By Topic

e-Education, e-Business, e-Management, and e-Learning, 2010. IC4E '10. International Conference on

Date 22-24 Jan. 2010

Filter Results

Displaying Results 1 - 25 of 150
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (3243 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (165 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (174 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (120 KB)  
    Freely Available from IEEE
  • Technical Committee

    Page(s): xix - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • The Role of Cognitive Styles in Investigating E-learning Usability

    Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    E-learning has been a de facto solution for almost all higher learning institutions. The adoption has been proven to successfully aid students in their learning activities. However, there has been lack of study in further understanding the usability of e-learning courseware and its significance in the instructional design process. Therefore, we seek to explore user characteristic, users cognitive styles, their current views about e-learning usability and perceived importance of its usability design features. A survey was conducted in one of the universities in Malaysia where e-learning courseware is extensively deployed. Discussion of the findings is provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of an E-learning Content-Making System for Information Security (ELSEC) and its Application to Anti-phishing Education

    Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (855 KB) |  | HTML iconHTML  

    Since information security threats and their countermeasures change every day, an educational system must continuously be updated to reflect new threats and countermeasures. Therefore, to create scalable and flexible e-learning, ¿ELSEC¿ was developed. ELSEC is an e-learning content-making system whose function is to use animation for information security education. In addition, phishing, which is defined as fraud designed to steal personal information through misleading emails and websites, has increased in recent years. This paper describes the development objectives, structure, and functions of ELSEC, as well as its application to anti-phishing education and evaluation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Podcast in Higher Education: Students' Experience and Assessment

    Page(s): 12 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (715 KB) |  | HTML iconHTML  

    At German universities, podcasting is still a relatively new method of teaching and learning, on which only few studies are available so far. The present report aims to describe students' usage behaviour and their assessment of podcasting. The findings are based on a survey of students at the University of Flensburg, who took part in lectures recorded and made available as podcasts during the 2007 summer term and 2007/08 winter term. A total of 148 students took part at the two survey sessions. The majority of the surveyed students are inexperienced in the use of podcasts, as the descriptive results show. For most of the re- spondents, lecture podcasts were their first contact with this medium. Mainly a notebook is used to listen - at home - to the podcast of the recorded lecture. The focus in this regard is on playing back or catching up on the lecture at a later point in time. The main purpose for the students is to systematically prepare ahead of written tests and examinations. Slightly more than half of the respondents consider the opportunity to use podcasts to be no substitute for attending lectures. A clear factor in the success of lecture podcasts is that they are available with no cost involved. Another important factor is that the students can reuse and replay the recorded lecture. Podcasts are considered a possibility to assimilate the contents of lectures better and more efficiently. Students who do not use lecture podcasts justify this by stating that they have difficulties in learning with a computer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Study and Design on Data Management Model of SQL Server CE for Mobile Application

    Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (567 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    At present, as a new trend of the telecommunication industry, mobile application requires refine the technique of data management continuously, therefore, mobile database has been come into being. The thesis mainly focused on the introduction of mobile database and the characteristics of data management, especially analyzed the architecture and functions of the SQL Server CE. On this basis, according to the characteristics of mobile application, the backup and recovery locally and interface functions which are similar to storage process were added up, then, a data management model of mobile database was proposed for applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of the Verification in Workflow Process Modeling on the Application of Petri Nets

    Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    A critical challenge for workflow management systems is their ability to respond effectively to changes in business processes. Unfortunately, today's workflow management systems are not well suited to dealing with frequent changes, because there are few checks to assure some minimal level of correctness. This paper presents a method using Petri-Net-Based techniques which makes the workflow process model verification mechanism integrated into the graphical process design component. As well as the verification process and verification approach are described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Knowledge Acquisition, Sharing Intention, and Sharing Behavior

    Page(s): 25 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (475 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    This paper aims at reciprocity between knowledge acquisition and sharing within workgroups. In spite of mandate or volition, knowledge sharing is happened in workplace more or less. In light of favor change, employee will reciprocates knowledge in order to support future exchange. An instable causality between intention and behavior tossed by Fishbein and Ajzen (1980) is explored in the current study that knowledge sharing intention-behavior could be invalid in the case of low knowledge acquisition. Empirical data were collected from 100 three-person groups and valid samples were used to verify our research model statistically. Research results pointed out that reciprocity is critical to knowledge exchange. Particularly, knowledge acquisition not only relates to attitude and intention, but also intervenes in intention-behavior causality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Global Feature-Based Image Classification and Recognition in Small Sample Size Problem

    Page(s): 30 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (589 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    In this paper, we designs an image classification and recognition systems. With a series approaches of image pre-processing, segmentation and tracking, extract the global image characteristic parameters ( the characteristics of the whole picture). According to obtain the characteristic parameters to realize the image classification and identification. Since this article mainly related to small sample data, so the use of nuclear multi-feature linear discriminant analysis (kernel multi-feature FLDA, short kMFLDA), KNN method and support vector machine (SVM) Comparison of three methods of classification and recognition rate, experimental results show that the support vector machine (SVM) classification recognition rate higher, more reliable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Classroom with Intelligent Virtual Tutor

    Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (664 KB) |  | HTML iconHTML  

    In order to improve the educational function of e-learning, a virtual classroom with intelligent virtual tutor has been developed. Architecture of the virtual classroom system is presented. The intelligent virtual tutor can perceive environment and make its own decision to enhance the interaction between tutor and remote students in some degree. The virtual tutor is emotive, which can help remote students enhance their understanding of the content. The system presented is used to learn course ¿Electronics¿ for sophomore. It's for blended education, as a necessary supplement for real-life and regular classroom teaching and learning, which is competent to achieve tutoring tasks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-modal Medical Image Registration Based on Gradient of Mutual Information and Morphological Haar Wavelet

    Page(s): 39 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    In this paper, we proposed multi-modal medical image registration method, which introduces mathematical morphology into image processing, and makes full use of the non-linear multi-resolution of the morphology Haar wavelet; the image pyramid is constructed according to the different resolution, which can enhance the speed of the registration. Genetic algorithm (GA) is used to accurately obtain the optimal parameters. In addition, we use the gradient of mutual information to measure the similarity between the two images. Introducing the gradient information into the mutual information makes the registration algorithm more robust and more accurate. The experiment shows that this algorithm can do more effectively and more accurately work than the algorithm based on Haar wavelet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Network Cooperative Learning System Based on Virtual Reality

    Page(s): 43 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (220 KB) |  | HTML iconHTML  

    The increasing widely application of Virtual Reality (VR) technology in the field of education provides novel means and methods for the modern teaching and education. The cooperative learning is a kind of teaching method that the specific teaching target cooperatively completed by multiple learners. The paper introduced VR technology into cooperative learning and constructed a Network Cooperative Learning System (NCLS) based on VR technology. The integrated construction schema was designed. The working process and information flow of its typical application was also analyzed. It is convenient to actualize remote cooperative learning, distributed learning or independent learning based on the constructed system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Supplier Evaluation Index System of Lean Supply Chain

    Page(s): 47 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (266 KB) |  | HTML iconHTML  

    This paper conducts a research of the supply chain management theories and applications based on the Lean supply chain management environment. The scientific decision-making of the Lean supply chain management is an important theoretical value and of practical significance for this research results. This paper establishes an evaluation index system using Lean supply chain. Therefore, this research through the senior experts' questionnaires in related fields and the use of the questionnaires measuring of JIT model obtains the related actual data. The SPSS software is used to perform the statistical analysis of this data. A combination of quantitative and qualitative methods of evaluation is adopted to clarify the evaluation criteria. This research provides the evaluation basis for the selection decision-making of lean manufacturing industry supplier. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Copetition Ecology in High-Tech Industrial Cluster

    Page(s): 52 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    From the perspective of copetition ecology, this paper analyzes the ecological foundation and characteristics copetition (competition and cooperation) of the HIC (high-tech industrial cluster), explains the main ways of creating the competition advantages of the high-tech industrial cluster, constructs the copetition model between high-tech industrial clusters, sets up the competition and cooperative ecological model among enterprises in the modern industrial cluster at the same time. It gives a new methodology based on copetition ecology to study HIC, offers a reference for research on the high-tech industrial cluster. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subsequence Partition of Time Series Based on Different Width Time Window

    Page(s): 57 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (271 KB) |  | HTML iconHTML  

    Focusing on the limitation of traditional methods that the subsequences of time series are divided by the same width time window, an improved event series generation algorithm is proposed. Based on the improved event series generation algorithm, a new approach that divides the time series with different width time window is put forward. An example of time series division with different width time window is also presented in the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SWOT Analysis of E-learning System in Bahraini Universities

    Page(s): 61 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    This paper will examine a number of E-learning Management and Educational Technology issues related to the introduction of the virtual E-Learning mixed with traditional learning in some business and accounting faculties in Bahraini universities and may be extended to other programs. SWOT analysis have been conducted based on actual feed back from staff and students via online suggested voting system or the traditional way, the outcome will measure the effectiveness of e-learning system by being able to trace the students' preferences, and to find a new opportunities to apply the e-learning environment in Bahraini universities, which will associate or affiliate people in the community to join virtual university. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Evaluation Model of the Fourth Party Logistics Enterprise's Core Competence Based on Information Entropy of Fuzzy Matter-Element Theory

    Page(s): 69 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    Based on the theory of core competence, the paper analyzes the Fourth Party Logistic enterprise's concept, characteristics and function, and then it establishes evaluation index system of 4PL's core competence and uses information entropy of fuzzy matter-element model to calculate the core competence. In the end, though positive analysis, the paper proposes suggestion of evaluating and enhancing 4PL's core competence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Evaluation in Alliance E-business Security

    Page(s): 74 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (275 KB) |  | HTML iconHTML  

    The e-business-based alliance is an advanced organization form and receives much concern at home and abroad. The issue on alliance e-business security threatens alliance normal operation, so the research on the evaluation of alliance e-business security is important. According to the connotation and research contents of alliance e-business security, the study designs the evaluation method. Applying to BP neural network, the study scientifically establishes the evaluation system of alliance e-business security basing on the analysis of alliance macroeconomic environment and internal environment research. Through empirical research, the study analyses the existing situation of manufacturing industry alliance e-business security and provides suggestions for reference to solve the issue on alliance e-business security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Effects of Virtual Community Involvement on Online Stickiness and Repurchase Intention

    Page(s): 79 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    As the penetration of Internet into the lifestyle, virtual community has become an important communication approach, and attracted the attentions of e-commerce sites. But so far, the relationships among virtual community involvement, online stickiness and repurchase intention have not yet been studied deeply. In this paper, structural equation modeling analysis method was used to reveal the relationships. The results show that: virtual community involvement significantly positively affects online stickiness and online customer satisfaction, but dose not significantly affects online customer trust. Online customer satisfaction, online stickiness and online customer trust have significant positive effects on repurchase intention. This study might help e-commerce sites to improve online stickiness and foster repurchase intention. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.