By Topic

2012 IIAI International Conference on Advanced Applied Informatics

20-22 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 86
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (639 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Message from the Conference General Chair

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Message from the Program Chairs

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2012, Page(s):xiii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Towards a Social Memory: Human Experience Mining and Semantic Social Networks

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB) | HTML iconHTML

    Summary form only given. World Wide Web can be seen as a massive memory for human activities and experiences, which are stored in the form of huge networks of various sorts. Not only do online news papers report on various events the public would be interested in but also personal and social media such as blog posts and twits reflect various personal activities experiences that may be related to o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internal Quality Assurance and Improvement of University Utilizing Institutional Research

    Publication Year: 2012, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB) | HTML iconHTML

    Summary form only given. In recent years, internal quality assurance in higher education becomes an international and universal trend. Many advanced precedents and studies in United States and Australia have been introduced. On the other hand, some governments provide their universities with comparatively large amount of research funds, like in United Kingdom, the Netherlands, Japan and so on. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conceptions of Learning in Technology-Enhanced Learning Environments

    Publication Year: 2012, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    Studies about students' conceptions of learning have received much attention among educators, as these conceptions may guide students' learning processes and then outcomes. Research evidence also indicates that these conceptions are related to the learning context or environment under investigation. In this talk, I will share a series of studies investigating students' conceptions of learning in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Linked Data Model for E-books

    Publication Year: 2012, Page(s):4 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    This paper proposes and develops a conceptual model for the rigorous representation, design, and utilization of e-books using RDF (Resource Description Framework) as the modeling language. The conceptual model views an e-book as a new type of information object with a complex structure in which its content is broken down into atomic units called "content nodes" and semantically linked together to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a Website to Collect and Provide Questions about Book Titles Posted in Blogs and on Twitter

    Publication Year: 2012, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    There are some people who post questions related to book titles in their blogs or on Twitter. If we develop a website that automatically collects such questions and asks for answers, other people who know the answers to these questions can respond efficiently. Hence, we have developed a method to semi-automatically collect questions from blogs and tweets, and we have built a website to display the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalization of the Paper Registration Process to Institutional Repositories

    Publication Year: 2012, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1314 KB) | HTML iconHTML

    An institutional repository is a system for archiving research outputs such as scholarly papers. In order to increase the number of archived papers in institutional repositories, the registration process controlled by repository managers should be improved. The authors of this paper conducted an investigation on the efforts involved in paper registration with institutional repositories in several ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Behavior of Thai Adolescents in the Electronic Age

    Publication Year: 2012, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    This study aimed to investigate the information behavior of Thai adolescents in the period of rapidly developing technology that affects the informational environment. This study involved qualitative research using theoretical sampling to select the study area and thirty secondary school students. Data collection was achieved by in-depth interviews. Data analysis was based on the grounded theory a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of Interest Range and Earnestness of Library Patrons from Circulation Records

    Publication Year: 2012, Page(s):25 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (511 KB) | HTML iconHTML

    The social role of library to assist patrons learn becomes more important toward the future. As our society is changing rapidly and our lives are getting longer, we will keep wishing to learn while we live. So it becomes hard to catch up with the changes of patrons' needs and requirements to libraries if librarians keep working based on the traditional role model. A recommendable idea is to utiliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of Library Loan Records for Book Recommendation

    Publication Year: 2012, Page(s):30 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    To determine the most effective book recommendation method for libraries, we conducted a recommendation experiment using (1) collaborative filtering based on the library loan records, (2) association rule mining based on the same data, and (3) Amazon. The library loan records of a certain university library for the period 2006 to 2011 were used. We recommended books to 33 students and asked them t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Multiplexed Parse Trees for Almost Instantaneous VF Codes

    Publication Year: 2012, Page(s):36 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Almost Instantaneous VF code proposed by Yamamoto and Yokoo in 2001, which is one of the variable-length to-fixed-length codes, uses a set of parse trees and achieves a good compression ratio. However, it needs much time and space for both encoding and decoding than a conventional VF code. Yoshida and Kida showed in 2010 that the set of trees can be multiplexed into a compact single tree and the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Information Extraction of Experiments from Nanodevices Development Papers

    Publication Year: 2012, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    To support development processes for nanodevices, we want to utilize the information related to experiments from nanodevice development research papers. In this paper, we propose a new guideline for constructing a tagged corpus of nanodevice development papers to achieve this goal. We also propose the use of a corpus construction support tool. To speed up the construction process, we propose an ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding What Changes for Two Graphs Constructed from Different Time Intervals

    Publication Year: 2012, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Many kinds of graph data including social networks are increasing nowadays. In such a graph, the relationships between vertices are changing day by day. We need to have a data mining method able to extract significant patterns informing us about what changes. From this viewpoint, we propose in this paper an algorithm for change detection over two graphs constructed from two time intervals, based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequent Approximate Substring Pattern Mining Using Locally Optimal Occurrence Counting

    Publication Year: 2012, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    We propose a novel frequent approximate pattern mining in which occurrences themselves are valuable regions to extract. Given a string s, our mining task is to enumerate its sub strings that locally optimally match many sub strings of s. We show an algorithm for this problem whose time and space complexities are O(n3) for a string with length n. According to our experiments using synthe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern Mining from Trajectory GPS Data

    Publication Year: 2012, Page(s):60 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In this paper, we consider data mining from large discrete trajectory data. We study closed pattern mining for the class of trajectory envelope patterns. First, we introduce the basic definition of trajectory data. Then, we present a depth-first search algorithm that finds all trajectory envelope patterns in a given database that satisfies constrants on maximum width, minimum length, and minimum f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trajectory Pattern Matching Based on Bit-Parallelism for Large GPS Data

    Publication Year: 2012, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    In this paper, we study massive trajectory search based on string matching technology. We first propose byte-oriented encoding scheme for trajectory data allowing multi-resolution search. Then, we present an efficient bit-parallel trajectory matching algorithm on byte-oriented encoded texts based on Extended SHIFT-AND method (Navarro and Raffinot, RECOMB 2001). Finally, we ran experiments on the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a Streamlined Viewport Strategy System to Enhance Performance in Context Awareness in Mobile Learning Environments

    Publication Year: 2012, Page(s):72 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Context-aware technology has been widely applied to every field of mobile learning. However, in the process of context-aware detection, mobile devices commonly produce extra barriers of risk or complexity. In the majority of educational activities, overly complex technology or procedures can have negative effects, preventing numerous technologies that use context awareness from improving learning ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile-based Blended Instruction in a Foreign Language Classroom as a Model of Enhancing Learners' Attitude

    Publication Year: 2012, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    This paper presents a new pedagogical teaching model for foreign language learning. The effect of implementation of mobile-based blended instruction in classroom on the learners' attitude of learning a foreign language will be examined. Our blended learning model is defined as the combination of face-to-face lecture, pair work and collaborative practice, and individual-level shadowing and feedback... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.