2008 International Conference on Cyberworlds

22-24 Sept. 2008

Filter Results

Displaying Results 1 - 25 of 151
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008
    Request permission for commercial reuse | |PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s):xv - xvi
    Request permission for commercial reuse | |PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizers

    Publication Year: 2008, Page(s): xvii
    Request permission for commercial reuse | |PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2008, Page(s):xviii - xix
    Request permission for commercial reuse | |PDF file iconPDF (21 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2008, Page(s): xx
    Request permission for commercial reuse | |PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • Invited talks

    Publication Year: 2008, Page(s):xxi - xxii
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (28 KB)

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Watermark Algorithm of Binary Images Using Adaptable Matrix

    Publication Year: 2008, Page(s):3 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (233 KB) | HTML iconHTML

    A watermark algorithm of binary images using adaptable matrix is presented. An adaptable matrix is designed to evaluate the smoothness and the connectivity of binary images. The watermark is embedded according to the adaptable matrix in this algorithm. Experimental results show that proposed scheme has a performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invariant Image Watermarking Based on Local Feature Regions

    Publication Year: 2008, Page(s):6 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1441 KB) | HTML iconHTML

    In this paper, a robust image watermarking approach is presented based on image local invariant features. The affine invariant point detector is used to extract feature regions of the given host image. Image normalization and dominant gradient orientation alignment are performed to these feature regions. Thereafter, circular watermark pattern are embedded in these image normalized patches. After t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Audio Zero-Watermark Algorithm Combined DCT with Zernike Moments

    Publication Year: 2008, Page(s):11 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (257 KB) | HTML iconHTML

    This work proposes an audio zero-watermark algorithm which combined DCT and Zernike Moments. The proposed algorithm combines a part of samples and low-frequency DCT coefficients of the same volume to perform low-order Zernike transform, and then construct watermark based on Zernike moments. Experimental results show that the proposed algorithm can resist both common signal processing and geometric... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of Autostereograms Taking into Account Object Colors and Its Applications for Steganography

    Publication Year: 2008, Page(s):16 - 23
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2852 KB) | HTML iconHTML

    Information on appearances of three-dimensional objects are transmitted via the Internet, and displaying objects plays an important role in a lot of areas such as movies and video games. An autostereogram is one of the ways to represent three-dimensional objects taking advantage of binocular parallax, by which depths of objects are perceived. In previous methods, the colors of objects were ignored... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Watermarking Protocol Designed for Online System

    Publication Year: 2008, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (8 KB)

    One of most desired goal of digital watermark is to protect copyright, which is hard to realize without accompanying a well designed protocol according to different applications. Online system, such as digital museum, is an advanced platform to show digital works while valued data are prone to be pirated. A secure watermarking protocol is designed to protect copyright of online system in this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Holistic Twig Join Algorithm on XML Documents with Optimization Rules and Index

    Publication Year: 2008, Page(s):30 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (280 KB) | HTML iconHTML

    Efficiently finding all occurrences of a twig pattern is a core operation of XML query processing. In this paper, we first propose a generic twig join algorithm TJFGeneric which only scans the leaf query nodes using a cursor interface to return elements. And then we present TJFGeneric+ algorithm incorporating two optimization rules into TJFGeneric to explore potential benefit of disk re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced Technology Acceptance Model for E-Learning Systems in High-Tech Companies in Taiwan: Analyzed by Structural Equation Modeling

    Publication Year: 2008, Page(s):39 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (321 KB) | HTML iconHTML

    With the rapid change in working environment, there is a need to implement e-learning systems but their adoption requires a fully understanding of the user acceptance processes. Our mainly effort is to integrate two constructs, perceived flexibility and computer self-efficacy, to examine the applicability of the technology acceptance model (TAM) in explaining employees' decisions to accept e-learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An E-Learning System Model Based on Affective Computing

    Publication Year: 2008, Page(s):45 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (342 KB) | HTML iconHTML

    The fact that emotion deficiency in e-Learning system will debase the study efficiency has attracted more and more attention of education technologists. Based on affective computing technology---- facial expression recognition and posture recognition, a new e-Learning system model was proposed. And the thoughtway, system model and technique means of harmonious human-machine affective interaction s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relationships between User Cognitive Styles and Browsing Behaviors of an Online Learning Web Site

    Publication Year: 2008, Page(s):51 - 57
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (134 KB) | HTML iconHTML

    This study investigated the relationships between learner cognitive styles and how learners interact with a web-based learning system. The cognitive style model investigated in this study was based on two independent fundamental cognitive functions, perception and judgment, whose combinations form four cognitive styles, Interpersonal, Mastery, Understanding, and Self-Expressive. Selection behavior... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interest Based Learning Activity Negotiation

    Publication Year: 2008, Page(s):58 - 64
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB) | HTML iconHTML

    Learning activity negotiation will involve learner's commitment, engage the learner and improve learning quality. However, in current learning systems, learning activities are either decided by the system or decided by the learner. This paper proposes an intelligent negotiation mechanism, where the system and the learner can discuss about their needs and negotiate on learning activities. Because t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the Applications of Knowledge-Sharing Blog Concepts to the Teaching in Elementary School

    Publication Year: 2008, Page(s):65 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (314 KB) | HTML iconHTML

    Blog has become one of the fastest growing types of Web-based media. Based on theoretical approaches, one model for fostering the knowledge-sharing behavior of blog students are presented in education. Our empirical study examined the influence of knowledge-sharing blog on learning outcome and learner satisfaction in e-learning environments. Three different settings were studied: two were e-learni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a Web-Based History Educational System

    Publication Year: 2008, Page(s):71 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (431 KB) | HTML iconHTML

    HES-SPATO, a web-based history educational system, was developed to integrate the indispensable elements of history events such as person, space, and time for increasing the understandability of history learning materials. It was based on SCORM (sharable content object reference model), to ensure reusability, durability, accessibility, and interoperability of electronic materials. In HES-SPATO, hi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity Transformation in Real and Virtual Worlds: The Overlapping World View

    Publication Year: 2008, Page(s):81 - 85
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (228 KB) | HTML iconHTML

    Of late, digital game-based learning has attracted game designers, researchers, and educators. Immersion in the virtual environment of a game may affect K-12 students' cultivation of self. There are two opposing views related to game-based identity formation: separate world view and identical world view. The purpose of this paper is to bring a third-party view, the overlapping world view, into thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Augmented Reality System Using 3D Fiducial Objects

    Publication Year: 2008, Page(s):86 - 93
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (357 KB) | HTML iconHTML

    Augmented reality (AR) often makes use of a 2D fiducial marker to render computer graphics onto a video frame so that the computer-generated object appears aligned with the scene. We extend this idea to 3D where real-world objects are used as fiducial markers and propose a distributed AR system that utilizes geographically located resources to meet high computing demand, enable sustained remote op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Augmented Reality Nanomanipulator for Learning Nanophysics: The “NanoLearner”  Platform

    Publication Year: 2008, Page(s):94 - 101
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1291 KB) | HTML iconHTML

    The work presented in this paper focuses on the description and evaluation of an augmented reality nanomanipulator, called "nanoLearner platform" used as educational tool in practical works of nanophysics. Through virtual reality associated to multisensory renderings, students are immersed in the nanoworld where they can interact in real time with a sample surface or an object, using their senses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.