首页 > 最新文献

2014 IIAI 3rd International Conference on Advanced Applied Informatics最新文献

英文 中文
Visualizing Real-Time Questionnaire Results to Promote Participation in Interactive Presentations 可视化实时问卷调查结果,促进互动演示的参与
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.24
R. Inoue, Shun Shiramatsu, Tadachika Ozono, T. Shintani
An interactive presentation is intended to support lecturers that need to enhance presentation expressions and gather real-time feedback from audiences while delivering their presentations. Our objective is to improve the efficiency of bi-directional communication between a lecturer and a large audience in presentations using a real-time questionnaire that the result is displayed on a shared screen in real-time while gathering answers. The real-time questionnaire is based on a hybrid interactive presentation system that is collaboration between the traditional presentation supporting system and a web application. To gather feedback from audiences at presentations, our system provides the web application that delivers presentation slides to audiences and provides a feature of creating annotations and answering the questions on delivered presentation slides. The result of an experiment for evaluating performance of our system showed that the features of the real-time questionnaire have high performance scalability.
交互式演示旨在支持需要增强演示表达的讲师,并在进行演示时收集听众的实时反馈。我们的目标是提高讲师和大量听众在演讲中双向沟通的效率,使用实时问卷调查,结果在收集答案的同时实时显示在共享屏幕上。实时问卷是基于一个混合的交互式演示系统,它是传统演示支持系统和web应用程序之间的协作。为了从观众那里收集反馈,我们的系统提供了一个web应用程序,可以向观众发送演示幻灯片,并提供了一个创建注释和回答演示幻灯片上的问题的功能。系统性能评估实验结果表明,实时问卷的特点具有较高的性能可扩展性。
{"title":"Visualizing Real-Time Questionnaire Results to Promote Participation in Interactive Presentations","authors":"R. Inoue, Shun Shiramatsu, Tadachika Ozono, T. Shintani","doi":"10.1109/IIAI-AAI.2014.24","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.24","url":null,"abstract":"An interactive presentation is intended to support lecturers that need to enhance presentation expressions and gather real-time feedback from audiences while delivering their presentations. Our objective is to improve the efficiency of bi-directional communication between a lecturer and a large audience in presentations using a real-time questionnaire that the result is displayed on a shared screen in real-time while gathering answers. The real-time questionnaire is based on a hybrid interactive presentation system that is collaboration between the traditional presentation supporting system and a web application. To gather feedback from audiences at presentations, our system provides the web application that delivers presentation slides to audiences and provides a feature of creating annotations and answering the questions on delivered presentation slides. The result of an experiment for evaluating performance of our system showed that the features of the real-time questionnaire have high performance scalability.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128701602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Text Filtering Based Approach to Classify Bug Injected and Fixed Changes 一种基于文本过滤的Bug注入与修正变更分类方法
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.141
A. Yamada, O. Mizuno
Approaches to detect fault-prone modules have been studied for a long time. As one of these approaches, we proposed a technique using a text filtering technique. We assume that bugs relate to words and context that are contained in a software module. Our technique treats a module as text information. Based on the dictionary which was learned by classifying modules which induce bugs, the bug inducing probability over a target module is calculated, and it judges whether the given module is a fault-prone module. The predictive granularity of this technique is a module. In this study, we aimed at prediction with the finer granularity of the portion which induces a bug. Specifically, we tried to predict bug inducing changes by using source code differences of bug inducing changes and previous changes and a text filtering technique. Similarly, we tried to bug fixing predict by using source code differences of bug fixing changes and previous changes and a text filtering technique. To show the effectiveness of our approach, we conducted two experiments and compared our approach with fault-prone filtering by applying it to two open source projects, and obtained higher accuracy.
检测易故障模块的方法已经研究了很长时间。作为这些方法之一,我们提出了一种使用文本过滤技术的技术。我们假设错误与包含在软件模块中的单词和上下文有关。我们的技术将模块视为文本信息。通过对诱发bug的模块进行分类学习得到的字典,计算目标模块上的bug诱发概率,并判断该模块是否为易故障模块。这种技术的预测粒度是一个模块。在这项研究中,我们的目标是用更细的粒度来预测引起bug的部分。具体来说,我们试图通过使用bug诱导更改和先前更改的源代码差异以及文本过滤技术来预测bug诱导更改。同样,我们尝试通过使用bug修复更改和先前更改的源代码差异以及文本过滤技术来预测bug修复。为了证明该方法的有效性,我们进行了两次实验,并将该方法应用于两个开源项目,将其与易故障过滤进行了比较,获得了更高的准确率。
{"title":"A Text Filtering Based Approach to Classify Bug Injected and Fixed Changes","authors":"A. Yamada, O. Mizuno","doi":"10.1109/IIAI-AAI.2014.141","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.141","url":null,"abstract":"Approaches to detect fault-prone modules have been studied for a long time. As one of these approaches, we proposed a technique using a text filtering technique. We assume that bugs relate to words and context that are contained in a software module. Our technique treats a module as text information. Based on the dictionary which was learned by classifying modules which induce bugs, the bug inducing probability over a target module is calculated, and it judges whether the given module is a fault-prone module. The predictive granularity of this technique is a module. In this study, we aimed at prediction with the finer granularity of the portion which induces a bug. Specifically, we tried to predict bug inducing changes by using source code differences of bug inducing changes and previous changes and a text filtering technique. Similarly, we tried to bug fixing predict by using source code differences of bug fixing changes and previous changes and a text filtering technique. To show the effectiveness of our approach, we conducted two experiments and compared our approach with fault-prone filtering by applying it to two open source projects, and obtained higher accuracy.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130485495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID Tag Ownership Transfer Protocol for a Closed Loop System 闭环系统的RFID标签所有权转移协议
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.124
Ghaith Khalil, B. Ray, M. Chowdhury
In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.
在RFID系统中,标签附着在一个对象上,该对象在其生命周期中可能由许多人拥有。因此,RFID系统需要转移标签的所有权。所有权转让必须保护现有和新所有者的隐私。为了实现所有权的安全转移,提出了多种所有权转移协议。然而,在目前的无源RFID标签上实现它们大多数是不切实际的或不安全的。我们提出了一种基于定时器的闭环RFID系统共享秘密的所有权转移协议。该协议将在空闲情况下确保相关方的安全和隐私。比较表明,所提出的协议比现有的同类协议具有更高的安全性和实用性。
{"title":"RFID Tag Ownership Transfer Protocol for a Closed Loop System","authors":"Ghaith Khalil, B. Ray, M. Chowdhury","doi":"10.1109/IIAI-AAI.2014.124","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.124","url":null,"abstract":"In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131836487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Generation of Stratified Image Database with Web Image Sharing Service and Ontology 基于Web图像共享服务和本体的分层图像数据库生成
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.189
Ryoya Fujimoto, Ryosuke Yamanishi, Y. Iwahori, Kohichi Toshioka, Jun-ichi Fukumoto
Preparation of a training image dataset used for the genetic object recognition system needs a lot of costs. Some datasets were recently created from Web image sharing services like Flickr, but examples which utilize a semantic classification or information of tags given to photos are quite few. This paper proposes an automatic generation method of an image dataset by introducing semantics of each label given to images, where the images are positioned in a semantic stratification according to the meaning of labels. Here the semantic stratification consists of IS-A relations, where "Animal" locates in a upper concept of "Dog" and "Cat". By using an image dataset with conceptual information like this, a computer will be able to recognize objects pictured in photos from a wide concept like "Animal" or "Vehicle" to narrower concepts gradually. In experiments, 47,910 photos were automatically classified into 183 classes which were aligned in a stratified tree. An evaluation test of the labels was performed manually for the generated image dataset and it was confirmed that most of labeling were reasonably collected.
用于遗传目标识别系统的训练图像数据集的准备需要大量的成本。一些数据集是最近从Web图像共享服务(如Flickr)创建的,但是利用语义分类或标签信息给照片的例子很少。本文提出了一种自动生成图像数据集的方法,通过引入给定图像的每个标签的语义,根据标签的含义将图像定位在语义层中。这里的语义分层由IS-A关系组成,其中“动物”位于“狗”和“猫”的上层概念中。通过使用具有这样概念信息的图像数据集,计算机将能够从“动物”或“车辆”等广义概念逐渐识别照片中的物体。在实验中,47910张照片被自动分类为183个类,这些类在分层树中对齐。对生成的图像数据集进行手动标签评估测试,确认大部分标签收集合理。
{"title":"Generation of Stratified Image Database with Web Image Sharing Service and Ontology","authors":"Ryoya Fujimoto, Ryosuke Yamanishi, Y. Iwahori, Kohichi Toshioka, Jun-ichi Fukumoto","doi":"10.1109/IIAI-AAI.2014.189","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.189","url":null,"abstract":"Preparation of a training image dataset used for the genetic object recognition system needs a lot of costs. Some datasets were recently created from Web image sharing services like Flickr, but examples which utilize a semantic classification or information of tags given to photos are quite few. This paper proposes an automatic generation method of an image dataset by introducing semantics of each label given to images, where the images are positioned in a semantic stratification according to the meaning of labels. Here the semantic stratification consists of IS-A relations, where \"Animal\" locates in a upper concept of \"Dog\" and \"Cat\". By using an image dataset with conceptual information like this, a computer will be able to recognize objects pictured in photos from a wide concept like \"Animal\" or \"Vehicle\" to narrower concepts gradually. In experiments, 47,910 photos were automatically classified into 183 classes which were aligned in a stratified tree. An evaluation test of the labels was performed manually for the generated image dataset and it was confirmed that most of labeling were reasonably collected.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132624642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Two-Stage Analog Neural Network Model and Hardware Implementation 两阶段模拟神经网络模型及硬件实现
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.184
M. Kawaguchi, M. Umeno, N. Ishii
In the neural network field, many application models have been proposed. A neuro chip and an artificial retina chip are developed to comprise the neural network model and simulate the biomedical vision system. Previous analog neural network models were composed of the operational amplifier and fixed resistance. It is difficult to change the connection coefficient. In this study, we used analog electronic multiple and sample hold circuits. The connecting weights describe the input voltage. It is easy to change the connection coefficient. This model works only on analog electronic circuits. It can finish the learning process in a very short time and this model will enable more flexible learning.
在神经网络领域,已经提出了许多应用模型。为实现生物医学视觉系统的神经网络模型仿真,研制了神经芯片和人工视网膜芯片。以往的模拟神经网络模型是由运算放大器和固定电阻组成的。连接系数很难改变。在本研究中,我们使用了模拟电子多路和采样保持电路。连接权重描述输入电压。连接系数很容易改变。这个模型只适用于模拟电路。它可以在很短的时间内完成学习过程,使学习更加灵活。
{"title":"The Two-Stage Analog Neural Network Model and Hardware Implementation","authors":"M. Kawaguchi, M. Umeno, N. Ishii","doi":"10.1109/IIAI-AAI.2014.184","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.184","url":null,"abstract":"In the neural network field, many application models have been proposed. A neuro chip and an artificial retina chip are developed to comprise the neural network model and simulate the biomedical vision system. Previous analog neural network models were composed of the operational amplifier and fixed resistance. It is difficult to change the connection coefficient. In this study, we used analog electronic multiple and sample hold circuits. The connecting weights describe the input voltage. It is easy to change the connection coefficient. This model works only on analog electronic circuits. It can finish the learning process in a very short time and this model will enable more flexible learning.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114447590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incremental Data Migration for Multi-database Systems Based on MySQL with Spider Storage Engine 基于MySQL与Spider Storage Engine的多数据库系统增量数据迁移
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.151
Naoyuki Miyamoto, K. Higuchi, T. Tsuji
Nowadays, with the spread of database systems and network systems in every field, a demand for sharing existent database systems grows. On the other hand, it is difficult to stop existent databases to reorganize into one large database system because database systems usually are mission-critical system. Thus, some kind of distributed database is necessary to solve this problem. The multi-database system is a kind of the distributed database system. It is a cluster of independent database systems. However, the distributed database system including the multi-database system has some problems. One of these problems is data migration between individual database systems in the multi-database system. Many reorganization techniques for distributed database systems are already proposed, but these techniques are not always adaptive to the data migration in the multi-database system. Incremental data migration is one of the solutions for this problem and it is easy to implement in the multi-database system. In this method, a large data migration is divided into small data migrations and other operations are inserted between these small data migrations. In this paper, the incremental data migration technique is evaluated in the multidatabase system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this multi-database system.
如今,随着数据库系统和网络系统在各个领域的普及,对现有数据库系统的共享需求日益增长。另一方面,由于数据库系统通常是任务关键型系统,因此很难停止现有的数据库重组为一个大型数据库系统。因此,需要某种分布式数据库来解决这个问题。多数据库系统是一种分布式数据库系统。它是一组独立的数据库系统。但是,包括多数据库系统在内的分布式数据库系统存在一些问题。其中一个问题是在多数据库系统中各个数据库系统之间的数据迁移。目前已经提出了许多面向分布式数据库系统的重组技术,但这些技术并不总能适应多数据库系统中的数据迁移。增量数据迁移是解决这一问题的一种方法,在多数据库系统中易于实现。该方法将一次大数据迁移划分为多个小数据迁移,并在这些小数据迁移之间插入其他操作。本文对基于MySQL的基于SPIDER存储引擎的多数据库系统中的增量数据迁移技术进行了评估,并证明了该多数据库系统中其他操作的周转时间的提高。
{"title":"Incremental Data Migration for Multi-database Systems Based on MySQL with Spider Storage Engine","authors":"Naoyuki Miyamoto, K. Higuchi, T. Tsuji","doi":"10.1109/IIAI-AAI.2014.151","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.151","url":null,"abstract":"Nowadays, with the spread of database systems and network systems in every field, a demand for sharing existent database systems grows. On the other hand, it is difficult to stop existent databases to reorganize into one large database system because database systems usually are mission-critical system. Thus, some kind of distributed database is necessary to solve this problem. The multi-database system is a kind of the distributed database system. It is a cluster of independent database systems. However, the distributed database system including the multi-database system has some problems. One of these problems is data migration between individual database systems in the multi-database system. Many reorganization techniques for distributed database systems are already proposed, but these techniques are not always adaptive to the data migration in the multi-database system. Incremental data migration is one of the solutions for this problem and it is easy to implement in the multi-database system. In this method, a large data migration is divided into small data migrations and other operations are inserted between these small data migrations. In this paper, the incremental data migration technique is evaluated in the multidatabase system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this multi-database system.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of a Secure Live Migration of Virtual Machines Using Ipsec Implementation 使用Ipsec实现的虚拟机安全实时迁移的评估
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.142
Norshazrul Azman Bin Sulaiman, Hideo Masuda
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration data which has not been considered in most cases up until now. This paper considers performing live migration under an IPsec implemented transmission channel to achieve a secured transmission of migration data between servers. IPsec is proven to be secure and can be implemented for live migration but due to the excessive amount of overhead produced by IPsec, proposed sophisticated tuning of MTU and MSS values resulted in a better migration performance.
热迁移允许管理员在故障发生时对主机和虚拟机进行在线维护,而不会中断业务。在考虑通过网络在不同数据中心的物理服务器之间迁移虚拟机时,安全性是确保迁移数据安全的关键,而到目前为止,大多数情况下都没有考虑到这一点。本文考虑在IPsec实现的传输通道下进行实时迁移,以实现服务器间迁移数据的安全传输。IPsec被证明是安全的,可以实现实时迁移,但由于IPsec产生了过多的开销,建议对MTU和MSS值进行复杂的调优,从而获得更好的迁移性能。
{"title":"Evaluation of a Secure Live Migration of Virtual Machines Using Ipsec Implementation","authors":"Norshazrul Azman Bin Sulaiman, Hideo Masuda","doi":"10.1109/IIAI-AAI.2014.142","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.142","url":null,"abstract":"Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration data which has not been considered in most cases up until now. This paper considers performing live migration under an IPsec implemented transmission channel to achieve a secured transmission of migration data between servers. IPsec is proven to be secure and can be implemented for live migration but due to the excessive amount of overhead produced by IPsec, proposed sophisticated tuning of MTU and MSS values resulted in a better migration performance.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Impacts of Firm's Mimetic Isomorphic Behaviors on Customer Satisfaction from the Perspectives of Expectation Theory and Self-Determination Theory: An Approach of Hierarchical Linear Modeling 期望理论与自我决定理论视角下企业模仿同构行为对顾客满意的影响:层次线性模型方法
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.57
Sheau-Hwa Chen, Kuo-Hsun Liao
Mimetic isomorphic theory explains the process through which organizations in the same environment imitate each other's actions to become more similar to each other. This article makes the potential contribution that institutional theory can make to understanding the success of marketing practices. Based on the concept of mimetic isomorphic, expectation theory and self-determination theory, we apply these insights to investigate the relationship between automobile sales corporations' mimetic behaviors and customer expectation. The research demonstrates the use of a two-level hierarchical linear modeling (HLM) to examine the relationships.
模仿同构理论解释了同一环境中的组织相互模仿彼此的行为以变得更加相似的过程。本文提出了制度理论对理解营销实践成功的潜在贡献。基于模仿同构的概念、期望理论和自我决定理论,我们运用这些见解来研究汽车销售企业模仿行为与顾客期望的关系。该研究展示了使用两级层次线性模型(HLM)来检查这些关系。
{"title":"Impacts of Firm's Mimetic Isomorphic Behaviors on Customer Satisfaction from the Perspectives of Expectation Theory and Self-Determination Theory: An Approach of Hierarchical Linear Modeling","authors":"Sheau-Hwa Chen, Kuo-Hsun Liao","doi":"10.1109/IIAI-AAI.2014.57","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.57","url":null,"abstract":"Mimetic isomorphic theory explains the process through which organizations in the same environment imitate each other's actions to become more similar to each other. This article makes the potential contribution that institutional theory can make to understanding the success of marketing practices. Based on the concept of mimetic isomorphic, expectation theory and self-determination theory, we apply these insights to investigate the relationship between automobile sales corporations' mimetic behaviors and customer expectation. The research demonstrates the use of a two-level hierarchical linear modeling (HLM) to examine the relationships.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"59 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Immersive Learning Design (ILD): A New Model to Assure the Quality of Learning through Flipped Classrooms 沉浸式学习设计:一种通过翻转课堂保证学习质量的新模式
Pub Date : 2014-11-24 DOI: 10.1109/IIAI-AAI.2014.67
H. Abdelaziz
The objective of this paper was to develop an immersive Web-based learning model to assure the quality of learning through the flipped classrooms. The proposed model was guided theoretically by the flipped classroom as a new Web-based learning trend. It was also guided pedagogically by active and reflective learning principles that support transforming the teaching and learning practices from content engagement to cognitive engagement. The targeted immersive learning model encompasses of four reciprocal phases: Pro-act, Act, Reflect, and Re-act (PARR). To validate the suggested model, a convenience sample of graduate students studying an advanced statistics course was selected from the Distance Teaching and Training Program at the Arabian Gulf University After designing and applying this new immersive Web-based learning model (PARR), findings revealed that using the flipped classroom through this immersive Web-based learning model has a statistical and practical impact on developing achievement and self-study skills among graduate students. The contribution of this research is that it qualifies the Web-based instructional practices to shift from content acquisition act to knowledge expression and creation act. In addition, the paper will be of benefit to people looking for pedagogical applications of virtual and blended learning environments for developing multiple ways to express what learners know and be able to do.
本文的目的是开发一种沉浸式的基于网络的学习模式,以确保通过翻转课堂的学习质量。该模式的理论指导是基于网络的新学习趋势——翻转课堂。它还在教学上受到积极和反思性学习原则的指导,这些原则支持将教学实践从内容参与转变为认知参与。有针对性的沉浸式学习模式包括四个相互作用的阶段:pre - Act, Act, Reflect和Re-act (PARR)。为了验证该模型的有效性,本研究以阿拉伯湾大学远程教学与培训项目的高级统计学研究生为研究对象,选取了方便样本。在设计和应用这种新的沉浸式网络学习模式(PARR)后,研究结果表明,通过这种沉浸式网络学习模式使用翻转课堂对研究生的学习成绩和自学技能的发展具有统计和实际的影响。本研究的贡献在于限定了网络教学实践从内容获取行为向知识表达和创造行为的转变。此外,本文将有利于人们寻找虚拟和混合学习环境的教学应用,以开发多种方式来表达学习者知道和能够做什么。
{"title":"Immersive Learning Design (ILD): A New Model to Assure the Quality of Learning through Flipped Classrooms","authors":"H. Abdelaziz","doi":"10.1109/IIAI-AAI.2014.67","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.67","url":null,"abstract":"The objective of this paper was to develop an immersive Web-based learning model to assure the quality of learning through the flipped classrooms. The proposed model was guided theoretically by the flipped classroom as a new Web-based learning trend. It was also guided pedagogically by active and reflective learning principles that support transforming the teaching and learning practices from content engagement to cognitive engagement. The targeted immersive learning model encompasses of four reciprocal phases: Pro-act, Act, Reflect, and Re-act (PARR). To validate the suggested model, a convenience sample of graduate students studying an advanced statistics course was selected from the Distance Teaching and Training Program at the Arabian Gulf University After designing and applying this new immersive Web-based learning model (PARR), findings revealed that using the flipped classroom through this immersive Web-based learning model has a statistical and practical impact on developing achievement and self-study skills among graduate students. The contribution of this research is that it qualifies the Web-based instructional practices to shift from content acquisition act to knowledge expression and creation act. In addition, the paper will be of benefit to people looking for pedagogical applications of virtual and blended learning environments for developing multiple ways to express what learners know and be able to do.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128661283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Research Design for Observing of the International Joint Research Activities by Graduates 研究生国际联合研究活动观察的研究设计
Pub Date : 2014-09-29 DOI: 10.1109/IIAI-AAI.2014.119
Kenta Kaneko, M. Mori
International students have been noted as the driving force behind the development of the economy and higher education institutions of the sending country. After graduation, it is assumed that graduates who work in their home countries give a positive effect to the alma mater through joint researches. In fact, international student support has been actively carried out in several universities. On the other hand, there is a finding that foreign students who returned to their original countries, left low performance. Therefore, the effect of international fame improvement through international students has not been demonstrated. Previous studies to measure the joint research after returning to original countries does not exist. First of all, I designed a system for extracting laboratory with many international joint research from a database in the university. Subsequently it is scheduled to analyze whether research networks are maintained by graduates of the laboratory after returning. I designed the system for extracting international joint research from university researchers information database. In the current scheme, it is not able to extract the student who graduated without co-authored papers with faculty. It is the task of the future.
国际学生被认为是派遣国经济和高等教育机构发展的推动力。毕业后,人们认为在本国工作的毕业生通过共同研究给母校带来了积极的影响。事实上,一些大学已经积极开展了对国际学生的支持。另一方面,有一项研究发现,回到原籍国的外国学生,留下了较低的表现。因此,通过留学生提高国际知名度的效果尚未得到证实。以往的研究并不存在衡量回归原籍国后的联合研究。首先,我设计了一个从大学数据库中提取多个国际联合研究实验室的系统。随后计划分析实验室毕业生回国后是否维护研究网络。设计了从高校科研人员信息库中提取国际联合研究成果的系统。在目前的方案中,它无法提取那些毕业时没有与教师共同撰写论文的学生。这是未来的任务。
{"title":"A Research Design for Observing of the International Joint Research Activities by Graduates","authors":"Kenta Kaneko, M. Mori","doi":"10.1109/IIAI-AAI.2014.119","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.119","url":null,"abstract":"International students have been noted as the driving force behind the development of the economy and higher education institutions of the sending country. After graduation, it is assumed that graduates who work in their home countries give a positive effect to the alma mater through joint researches. In fact, international student support has been actively carried out in several universities. On the other hand, there is a finding that foreign students who returned to their original countries, left low performance. Therefore, the effect of international fame improvement through international students has not been demonstrated. Previous studies to measure the joint research after returning to original countries does not exist. First of all, I designed a system for extracting laboratory with many international joint research from a database in the university. Subsequently it is scheduled to analyze whether research networks are maintained by graduates of the laboratory after returning. I designed the system for extracting international joint research from university researchers information database. In the current scheme, it is not able to extract the student who graduated without co-authored papers with faculty. It is the task of the future.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114269452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IIAI 3rd International Conference on Advanced Applied Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1