Applied Mechanics and Materials
Vol. 299
Vol. 299
Applied Mechanics and Materials
Vols. 295-298
Vols. 295-298
Applied Mechanics and Materials
Vols. 291-294
Vols. 291-294
Applied Mechanics and Materials
Vol. 290
Vol. 290
Applied Mechanics and Materials
Vol. 289
Vol. 289
Applied Mechanics and Materials
Vol. 288
Vol. 288
Applied Mechanics and Materials
Vols. 284-287
Vols. 284-287
Applied Mechanics and Materials
Vol. 283
Vol. 283
Applied Mechanics and Materials
Vol. 282
Vol. 282
Applied Mechanics and Materials
Vol. 281
Vol. 281
Applied Mechanics and Materials
Vols. 278-280
Vols. 278-280
Applied Mechanics and Materials
Vols. 275-277
Vols. 275-277
Applied Mechanics and Materials
Vol. 274
Vol. 274
Applied Mechanics and Materials Vols. 284-287
Paper Title Page
Abstract: Competency-based Learning Theory (CBLT) emphasizes that learners are protagonists in the entire learning process. In order to achieve the predictive learning targets of learners, CBLT make much of the individual differences between learners, and use the personal adaptive learning route in the CBLT procedure with evaluation, feedback, and modification. This paper used CBLT to be a foundation of system design, and to apply the CBLT procedure to guide learners to study adaptively. Our system implemented from CBLT can provide a personal adaptive learning route to learners, and has the adaptively-guiding assistant learning ability to help learners to learn independently and adaptively. The results of the experiment indicate that the learners could learn in the system independently and adaptively without teacher involvement while the learning courses had standard range and could be classified to several categories according the content characters. The results of the experiment proved this Adaptively-guiding Web-based E-learning (AGWBE) System based on CBLT was an effective computer-assisted instruction system that could guide learners to study independently and adaptively, then to share the teacher’s teaching workload efficiently.
3305
Abstract: In existing image search systems, image queries can be used to find similar images through content-based image retrieval (CBIR). In order to obtain more related images, users often need to provide descriptions of the image as the keywords for search engine to extract more relevant information. But it is difficult to find appropriate keywords and text description from the image content. Searching for relevant information from search engines takes a lot of time. In this paper, we propose a CBIR system which effectively finds similar images by comparing image contents and the image annotation embedded in the image. First, we use discrete wavelet transform and two-dimensional code to embed the relevant text information or tags into the image. Then, we extract color ratios and Scale-Invariant Feature Transform (SIFT) descriptors as the image features for similarity matching. The experimental results showed that our proposed approach can accurately find similar images, and extract image-related textual information to provide useful tags for users.
3310
Abstract: Despite the growing interest in interactive storytelling techniques, their actual applications to traditional gameplay design remain to be investigated. However, many game designers have expressed concerns about the incorporation of such generative techniques in traditional game titles, mainly because of the lack of control they will have over dynamically generated content. This paper proposes an authoring tool allowing game designers to formalize, visualize, modify, and validate game level solutions in the form of automatically generated storyboards. This system uses planning techniques to produce a level solution consistent with gameplay constraints. The main planning agent corresponds to the player character, and the system uses the game actions as planning operators and level objectives as goals to plan the level solutions. Especially, in Serious Game, on the one hand, we offer an easier access and a multi-perspective view of cultural heritage artifacts, and, on the other, may also enrich and improve cultural heritage education.
3315
Abstract: Many partitioning techniques have been proposed to accelerate data access in the data warehouse. However, these techniques cannot be directly applied to object- relational data model. This work proposes a partitioning-based approach for efficiently accessing data in an object-relational data warehouse.
3320
Abstract: This paper presents a proposed Cross-Language Document Retrieval experimental platform integrated with preprocessing of training data, document translation, query generation, document retrieval and precision evaluation modules. Given a certain document in source language, it will be translated into target language by statistical machine translation module which is trained by selected training data. The query generation module then selects the most relevant words in the translated version of the document as searching query. After all the documents in the target language are ranked by the document retrieval module, the system will choose the N-best documents as its target language versions. Finally, the results can be evaluated by precision evaluator, which can reflect the merits of the strategies. Experimental results showed that this platform was effective and achieved very good performance.
3325
Abstract: The technology of Radio Frequency Identification System (RFID) was being applied to various trade promotions, and Tag is considered to be the next generation of Barcode. However, the RFID is via transmission of radio frequency manner, so hacker could obtain information through the analysis way of frequency signal. The personal privacy will be violated if used in the user's privacy information and transmission without any protective measures to protect. RFID data transmission and storage with hardware ways to achieve the security of information is the best way, but this had been in the problem of Tag costs and capacity. The study taking from the applications ways is to achieve RFID information security and privacy, and do the information securities between the low-cost Tag and the Reader. The study submitted an EPC specification and combined with XOR logical implementation model to achieve privacy by the way of discussion currently. We got the data after simulations to show that XOR computing to 8 bytes actual test, the required time is 17.29 Ticks in average, the spend time is rather short. Follow-up our simulations to the test data of DES encryption methods, an average time of 8,039.41 Ticks is required, the two time required considerable differences.
3330
Abstract: Despite the advent of e-payment decades ago, the cashless society is still a prediction of pundits, in particular, in the retail or business-to-customer sector. No doubt, there are countless financial, political, economic, and social considerations as to the possibility of e-payment’s utilization to a larger extent than has occurred so far, but it is undeniable that there may still be ample room for technical improvement to virtually all existing e-payment mechanisms for catalyzing further popularization. Based on the literature on crucial factors determining particular e-payment mechanisms achieving critical mass, this article, given its applied and industrial rather than theoretical nature, summarizes the weaknesses of major existing e-payment mechanisms, deduces the key technical dilemmas underlying such weaknesses, and finally proposes an innovative but low-cost e-payment mechanism (now a patent pending of the author) to surmount such dilemmas by means of the enhancement and generalization of existing mobile phone tickets or otherwise. In particular, overcoming such dilemmas involves the provision of highly secure authentication and non-repudiation that are implementable over public communication transmission media and/or networks at no expense of payment success rates, operational ease and efficiency, hardware and software independence, and interoperability and portability. This article also illustrates the way to extend the proposed mechanism to such applications as e-ticketing and e-identity documents.
3335
Abstract: The software analysis and design could be executed by Object Oriented architecture, but it might be unsuitable for Web Services due to their interoperability and transmission. Oppositely, the Service-Oriented and Resource-Oriented Architectures should allow of them. The software builds up a bridge between two Internet services or resources. This study has proposed what software analysis and design of Web Services can adopt the Structure-Behavior Coalescence Diagram and UML-like state and class diagrams as domain description language with Model-Driven Architecture development cycle. The case study of Plurk social website is successfully tested and verified.
3340
Abstract: This study used rectangular fins with constant heat transfer coefficient as material to discuss convective and radiative heat transfer, so as to prove that the hybrid spline difference method proposed in this study is an easy to operate method with high accuracy. According to the computational process described in this paper, the hybrid spline difference method is as simple as finite difference method and is easy to use. The complex computational process of traditional spline method can be simplified by using this method, but the numerical accuracy can be increased to second order. Therefore, the high accuracy numerical method of hybrid spline difference method replacing traditional spline method for future heat transfer analyses is expectable.
3345
Abstract: The worsening impact of piracy in recent years, downloadable content system is the current trend to against Piracy. The main purpose of the study download content elements, can effectively provide attractive of content, the downloadable content to enter a more competitive edge. Its elements of the downloadable content will be different. This study places the focus on the use of network-level analysis (ANP) decision support tools, different elements of the downloadable content systems effectiveness in the fight against piracy analysis of case studies. The combination of network-level analysis-based approach, this paper can provide game publishers with the method of downloadable content production, realistic, and accurately in the selection of downloadable content system.
3352