By Topic

e-Education, e-Business, e-Management, and e-Learning, 2010. IC4E '10. International Conference on

Date 22-24 Jan. 2010

Filter Results

Displaying Results 1 - 25 of 150
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (3243 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Technical Committee

    Publication Year: 2010, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • The Role of Cognitive Styles in Investigating E-learning Usability

    Publication Year: 2010, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    E-learning has been a de facto solution for almost all higher learning institutions. The adoption has been proven to successfully aid students in their learning activities. However, there has been lack of study in further understanding the usability of e-learning courseware and its significance in the instructional design process. Therefore, we seek to explore user characteristic, users cognitive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of an E-learning Content-Making System for Information Security (ELSEC) and its Application to Anti-phishing Education

    Publication Year: 2010, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (855 KB) | HTML iconHTML

    Since information security threats and their countermeasures change every day, an educational system must continuously be updated to reflect new threats and countermeasures. Therefore, to create scalable and flexible e-learning, ¿ELSEC¿ was developed. ELSEC is an e-learning content-making system whose function is to use animation for information security education. In addition, phishing, which i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Podcast in Higher Education: Students' Experience and Assessment

    Publication Year: 2010, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (715 KB) | HTML iconHTML

    At German universities, podcasting is still a relatively new method of teaching and learning, on which only few studies are available so far. The present report aims to describe students' usage behaviour and their assessment of podcasting. The findings are based on a survey of students at the University of Flensburg, who took part in lectures recorded and made available as podcasts during the 2007... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Study and Design on Data Management Model of SQL Server CE for Mobile Application

    Publication Year: 2010, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of the Verification in Workflow Process Modeling on the Application of Petri Nets

    Publication Year: 2010, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    A critical challenge for workflow management systems is their ability to respond effectively to changes in business processes. Unfortunately, today's workflow management systems are not well suited to dealing with frequent changes, because there are few checks to assure some minimal level of correctness. This paper presents a method using Petri-Net-Based techniques which makes the workflow process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Knowledge Acquisition, Sharing Intention, and Sharing Behavior

    Publication Year: 2010, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Global Feature-Based Image Classification and Recognition in Small Sample Size Problem

    Publication Year: 2010, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (589 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Classroom with Intelligent Virtual Tutor

    Publication Year: 2010, Page(s):34 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    In order to improve the educational function of e-learning, a virtual classroom with intelligent virtual tutor has been developed. Architecture of the virtual classroom system is presented. The intelligent virtual tutor can perceive environment and make its own decision to enhance the interaction between tutor and remote students in some degree. The virtual tutor is emotive, which can help remote ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-modal Medical Image Registration Based on Gradient of Mutual Information and Morphological Haar Wavelet

    Publication Year: 2010, Page(s):39 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    In this paper, we proposed multi-modal medical image registration method, which introduces mathematical morphology into image processing, and makes full use of the non-linear multi-resolution of the morphology Haar wavelet; the image pyramid is constructed according to the different resolution, which can enhance the speed of the registration. Genetic algorithm (GA) is used to accurately obtain the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Network Cooperative Learning System Based on Virtual Reality

    Publication Year: 2010, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    The increasing widely application of Virtual Reality (VR) technology in the field of education provides novel means and methods for the modern teaching and education. The cooperative learning is a kind of teaching method that the specific teaching target cooperatively completed by multiple learners. The paper introduced VR technology into cooperative learning and constructed a Network Cooperative ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Supplier Evaluation Index System of Lean Supply Chain

    Publication Year: 2010, Page(s):47 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    This paper conducts a research of the supply chain management theories and applications based on the Lean supply chain management environment. The scientific decision-making of the Lean supply chain management is an important theoretical value and of practical significance for this research results. This paper establishes an evaluation index system using Lean supply chain. Therefore, this research... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Copetition Ecology in High-Tech Industrial Cluster

    Publication Year: 2010, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    From the perspective of copetition ecology, this paper analyzes the ecological foundation and characteristics copetition (competition and cooperation) of the HIC (high-tech industrial cluster), explains the main ways of creating the competition advantages of the high-tech industrial cluster, constructs the copetition model between high-tech industrial clusters, sets up the competition and cooperat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subsequence Partition of Time Series Based on Different Width Time Window

    Publication Year: 2010, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    Focusing on the limitation of traditional methods that the subsequences of time series are divided by the same width time window, an improved event series generation algorithm is proposed. Based on the improved event series generation algorithm, a new approach that divides the time series with different width time window is put forward. An example of time series division with different width time ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SWOT Analysis of E-learning System in Bahraini Universities

    Publication Year: 2010, Page(s):61 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    This paper will examine a number of E-learning Management and Educational Technology issues related to the introduction of the virtual E-Learning mixed with traditional learning in some business and accounting faculties in Bahraini universities and may be extended to other programs. SWOT analysis have been conducted based on actual feed back from staff and students via online suggested voting syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Evaluation Model of the Fourth Party Logistics Enterprise's Core Competence Based on Information Entropy of Fuzzy Matter-Element Theory

    Publication Year: 2010, Page(s):69 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Based on the theory of core competence, the paper analyzes the Fourth Party Logistic enterprise's concept, characteristics and function, and then it establishes evaluation index system of 4PL's core competence and uses information entropy of fuzzy matter-element model to calculate the core competence. In the end, though positive analysis, the paper proposes suggestion of evaluating and enhancing 4... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Evaluation in Alliance E-business Security

    Publication Year: 2010, Page(s):74 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    The e-business-based alliance is an advanced organization form and receives much concern at home and abroad. The issue on alliance e-business security threatens alliance normal operation, so the research on the evaluation of alliance e-business security is important. According to the connotation and research contents of alliance e-business security, the study designs the evaluation method. Applyin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Effects of Virtual Community Involvement on Online Stickiness and Repurchase Intention

    Publication Year: 2010, Page(s):79 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    As the penetration of Internet into the lifestyle, virtual community has become an important communication approach, and attracted the attentions of e-commerce sites. But so far, the relationships among virtual community involvement, online stickiness and repurchase intention have not yet been studied deeply. In this paper, structural equation modeling analysis method was used to reveal the relati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.