The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a classroom research study that studied the effect of giving the students of a Digital Logic course the chance to retake all exams except the final. Each exam is designed to match a single learning outcome of the course. The theoretical background that the study is based upon is the Metacognitive Awareness Framework. We are reporting that the effort that the Faculty and teaching...
In this paper, we present a generic model to enrich user profiles by means of contextual and temporal information. This reflecting the current interests of these users in every period of time defined by a search session, and infers data freshness. We argue that the annotation of resources gives more transparency on users' needs. Based on this idea, we integrate social tagging in order to exploit part...
In the context of games for learning, it is argued that taking individual differences among players into consideration during game design can be beneficial for the game and/or learning experience. Researchers have studied a variety of factors that can be used for taking individual differences among players into consideration. Although research work indicates that the intelligence levels according...
This study conducted a preliminary investigation on the correlations between learners' EEG-based workload and their self-reported cognitive load in a multimedia learning context. An experiment including two learning tasks was conducted with 15 graduate students. The NeuroSky brainwave headset was used to collect participants' electroencephalography (EEG) data and using the theta/alpha ratio as brain...
Infographic is a type of information visualization that uses graphic design to enhance human ability to identify patterns and trends. It is popularly used to support spread of information. Yet, there are few studies that investigate how infographics affect learning and how individual factors, such as learning styles and enjoyment of the information affect infographics perception. In this sense, this...
Ports can be considered as a mixed network composed of different stakeholders such as private service provider companies, public organizations, professional and social associations. Each of them has its own aims and the port community exercises the role of coordinator, taking on responsibility for governance. In general, the interaction among the different actors generates strategic synergy, contributing...
In this paper, we represent the context based weighting scheme for vector space model to evaluate the relation between concept and context in Information storage and retrieval system. A meaning of a word is relatively decided by a context dynamically. A vector space model, generally use a static weighting scheme for term document matrix like latent semantic indexing (LSI), co-occurrence or correlations...
This paper investigates how different individual and institutional factors pertaining to ICT readiness influence teachers' adoption of game-based learning technologies. The data were gathered from Finnish primary, lower secondary and upper secondary school teachers (N=1668) with an online survey. The results indicate that openness towards ICT, ICT attitude and the ICT compatibility with teaching positively...
Many nations worldwide are continuing to invest in electronic government (e-government) initiatives that now demand an investigation into how well users perceive the success of these initiatives. Currently, there exists a dearth of empirical evaluation of e-government success in particular for the Australian context. Our research project, reported in this paper, is concerned with developing a conceptual...
This article addresses trust in computer systems as a social phenomenon, which depends on the type of relationship that is established through the computer, or with other individuals. It starts by theoretically contextualizing trust, and then situates trust in the field of computer science. Then, describes the proposed model, which builds on what one perceives to be trustworthy and is influenced by...
Over the past forty years, significant research has been done on story/narrative generation in which the computer is the author. Many existing systems generate stories by filling in a template or copying an analogous story (and changing the time, place, etc.) or by prompting the user to provide a start to the story. Very few systems generate variable stories without these techniques. While it is impossible...
A method of clustering ensemble is transforming the clustering ensemble problem into the clustering problem among objects in a nominal information table. The basic problem is to give a method which is used to calculate the distance between the nominal attribute value. In this paper, DILCA method is adopted to calculate the distance between the nominal attribute value. Using the correlation between...
In this study, a computerized collaborative concept-mapping approach is proposed. To evaluate the effectiveness of this innovative approach, a learning activity has been conducted on an elementary school natural science course. Two hundred and twenty fifth graders from seven classes were divided into an experimental group, in which the students learned with the proposed approach, and a control group,...
As a kind of invisible spyware that records user's keystrokes, software keyloggers have posed a great threat to user privacy and security. It is difficult to detect keyloggers because they run in a hidden mode. In this paper, an immune-inspired dendritic cell algorithm (DCA) was used to detect the existence of keyloggers on an infected host machine. The basis of the detection is facilitated through...
The decision to patent a technology is a difficult one to make for the top management of any organization. The expected value that the patent might deliver in the market is an important factor that impacts this judgement. Earlier researchers have suggested that patent prices are better indicators of value of a patent and that auction prices are the best way of determining value. However, the lack...
In Information Retrieval (IR), the similarity scores between a query and a set of documents are calculated, and the relevant documents are ranked based on their similarity scores. IR systems often consider queries as short documents containing only a few words in calculating document similarity score. In Computer Aided Assessment (CAA) of narrative answers, when model answers are available, the similarity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.