ITRE 2004. 2nd International Conference Information Technology: Research and Education

28 June-1 July 2004

Filter Results

Displaying Results 1 - 25 of 65
  • SQUADgroups - a novel tool for capturing students' online learning levels of engagement with small groups

    Publication Year: 2004, Page(s):106 - 110
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (610 KB) | HTML iconHTML

    This paper reports on preliminary findings from the evaluation of the first in-house prototype of a tool designed to support a semi-structured approach to CMC (computer mediated communication) messaging. The SUQAUDgroups software tool is dedicated to supporting and enhancing students' cognition, participation and interaction when working as part of a team collaboratively online in order to Aliver ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An online resource for the introductory programming class

    Publication Year: 2004, Page(s):101 - 105
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (700 KB) | HTML iconHTML

    The facilities and uses of the ProgrammingLand MOOseum are described. ProgrammingLand is a powerful tool to supplement a conventional classroom course in beginning Computer Science topics as well as a self-contained vehicle for distance learning. It is based on a MOO, a multiuser, interactive server accessible to anyone with Internet access. It delivers the content information, records student pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New models for higher educational curricula

    Publication Year: 2004, Page(s):69 - 73
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (673 KB) | HTML iconHTML

    Based upon experience in teaching Computer Science course in university traditional curricula, we have explored at our University the creation of new educational curricula that combines apprenticeship (i.e. an educational curriculum combining working and studying) with university studies. The project relies on the intelligent use of innovative training methodologies and technologies. We have devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mozilla Internet application suite: developing for education

    Publication Year: 2004, Page(s):96 - 100
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (690 KB) | HTML iconHTML

    Introduction to communication and resource sharing through the Internet and the World Wide Web is included in the compulsory course of informatics (nowadays - information technology) in Lithuanian comprehensive schools. There are two tracks: the first level is designed for basic schools (grade 9-10, e.g. age 15-16), the second one for secondary schools (grade 11-12, e.g. age 17-18). It is a short ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metaprogramming-based model for generation of the eLearning-oriented Web pages

    Publication Year: 2004, Page(s):64 - 68
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (691 KB) | HTML iconHTML

    We analyse ICT-based learning and consider the problem for generation of eLearning-oriented Web pages. We propose a metamodel for analysis of the problem domain as well as a metamodel for the solution domain. We represent the problem domain as a fixed set of the pre-specified parameter values and their relationships. We describe the solution domain at a higher-level as a metaspecification, which e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent security service architecture for mobile learning

    Publication Year: 2004, Page(s):91 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB) | HTML iconHTML

    M-learning continues and extends the learning paradigms and styles derived from a classroom lecture-and-seminar model, now made accessible through Web-based delivery and mobile devices. In an environment, in which circumstances make using a laptop inappropriate, a handheld device offers a convenient alternative. Communicating with anything and everything via wireless can open new opportunities for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design of SERDL (Security Evaluation Rule Description Language) and rule execution engine for evaluating security of IPv6 network

    Publication Year: 2004, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (676 KB) | HTML iconHTML

    Recently, several projects have been implementing IPv6 IPsec (IP security) on the various operating systems. But there is no existing tool that checks the systems, which provide IPsec services, work properly and provide their network security services well in the IPv6 network. In this paper, we design SERDL (Security Evaluation Rule Description Language) to define security evaluation rule and rule... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rhetorical structure theory for content-based indexing and retrieval of Web documents

    Publication Year: 2004, Page(s):160 - 164
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (645 KB) | HTML iconHTML

    The amount of information available on the Internet is currently growing at an incredible rate. However, the lack of efficient indexing is still a major barrier to effective information retrieval on the Web. This paper presents the design of a technique for content-based indexing and retrieval of relevant documents from a large collection of documents such as the Internet. The technique aims at im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D urban traffic system simulation based on geo-data

    Publication Year: 2004, Page(s):59 - 63
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (674 KB) | HTML iconHTML

    Traffic simulation is an important approach to studying a real or proposed traffic system. This paper describes a 3D traffic simulation system that is designed and implemented based on the multi-agents theory, that is, the system treats each car as an agent that has decision-making ability. The simulation environment is a virtual environment generated by geographic information system (GIS) databas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic assessment of the content of essays based on course materials

    Publication Year: 2004, Page(s):126 - 130
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (699 KB) | HTML iconHTML

    Assessing free-text responses, like essays, is a demanding task even for a human. To reduce the costs of essay grading, methods to automate the assessment process have been developed. Approaches based on surface features and content have been introduced. We present a method for evaluating the content of essays based on latent semantic analysis (LSA), which was originally developed for information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fixed broadband wireless access network architecture for on-demand interactive tutorials

    Publication Year: 2004, Page(s):87 - 90
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (540 KB) | HTML iconHTML

    Fixed broadband wireless access networks have been widely deployed in school campus for high speed duplex data transmission across an area of several kilometers. Its flexible network architecture makes such network particularly suitable for network access over a number of different locations within a school campus. Support of on-demand tutorial enables students to attend virtual classes at differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusable e-learning development: case studies, practices and issues of awareness for knowledge-based organisations

    Publication Year: 2004, Page(s):145 - 149
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (743 KB) | HTML iconHTML

    Reusable e-learning development (RED) is defined as the cloning, modification and customisation of existing files or source codes for developing another Web site or another Web-based application. RED does not imply just copying and changing existing files or source codes but rather, it provides a practical technique for time-saving, improving efficiency and maximising utility of existing resources... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless information agent powered by AspTear object

    Publication Year: 2004, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (625 KB) | HTML iconHTML

    Wireless information agent aims to provide relevant information gathered from different worldwide Web sites into a single and easy manageable Web page. Information gathered is extracted from Web sites powered by Microsoft IIS (Internet Information Server) platform and AspTear object. The application is an automated system, which collects significant information from the Web and updates system data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time performance measures of perceptual audio coding

    Publication Year: 2004, Page(s):213 - 217
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (672 KB) | HTML iconHTML

    The selection of the wavelet packet best basis of a perceptual real-time audio encoder has been a challenging task for researchers. Due to the subjective nature of the auditory masking phenomenon, fully objective performance measures (entropy versus SNR, delay, etc.) are not sufficient for the selection of optimal representations. In our work we present a DSP application by means of which we can m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using human memory structures to model knowledge within algebra virtual laboratory

    Publication Year: 2004, Page(s):155 - 159
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (706 KB) | HTML iconHTML

    In this paper we describe our knowledge representation model embodied within an algebra virtual laboratory dedicated to Boolean reduction problem solving. The model is inspired by psychology theories that explain the human cognitive activity in terms of memory subsystems and their processes. During the problem solving, complex knowledge entities, built from primitive units of knowledge, are dynami... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Companion agents for enabling B2B culture in SMB's

    Publication Year: 2004, Page(s):223 - 227
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (675 KB) | HTML iconHTML

    Small and medium sized businesses (SMBs) in Mexico represent nearly 97% of the total of industry employment, more than 76% of revenue, and nearly 50% of the GNP. Similar phenomena occur worldwide; SMB's constitute a huge growth opportunity for high tech companies. However, the technological resources that they employ are - in general - in the early stages, and many of them are underfinanced. Moreo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient data hiding approach for video retrieval on demand

    Publication Year: 2004, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (595 KB) | HTML iconHTML

    In this paper, we propose a data hiding approach to hide related information in MPEG-2 videos for their retrieval, inspired from the spirit of digital watermarking. By hiding the retrieval-related information in the MPEG compressed codes, significant advantages are gained. Our experiments on hiding more than 20 bits averagely in every 3 frames illustrate that no noticeable distortion is introduced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid error concealment in digital compressed video streams

    Publication Year: 2004, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (764 KB) | HTML iconHTML

    Transmission of a compressed video signal over a lossy communication network exposes the information to losses and errors, which may cause serious and visible degradation to the decoded video stream. We present a new hybrid error concealment algorithm, relying on temporal and spatial concealment. This algorithm includes consideration of the spatial and temporal activity in the surrounding of a los... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating diverse IT areas: bridging the gap between multimedia kiosks and the wireless world

    Publication Year: 2004, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (772 KB) | HTML iconHTML

    This paper presents a student research effort of developing a multimedia kiosk and extending its functionality to wireless mobile devices. Kiosk engine (KE) implements a framework for creating and presenting interactive multimedia kiosks. KE is implemented in Java and it can be used to present the kiosk content on both a stationary kiosk and a wireless device. This project brings together many are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student modeling with timed assessment information

    Publication Year: 2004, Page(s):121 - 125
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (645 KB) | HTML iconHTML

    This paper presents a Bayesian belief network based approach to modeling students with their timed learning assessment information. Our modeling method updates beliefs using the assessment result of a student's learning performance on a learning object along with the time spent on the assessment. The modeling process requires few parameters and takes linear time, reducing the high computational co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated peer-assisted assessment of programming skills

    Publication Year: 2004, Page(s):84 - 86
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (562 KB) | HTML iconHTML

    An "add-on" to the Coursemarker© programming environment is described that permits the use of student peer-support and peer-assessment. The students having submitted their own assignments for automatic checking by the system are required to peer-comment the programmes of a selection of their peers. This paper reports on the findings of the initial study, and suggests methods that c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Make it Machinima! Incorporating gaming technologies into e-training application creation

    Publication Year: 2004, Page(s):24 - 28
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (740 KB) | HTML iconHTML

    Scenario-based training has been used successfully for the provision of training in military and law enforcement agencies. With recent advancements in multimedia technology, it is now possible to create realistic scenarios within virtual environments, which enable learning through experimentation. The virtual scenes supporting these training applications are often created using video media that ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated programming environment for undergraduate computing courses

    Publication Year: 2004, Page(s):141 - 144
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (639 KB) | HTML iconHTML

    The Computing Division of the Business School at University College Worcester provides computing and information technology education to a range of undergraduate students. Topics include various approaches to programming, artificial intelligence, operating systems and digital technologies. Each of these has its own potentially conflicting requirements for a pedagogically sound programming environm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet drop avoidance for high-speed network transmission protocol

    Publication Year: 2004, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (643 KB) | HTML iconHTML

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in transmission control protocol (TCP) have worked well on low... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mechanism to defend SYN flooding attack based on network measurement system

    Publication Year: 2004, Page(s):208 - 212
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB) | HTML iconHTML

    SYN flooding attack is a common method employed in denial of service (DoS) and distributed denial of service (DDoS). It's hard to maintain the effective defense merely by passive defense measures such as monitoring and filtering. To avoid influencing the legitimate service requests and stop attacks at the source, the attack-detection and service-protection must be combined with the trace of the at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.