IJEME Vol. 2, No. 3, Mar. 2012
Cover page and Table of Contents: PDF (size: 606KB)
The traditional project driven teaching method is a popular teaching method of implementation of inquiry-based teaching model. However, students have the differences of the basic knowledge resulting in increasing the difficulty of the implementation of project-driven approach. This calls for revisiting the current project driven teaching process. The proposed teaching method of LTO (Learning, Training, Operating) by extending project-driven approach is presented to resolve the problems of traditional project driven teaching method challenging to teachers at universities. The LTO teaching approach encourages more students to participate in courses and stimulates outstanding students to have more developing room. At the same time, the students are led to closely track the up-to-date technology, inspired to research knowledge in-depth. Eventually, the new values are reflected in the area of engineering education from the closed university education to the open society one and from a single classroom to actual job positions. Finally, a case study are performed to testify the efficiency of the proposed model.[...] Read more.
Ad Hoc networks are characterized by frequently changing network topology. Due to the lack of central authority, forming security association among a group of members in Ad Hoc networks is more challenging than in traditional networks. With the view in mind, group key management plays an important building block of any secure group communication. In this paper, we proposed a group key management based on Identity-based Cryptosystem and Chinese Remainder Theorem. In the proposed scheme, there are no requirements of member serialization and existence of a central entity. Besides this, the scheme the protocol also many highly desirable properties such as contributory and efficient computation of group key, uniform work load for all sensor nodes and efficient support for high dynamics. Compare to other existing group key agreement protocols, the proposed protocol make no assumption about the structure of the underlying wireless network, making it suitable for Ad Hoc networks.[...] Read more.
The present study makes a comparison of social roles reflected in two series of EFL coursebooks published before and after a new round of curriculum reform started from 2001 in China by means of corpus. The purpose is to explore the cultural values embedded in EFL coursebooks, particularly shown in three aspects of social roles, namely gender, race and age. The results show that after the curriculum reform there are some obvious changes of EFL coursebooks in presenting social roles, but there is still room for further improvement.[...] Read more.
The recognition of emotions from speech is a challenging issue. In this paper, two Hidden Markov Model-based vocal emotion classifiers are trained and evaluated by an emotional mandarin speech corpus based on Mel-Frequency Cepstral Coefficient features. Up to 6 basic emotion models including angry, fear, happy, sad, neutral and surprise are built under different parameters and the influence of parameter set is investigated. A statistical comparison of the two emotion recognition methods are discussed as well. The overall results reveal that the GMM classifier outperforms HMM classifier taking both computation complexity and recognition rate into consideration with the highest recognition rate of 72.34%.[...] Read more.
Contracting with transnational corporations and their investing enterprises in China is one of the main methods of Chinese textile enterprises to participate in international production division. With many transnational corporations’ subcontracting activities entering China, more and more Chinese textile enterprises actively participate in the global production division system, which not only promotes the increase of Chinese export trade and economy, helps the employment and introduces advanced technology and management experience, but also provides a rare opportunity for the transition of textile industrial value chain as well as the growth and upgrade of domestic textile industry. Considering the factors influencing the sustainable development of Chinese textile processing enterprises, Chinese textile enterprises have much to do in improving their international competitiveness and achieving the transition of the value chain.[...] Read more.
This paper discusses one of a series of achievements of teaching reform for the national excellent course "Algorithms and Data Structures". One of the most valuable and most difficult reforms is to strengthen the practical aspects of the curriculum, while strengthening the teacher-student interactive teaching. Another innovation closely related to this teaching reform is a comprehensive scientific evaluation of teaching methods for this complex teaching process. This evaluation method will evaluate the whole process of teaching by a dynamic multi-factor evaluation. It will effectively promote the teaching level continues to increase.[...] Read more.
Aimed at the present situation of the graduation design in Department of Civil and Materials Engineering, Henan University of Urban Construction, the author analyzed the problems in graduate design, focusing on the theme of improving teaching quality, training high quality professionals, from the design layout to adjust the time, conscientiously prepare for early mobilization, rationally choice the design topic to enhance the process of guiding, strengthening teaching stuff, improve the design evaluation system.[...] Read more.
Taking the requirement and the education goal of software engineering application talented person as guidance, referring to advanced ideas of the international CDIO higher engineering education, combining realities of software engineering undergraduate educates, this paper presents that innovative SE-CDIO pattern for the cultivation of software engineers is developed and implemented in curriculum system, practice teaching and other respects in the software engineering undergraduate specialty of Beijing Information Science & Technology University. Through designing SE-CDIO application personnel cultivation program for software engineering undergraduates, carrying out educational reform practice positively, we raise diligently the quality of software engineering undergraduates who conforms to the discipline and social development need, at the same time promote discipline and specialized development.[...] Read more.
Knowledge transfer is the foundation of group scientific and research activities, and the life line of the knowledge innovation of science and research group. However, there are various difficulties for the internal knowledge transfer in the science and research group of high technology enterprises, which hinders the improvement of the knowledge innovation and performance of the science and research groups of high technology enterprises. The knowledge transfer situation in the science and research groups of high technology enterprises is worrying. The key of the management of the science and research group in high technology enterprises is the cooperation among members. For the group operation, only mutual trust is not sufficient. There should be effective encouraging and restriction mechanism to motivate members’ enthusiasm of knowledge transfer and avoid members’ moral risks.[...] Read more.
In the high technologic society, knowledge is the most important thing. It decides the direction of the country; so, as a developing country, the most important thing is to develop education, especially the high education, such as graduate education and doctoral education. Developed countries have developed high education more than 100 years, so, developing countries should simulate their experience in order to reduce the time and attain a high level as the developed countries. At the same time, according to the social practical requirement, developing countries should develop their own characters about graduate of business administration.[...] Read more.
Taking the western Qinling Mountain, in the southern Shaanxi Province of china, as an example, based upon comprehensive analysis of geological data for 20 debris flow gullies, the author has put forward a series of indices system and has developed the immune genetic neural network system, which can quantitatively evaluate the dangerous degree of mine debris flow. This software system manage initial data through Access’s data-base technology, and determine and optimize the hidden layer network by immune genetic algorithm, as well as achieve the dangerous degree evaluation of mine debris flow by virtue of artificial neural network which has been successfully trained. The calculating results of mine debris flow examples testify that this method is reliable and can accurately evaluate the dangerous degree of mine debris flow. These evaluation results have some important instructive significance for the disaster prevention and reduction of mine debris flow.[...] Read more.