By Topic

2015 10th International Conference on Computer Science & Education (ICCSE)

22-24 July 2015

Filter Results

Displaying Results 1 - 25 of 207
  • [Copyright notice]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (642 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (5398 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2015, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Keynote address I: Sensing issues in the automated monitoring of the quality of drinking water

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (178 KB) | HTML iconHTML
    Freely Available from IEEE
  • Engineering forum/Panel discussion: How will computer education evolve over the next 10 years?

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Program at a glance

    Publication Year: 2015, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • General conference information

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Introduction of presentations

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information about Cambridge

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Session chairs index

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Using robotics for STEM education in primary/elementary schools: Teachers' perceptions

    Publication Year: 2015, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Robotics, with its multidisciplinary nature, integrates Science, Technology, Engineering, and Mathematics (STEM) disciplines and is considered a gateway to STEM education. This study aims to understand whether primary/elementary teachers perceive robotics as a useful tool for STEM education or not. If yes, in what capacity do they think robotics might be useful? A sample of 11 primary/elementary t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault detection in mobile robots using sensor fusion

    Publication Year: 2015, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    Fault detection and isolation in mobile robots has become a challenging task primarily due to uncertain and dynamic operating environments. The design of model-based fault detection methods would not be a practical real-time solution in view of the dynamic and uncertain nature of the problem. Also, conventional single-sensor approaches have limitations in practical applications. In this paper, a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition system for QR code on moving car

    Publication Year: 2015, Page(s):14 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (766 KB) | HTML iconHTML

    Most researches about QR code recognition were about reading QR code from image or read from motionless object. This paper proposes a system which read QR code from motion object where QR code attached on a windshield. The experiment was done by recording a video file, while the car was moving at various speeds then analyze video files. From the experiment results, the identification success rate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysing graduation project rubrics using machine learning techniques

    Publication Year: 2015, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    When grading a student's performance, determining the assessment factors is a substantial step in course evaluation. The aim of this paper is to improve the quality of the assessment criteria for our Computer Engineering Department's graduation reports. We employ machine learning methods to identify the most important evaluation rubrics that affect the overall grade given to graduation projects. F... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic network configuration in virtualized environment using GNS3

    Publication Year: 2015, Page(s):25 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Computer networking is a central topic in computer science courses curricula offered by higher education institutions. Network virtualization and simulation tools, like GNS3, allows students and practitioners to test real world networking configuration scenarios and to configure complex network scenarios by configuring virtualized equipments, such as routers and switches, through each one's virtua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-automatic generation of interactive exercises related to search algorithms

    Publication Year: 2015, Page(s):33 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    We have developed and use in our Department the Artificial Intelligence Teaching System (AITS). AITS is an adaptive and intelligent tutoring system that teaches AI aspects and uses AI techniques for personalized learning and assessment of the students. In this paper, we present the way that AITS can help students in learning search algorithms and the learning approaches and activities it offers. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded voiceprint recognition system based on GMM

    Publication Year: 2015, Page(s):38 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Gaussian mixture model (GMM) is a kind of probability and statistics model attracted much attention for its scalability and effectiveness, which is considered to be a suitable modeling algorithm for voiceprint recognition. The process of voiceprint recognition with GMM is introduced in this paper. And an embedded voiceprint recognition system is designed for the intelligent control. The experiment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian networks for representing affective agent based on situation calculus

    Publication Year: 2015, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Intelligent robots or autonomous agents that could express human-like emotions are more trustworthy when humans communicate with them. Agents choose appropriate actions not only depending on current goals and the information perceived from the environment, but also on their mental state. We take formal accounts of how to represent affective states of agents when reasoning about actions and their e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-object tracking by expanding long-tracklets

    Publication Year: 2015, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Multi-object tracking has made great progress recently by using global data association approaches which optimize all tracks simultaneously. But occlusions, false alarms and miss detections still cause many problems, e.g. track fragments, identities switches and track incompleteness. In this paper, we propose a three-stage hierarchical tracking framework based on global association, which can alle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive learning environment based on knowledge network of geometry problems

    Publication Year: 2015, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (877 KB) | HTML iconHTML

    An interactive learning environment with logic-based, convenient operation and high efficiency for mobile learning is in great and urgent need. In this paper, a knowledge network based on geometry problem solving processes is generated automatically by a rule-based automated reasoning engine. Then an interactive learning model is designed for students based on these knowledge networks to simulate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved algorithm for locality-sensitive hashing

    Publication Year: 2015, Page(s):61 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    We present an improved Locality-Sensitive Hashing for similarity search under high dimension search. Our scheme improves the running time based on the earlier algorithm Locality-Sensitive Hashing for hamming distance and euclidean distance. In this paper we have collected a database of The MNIST DATABASE, we proposed nearest neighbor search in the database and can get a good result in an acceptabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.