss the approach to the informatization construction, proposes to take the building of the information database, the data intelligent processing system and the application platform of management business as the core to establish an early form of the information management system and puts forward preliminary solutions to questions that may arise in the process of practical operation.
{"title":"An attempting discussion of the informatization construction of personnel archives of colleges and universities","authors":"Chen Yuren","doi":"10.1109/ICCSE.2015.7250372","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250372","url":null,"abstract":"The past few years have witnessed the preliminary achievements in the informatization construction in China's colleges and universities. However, the information management of the personnel archives is still separated from university to university; what's more, the approach to the informatization construction of these archives has yet to be decided. This paper intends to discuss the approach to the informatization construction, proposes to take the building of the information database, the data intelligent processing system and the application platform of management business as the core to establish an early form of the information management system and puts forward preliminary solutions to questions that may arise in the process of practical operation.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-22DOI: 10.1109/ICCSE.2015.7250283
Z. He, Binyue Cui, Wei Zhou, S. Yokoi
Beacon is an in door positioning system provided by Apple based on BLE (Bluetooth Low Energy) technology. Smart devices, such as iPhone or Android phone can detect advertising signals sent by the low energy consumption tiny device. Notifications will be pushed automatically to the user when smart device with iBeacon Apps come to certain areas. It provides promising and portfolio usage scenarios for business, such as retail stores, to push related information about customers' interested items with the awareness of customers' location. This technology also can be used in museum scenario. In this research, we described the principle of iBeacon, and addressed a design of interaction system between visitors and collections supported by iBeacon technology.
{"title":"A proposal of interaction system between visitor and collection in museum hall by iBeacon","authors":"Z. He, Binyue Cui, Wei Zhou, S. Yokoi","doi":"10.1109/ICCSE.2015.7250283","DOIUrl":"https://doi.org/10.1109/ICCSE.2015.7250283","url":null,"abstract":"Beacon is an in door positioning system provided by Apple based on BLE (Bluetooth Low Energy) technology. Smart devices, such as iPhone or Android phone can detect advertising signals sent by the low energy consumption tiny device. Notifications will be pushed automatically to the user when smart device with iBeacon Apps come to certain areas. It provides promising and portfolio usage scenarios for business, such as retail stores, to push related information about customers' interested items with the awareness of customers' location. This technology also can be used in museum scenario. In this research, we described the principle of iBeacon, and addressed a design of interaction system between visitors and collections supported by iBeacon technology.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115302889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}