Web Visualized Method Oriented to Internet Education Text Resources

Article Preview

Abstract:

With the explosive development of the Web2.0, Web education resources have been increasing dramatically. It is just so hard to mine some useful information among the Internet environment filled with a large number of Wed education resources. Due to the fact that human beings have strong ability to identify information quickly in visualization modes, we decide to change the Web resources into the visual form. Visual interface enables us to have more efficiency in observing, manipulating, researching, skimming, collating, comparing and comprehending large scale statistics of Web education resources[1]. In this paper, we process multi-dimension data by some software, get visual results and analyze the Internet education texts.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5817-5821

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Kan Liu, Xiaozheng Zhou, Dongru Zhou, Data Visualization Research and Development, J. Computer Engineering, 28(2002) 61-63.

Google Scholar

[2] Jinguo You, Zhuoluo Yang, Jianhua Hu, Jianqing XI, Multi-dimensional visualized Analysis Framework for Supporting Large Scale Data, J. Computer Engineering. 37(2011) 26-31.

Google Scholar

[3] Ziwei Liu, Bo Meng, Chao Wang, Visualization Method for Result of clustering, J. Computer Application Research. 5(2006) 75-77.

Google Scholar

[4] Soukup T, Davidson I. Visual Data Mining: Techniques and Tools for Data Visualization and MiningM. New York: John Wiley & Sons, Inc. 2004: 66-73.

Google Scholar

[5] Hand D, Mannila H, Smyth P. Principles of Data Mining M. US: MIT Press, Massachusetts, 2001: 34-38.

Google Scholar

[6] Hussain A. Terrorist networks analysis through argument driven hypotheses model, in: ARES 2007: Proc. of the 2nd Int'l Conf. on Availability, Reliability and Security. Washington: IEEE Computer Society Press, 2007. 480-492.

DOI: 10.1109/ares.2007.146

Google Scholar

[7] Yang CC, Liu N, Sageman M. Analyzing the terrorist social networks with visualization tools, in: Mehrotra S, et al., (Eds. ), Proc. Of Intelligence and Security Informatics. Berlin: Springer-Verlag, 2006. 331-342.

DOI: 10.1007/11760146_29

Google Scholar

[8] Hill S. Social network relation vectors for anonymous identity matching, in: Gottlob G, Walsh T, (Eds. ), Workshop on Learning Statistical Models from Relation Data, IJCAI. Morgan Kanfmann Publishers, 2003. 123-134.

Google Scholar

[9] Shexiang Ma, Guizhong Liu, Zhaohua Zeng, Wavelet-based anaylsis and forecasting for non-stationary time series,J. Journal of system engineering. 57(2000): 305-311.

Google Scholar