Search results for "Computer Science Application"
showing 10 items of 3998 documents
Emulating Human Supervision in an Intelligent Tutoring System for Arithmetical Problem Solving
2014
This paper presents an intelligent tutoring system (ITS) for the learning of arithmetical problem solving. This is based on an analysis of a) the cognitive processes that take place during problem solving; and b) the usual tasks performed by a human when supervising a student in a one-to-one tutoring situation. The ITS is able to identify the solving strategy that the student is following and offer adaptive feedback that takes into account both the problem's constraints and the decisions previously made by the user. An observational study shows the ITS's accuracy at emulating expert human supervision, and a randomized experiment reveals that the ITS significantly improves students' learning…
Visualising knowledge from chat debates in argument diagrams
2010
This study investigates whether combining chat discussion and construction of an argument diagram stimulates students to formulate new ideas in practising argumentation. In this study, 16 secondary school students discussed vivisection and gender equality in pairs using both free and structured chat tools. In structured chat, the students selected and completed partial sentences provided by the computer. After the discussion, they jointly constructed either argument diagrams freely based on the previous discussions with an Internet tool or modified a diagram the computer had constructed automatically during the structured chat. The freely constructed diagrams contained more of the students'…
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
2010
Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…
Research production in high-impact journals of contemporary neuroscience: A gender analysis
2017
Neuroscience or Neural Science is a very active and interdisciplinary field that seeks to understand the brain and the nervous system. In spite of important advances made in recent decades, women are still underrepresented in neuroscience research output as a consequence of gender inequality in science overall. This study carries out a scientometric analysis of the 30 neuroscience journals (2009–2010) with the highest impact in the Web of Science database (Thomson Reuters) in order to quantitatively examine the current contribution of women in neuroscientific production, their pattern of research collaboration, scientific content, and the analysis of scientific impact from a gender perspect…
Business-to-Business e-commerce adoption and perceived benefits: evidence from small and medium Spanish enterprises
2009
This paper focuses on the factors affecting Business-To-Business (B2B) e-commerce adoption and the perceived benefits for Small and Medium-sized Enterprises (SMEs). We propose and test a model that analyses the influence of firms' previous experience and environmental factors on e-B2B adoption and the effects of e-B2B adoption on the perceived benefits and the intention to continue adopting B2B. Our results show that the more e-B2B is used in SMEs, the higher the level of perceived benefits and this, in turn, has a positive influence on the intention to continue doing B2B e-commerce. Managerial implications of these findings are also discussed.
‘It Goes Around the World’ – Children’s Understandingof the Internet
2019
The Internet has become an important literacy environment, even for children. Therefore, building the foundations for their critical engagement with online information should start when they first enter school. One way to start is to help children build an understanding about the complexities of the Internet environment. The present study aimed at increasing our knowledge about children’s understanding of the Internet as a technical and social environment. It also explored how children perceive the trustworthiness of online information. The participants included 30 children aged 7–9 years. The children were interviewed and the data was analysed using content analysis. We share the results f…
Instruction of Digital Reading Strategies Based on Eye-Movements Modeling Examples
2018
During the last decade, several studies have proposed and tested different instructional methods for teaching digital reading strategies to young students. In this study, we have tested the effectiveness of a program combining eye-movements modeling examples (EMMEs) and contrasting cases to instruct ninth-grade students how to plan, evaluate, and monitor their digital reading. EMMEs are videos that display a dot representing the eye movements of a model and an oral transcription of her thoughts while answering a specific question in a hypertext. Students in the EMME condition obtain higher comprehension scores in a posttest performed 1 week after the instruction, as compared with a control…
Content based segmentation of patterned wafers
2004
We extend our previous work on the image segmentation of electronic structures on patterned wafers to improve the defect detection process on optical inspection tools. Die-to-die wafer in- spection is based on the comparison of the same area on two neigh- boring dies. The dissimilarities between the images are a result of defects in this area of one of the dies. The noise level can vary from one structure to the other, within the same image. Therefore, seg- mentation is required to create a mask and apply an optimal thresh- old in each region. Contrast variation on the texture can affect the response of the parameters used for the segmentation. We show a method to anticipate these variation…
Integration of multiple range and intensity image pairs using a volumetric method to create textured three-dimensional models
2001
We present a volumetric approach to three-dimensional (3D) object modeling that differs from previous techniques in that both object texture and geometry are considered in the reconstruc- tion process. The motivation for the research is the simulation of a thermal tire inspection station. Integrating 3D geometry information with two-dimensional thermal images permits the thermal informa- tion to be displayed as a texture map on the tire structure, enhanc- ing analysis capabilities. Additionally, constructing the tire geometry during the inspection process allows the tire to be examined for structural defects that might be missed if the thermal data were textured onto a predefined model. Exp…
The dynamics over the next few years of the Spanish mobile telecommunications market share: a mathematical modelling approach
2013
Taking into account available data from 2002 to 2009 about the market share percentages of the Spanish mobile telecommunications service providers, a dynamic diffusion model to study the evolution of the clients’ change between the different companies during the period 2010–2016 is proposed. The constructed model provides a tool for forecasting short-term trends about the customers’ preferences with respect to mobile network operators taking into account both, autonomous decisions due to direct marketing and advertising strategies, and also decisions adopted through interaction via social influence. The model can provide insights to companies for designing strategies in order to gain market…