{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:58:36Z","timestamp":1726070316118},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030433086"},{"type":"electronic","value":"9783030433093"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43309-3_80","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T11:02:50Z","timestamp":1583838170000},"page":"569-575","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Based on the Artificial Intelligence Technology in Higher Vocational English Major Students After-School Tutoring System Design Research"],"prefix":"10.1007","author":[{"given":"Rong","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,11]]},"reference":[{"issue":"4","key":"80_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5334\/ijic.2534","volume":"16","author":"R Miller","year":"2016","unstructured":"Miller, R.: Crossing the cultural and value divide between health and social care. Int. J. Integr. Care 16(4), 10 (2016)","journal-title":"Int. J. Integr. Care"},{"issue":"6","key":"80_CR2","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1080\/17470218.2015.1099711","volume":"70","author":"Y Shi","year":"2017","unstructured":"Shi, Y., Sedikides, C., Cai, H.: Disowning the self: the cultural value of modesty can attenuate selfpositivity. Q. J. Exp. Psychol. 70(6), 1023\u20131032 (2017)","journal-title":"Q. J. Exp. Psychol."},{"issue":"1","key":"80_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.7459\/ept\/39.1.05","volume":"39","author":"A Akkari","year":"2017","unstructured":"Akkari, A., Bauer, S., Radhouane, M.: Do teachers coming from diverse ethno-cultural backgrounds represent an added value for the profession? Findings of a study conducted in French-speaking Switzerland. Educ. Pract. Theory 39(1), 69\u201389 (2017)","journal-title":"Educ. Pract. Theory"},{"issue":"60","key":"80_CR4","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.system.2016.06.007","volume":"2016","author":"R Gooch","year":"2016","unstructured":"Gooch, R., Saito, K., Lyster, R.: Effects of recasts and prompts on second language pronunciation development: teaching English \/r\/ to Korean adult EFL learners. System 2016(60), 117\u2013127 (2016)","journal-title":"System"},{"issue":"2","key":"80_CR5","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1108\/CCSM-11-2014-0125","volume":"23","author":"WE Hopkins","year":"2016","unstructured":"Hopkins, W.E., Scott, S.G.: Values-based leadership effectiveness in culturally diverse workplaces. Cross Cult. Strategic Manage. 23(2), 363\u2013385 (2016)","journal-title":"Cross Cult. Strategic Manage."},{"issue":"2","key":"80_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TLT.2016.2514422","volume":"10","author":"K VanLehn","year":"2017","unstructured":"VanLehn, K., Wetzel, J., Grover, S.: Learning how to construct models of dynamic systems: an initial evaluation of the dragoon intelligent tutoring system. IEEE Trans. Learn. Technol. 10(2), 154\u2013167 (2017)","journal-title":"IEEE Trans. Learn. Technol."},{"issue":"12","key":"80_CR7","doi-asserted-by":"publisher","first-page":"10385","DOI":"10.1166\/jctn.2016.6170","volume":"13","author":"K Yan","year":"2016","unstructured":"Yan, K.: The construction and application of the corpus system in primary school English classroom: taking Hainan Province as an example. J. Comput. Theor. Nanosci. 13(12), 10385\u201310390 (2016)","journal-title":"J. Comput. Theor. Nanosci."},{"issue":"1","key":"80_CR8","first-page":"16","volume":"21","author":"H-T Hung","year":"2017","unstructured":"Hung, H.-T.: The integration of a student response system in flipped classrooms. Lang. Learn. Technol. 21(1), 16\u201327 (2017)","journal-title":"Lang. Learn. Technol."},{"issue":"9","key":"80_CR9","doi-asserted-by":"publisher","first-page":"2884","DOI":"10.1007\/s10489-017-1079-9","volume":"48","author":"M Li","year":"2018","unstructured":"Li, M.: Example-based learning using heuristic orthogonal matching pursuit teaching mechanism with auxiliary coefficient representation for the problem of de-fencing and its affiliated applications. Appl. Intell. 48(9), 2884\u20132893 (2018)","journal-title":"Appl. Intell."},{"issue":"17","key":"80_CR10","doi-asserted-by":"publisher","first-page":"4832","DOI":"10.1523\/JNEUROSCI.0159-16.2016","volume":"36","author":"ST Albert","year":"2016","unstructured":"Albert, S.T., Shadmehr, R.: The neural feedback response to error as a teaching signal for the motor learning system. J. Neurosci. Off. J. Soc. Neurosci. 36(17), 4832\u20134845 (2016)","journal-title":"J. Neurosci. Off. J. Soc. Neurosci."}],"container-title":["Advances in Intelligent Systems and Computing","Cyber Security Intelligence and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43309-3_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T11:13:59Z","timestamp":1583838839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43309-3_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030433086","9783030433093"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43309-3_80","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Cyber Security Intelligence and Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csia2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csia2020.com\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}