International Journal of Education and Management Engineering (IJEME)

IJEME Vol. 2, No. 6, Jun. 2012

Cover page and Table of Contents: PDF (size: 525KB)

Table Of Contents

REGULAR PAPERS

Discussion on Domestic Universities Construction of Digital Teaching Platform

By Jiancai Wang Hua Liang

DOI: https://doi.org/10.5815/ijeme.2012.06.01, Pub. Date: 29 Jun. 2012

With the rise of Digital Campus 2.0, the construction of digital teaching environment based on multimedia technology, network technology and modern education technology, has gradually become the mainstream of domestic higher education. According to the educational features of colleges and universities, the digital teaching system accessible to spread over should be created in the base of summing up former experiences. This paper points out the existent problems in recent construction process and proposes specific solutions and aims of this construction. Furthermore, it analyzes the main contents of the environment construction, resources construction, team construction and mechanism construction of digital teaching platform.

[...] Read more.
Tag Recommendation Based on Collaborative Filtering and Text Similarity

By Chuanbao Wang Fang Yuan Ying Yun

DOI: https://doi.org/10.5815/ijeme.2012.06.02, Pub. Date: 29 Jun. 2012

In current social tagging system, users can freely add tags for the uploaded resources, which caused a problem that many tags could not describe the resource properly and even have some spelling errors. This problem may bring unnecessary troubles for other users who want to search this kind of resource. In this paper, a tag recommendation system based on collaborative filtering and text similarity is presented to solve the problem mentioned above. This system can automatically recommend some relevant tags for the new uploaded resources and thus the users can freely select tags from the system. Experimental results show that the recommended tags can effectively represent the contents of the webpages marked. Compared with the existing tag recommended methods, this method not only improves the accuracy of tags recommended, but also facilitates the webpage sharing and retrieval.

[...] Read more.
A Research on Opinion Analysis for Book Reviews

By Na Zhai Fang Yuan Yu Wang

DOI: https://doi.org/10.5815/ijeme.2012.06.03, Pub. Date: 29 Jun. 2012

Product reviews are not only useful for trade companies to improve the quality of products, but also helpful for customers to purchase products reasonably, thus product reviews mining is valuable in application and research. In this paper, we devote the research on book reviews. We first propose a polarity dictionary construction method based on the improved CHI, and realizes dynamic addition of the dictionary; Second, the polarity calculation formula of the transitional complex sentences is improved to be applicable to book reviews. Considering that some book reviews have titles and these titles generally express the reviewers’ opinion tendency, so we further propose an opinion polarity analysis method based on the titles and the improved polarity calculation formula of the heavy transitional sentences. The experimental results show that the approach proposed in this paper is effective.

[...] Read more.
Face Recognition using Curvelet Transform and (2D)2PCA

By Ma Hui Hu Fengsong

DOI: https://doi.org/10.5815/ijeme.2012.06.04, Pub. Date: 29 Jun. 2012

This paper proposes a novel algorithm for face recognition, which is based on curvelet transform and (2D)2PCA. Contrast to traditional tools such as wavelet transform, curvelet transform has better directional and edge representation abilities. Inspired by these attractive attributes, we decompose face images to get low frequency coefficients by curvelet transform. (2D)2PCA with an exponential decay factor is applied on these selected coefficients to extract feature vectors, which will achieve dimension reduction as well. The nearest neighbor classifier is adopted for classification. Extensive comparison experiments on different data sets are carried out on ORL and Yale face database. Results prove that the proposed algorithm has high recognition accuracy and short recognition time, and it is also robust to changes in pose, expression and illumination.

[...] Read more.
The Impact of UCP600 on the Practical Teaching of International Trade Major and the Countermeasure to Cope With It

By Li Junfeng Meng Fanhua

DOI: https://doi.org/10.5815/ijeme.2012.06.05, Pub. Date: 29 Jun. 2012

The practical teaching is an important teaching process in professional education plan of international trade major. The pactice of L/C (letter of credit) settlement transaction is important content of practical teaching. The implementation of UCP600 brings new requirements for the credit business operation. About the new rules, we must make some adjustment in practical teaching of international trade in time. The paper analyzes the new changes of UCP600 comparing to UCP500, then analyzes the existing problems of international trade practical teaching. In final, the paper puts forward the countermeasures to cope with UCP600.

[...] Read more.
An Empirical Study on Determinants of Sustainable Development of Coastal Eco-tourism

By Wuling Zeng Keyi Wang Yingchao Jia

DOI: https://doi.org/10.5815/ijeme.2012.06.06, Pub. Date: 29 Jun. 2012

With the popularity of eco-tourism, the sustainability of its development has become a focus problem in both theoretical and practical fields. Based on existed research, the study summarized the determinants of sustainable development of coastal eco-tourism as four aspects, that are resource environment, economic environment, social environment and management control. And we tested the path and degree of various factors’ influence through the empirical method. Finally, we made suggestions on the development of coastal ecotourism for related departments and enterprises

[...] Read more.
Research of Network Teaching Platform Based Grid

By Zhang Shunli Yin Qingshuang

DOI: https://doi.org/10.5815/ijeme.2012.06.07, Pub. Date: 29 Jun. 2012

As an emerging technology, grid combines and integrates the whole Internet resources to form a super-computer, allowing the complete sharing of resources. Applying grid to network teaching can eliminate and solve the disadvantages and problems which exist in traditional network teaching. This paper briefly introduces the grid technology and its application in network teaching. It talks about the principle of network teaching platform based grid, design and analysis modules.

[...] Read more.
The Exploration and Practice in Innovative Personnel Training of Computer Science and Technology

By Li Jian Zhou Yuan

DOI: https://doi.org/10.5815/ijeme.2012.06.08, Pub. Date: 29 Jun. 2012

In this paper, the author expounded on the investigation and understanding in the innovative ability of the contemporary college students, and introduced their practical experience and concrete measures in theoretical teaching, practice teaching, graduation design and technological innovation activities in the specialty of the Computer Science and Technology.

[...] Read more.
Bilingual Teaching on Advanced Mathematics

By Wang Rui Wang Yawei Liang Baosong Cao Dianli

DOI: https://doi.org/10.5815/ijeme.2012.06.09, Pub. Date: 29 Jun. 2012

With progressive development of innovation and technology, education in higher college should keep up with the step of times development, the bilingual teaching of advanced mathematics is just the best choice for students to grasp mathematics knowledge and simultaneously to improve English skills, and it will be an important link in improving the quality of the entire Chinese nation. Through the bilingual teaching practice, the authors put emphasis on the important role of bilingual teaching in advanced mathematics, and further raised strategies in how to improve university students’ comprehensive ability based on bilingual teaching of advanced mathematics.

[...] Read more.
Analysis on the Present Condition Differences between the Specialty-Education of Sino-American Construction Engineering Management

By Guo Hongying Kang Xiangping MA Zhe

DOI: https://doi.org/10.5815/ijeme.2012.06.10, Pub. Date: 29 Jun. 2012

The paper, beginning from the course-system setting, the teacher-education measure, the student’s Occupational Ethics, the practice ability, the communication-ability’s cultivating and so on, makes an analysis of the differences between the specialty education of Sino-American Construction Engineering Management, points out the problems and shortcomings existing in present education of the specialty education of Project Management in our country, and puts forward some means and ways to solve the problem.

[...] Read more.
Exact Solutions of Kuramoto-Sivashinsky Equation

By Dahe Feng

DOI: https://doi.org/10.5815/ijeme.2012.06.11, Pub. Date: 29 Jun. 2012

Many nonlinear partial differential equations admit traveling wave solutions that move at a constant speed without changing their shapes. It is very important and difficult to search the exact travelling wave solutions.In this work, the auxiliary Riccati equation method and the computer symbolic system Maple are used to study exact solutions for the nonlinear Kuramoto-Sivashinsky equation. Maple can help us solve tedious algebraic calculation. Therefore many exact traveling wave solutions are successfully obtained which include some new kink (or anti-kink) wave solutions and periodic wave solutions.

[...] Read more.
An Initiative Mechanism of Safe-guarding the Codes of Migrating Instance in Migrating Workflow Based on Danger Theory

By Li Baohui Han Fangxi Wang Xiaolin

DOI: https://doi.org/10.5815/ijeme.2012.06.12, Pub. Date: 29 Jun. 2012

The mobility of Migrating Instance(MI) brings many risks to the migrating workflow system. Especially, the codes of MI face the risk of being maliciously manipulated by the hostile working places. This paper presents an initiative mechanism of safe-guarding the codes of MI based on danger theory: for MI consists of several modules in order to complete relative tasks, MI will detect whether the block MI determines to run changed before executing. If there are some changes, MI will then perceive whether the changes dangerous; if dangerous, appropriate measures will be taken to amend the damaged codes and then obfuscate them lest this module will be attacked easily again. This mechanism improves the efficiency of MI compared with other mechanism, and makes MI avoid temporary attacks, which are illustrated with the experimental results at the end of this paper.

[...] Read more.