Search results for "GENRE"
showing 10 items of 4351 documents
MEMORIA: A computer program for experimental control of verbal learning and memory experiments with the Apple II microcomputer
1983
Machine Learning Methods for One-Session Ahead Prediction of Accesses to Page Categories
2004
This paper presents a comparison among several well-known machine learning techniques when they are used to carry out a one-session ahead prediction of page categories. We use records belonging to 18 different categories accessed by users on the citizen web portal Infoville XXI. Our first approach is focused on predicting the frequency of accesses (normalized to the unity) corresponding to the user’s next session. We have utilized Associative Memories (AMs), Classification and Regression Trees (CARTs), Multilayer Perceptrons (MLPs), and Support Vector Machines (SVMs). The Success Ratio (SR) averaged over all services is higher than 80% using any of these techniques. Nevertheless, given the …
Developing Online Collaborative Games for e-Learning Environments
2014
Based on our experience, we believe that games, competition and teamwork offer a pleasant and active way of learning. This is much more efficient when the learner has a smile on his face, when he is astonished and curious about next levels and finds the game sufficiently challenging and fun to try again. Our application proposal has the purpose of implementing an e-Learning platform for improving the teaching and learning process in somewhat abstract domains, such as computer architecture or object oriented programming, with the help of games. These games are time-dependent and are able to support collaboration between groups. To this date there are two learning games implemented: a crosswo…
Review of detection, assessment and mitigation of security risk in smart grid
2017
The integration of Information and Communication Technology (ICT) into the existing power grid has created new problems to the grid. The grid network has become more vulnerable to security threats and risk which is a corollary to the modern data network. Smart Grid has strict latency requirement for data communication and the violation of this latency is very costly. This paper assesses the threats and vulnerabilities associated with the Smart Grid network and reviews the methods to mitigate these security risks.
Self-generated Drawing: A Help or Hindrance to Learning from Animation?
2017
The considerable potential of animations to aid learning about dynamic systems too often remains unfulfilled when the targeted subject matter is complex and unfamiliar. Various approaches designed to support learning from animation in such cases have met with limited success. Recent studies on learning from demanding texts indicate that educational outcomes can be improved if learners are required to self-generate drawings during their study of a text. This improvement has been attributed to the role of drawing in fostering deeper learner processing of the presented information and superior self-regulation as learning proceeds. It is possible that learner self-generation of drawings during …
Automatic generation of emissivity maps on a European scale
2009
The remote sensing measurement of the land surface temperature from satellites provides an overview of this magnitude on a continuous and regular basis. The study of its evolution in time and space is a critical factor in many scientific fields such as weather forecasting, detection of forest fires, climate change, and so on. The main problem of making this measurement from satellite data is the need to correct the effects of the atmosphere and the surface emissivity. In this work, these corrections have been made using a split-window algorithm. The aim was to define an enhanced vegetation cover method and develop a system that used it, in order to automatically generate maps of land surfac…
A Hidden Curriculum? Coeducation and Gender Identity
2000
Different subjects, in particular, are shown to be gendered, and it is a feet that children invest and excel in subject matters in accordance with their sex. Findings cm the reinforcement of gender stereotypes are more convergent with studies showing much more clear-cut differences in attitude between boys and girls in mixed groups. Coeducation holds back intellectual and personal development because it gives particular cogency to the cognitive processes of gender categorisation not only of fields and professions, but also of one's self and of others. Most importantly, probably, is the socialisation process that takes place simply through the cohabitation of the two groups, with their suppo…
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
A Taxonomy as a Vehicle for Learning
2009
In this article, we describe the development of a classification system providing a framework for analysis of, and communication about, a subgroup of learning objects. The objects we consider are highly visual, animated, interactive, and mathematics-related, and we call them VaniMaps. Secondly, we discuss the use of the system. In the first phase, the development was based on literature studies and discussions on examples of VaniMaps. In the second phase, the classification system was tested by students and their responses were analyzed to identify possible improvements. Now, the system is developed further based on experience gained while using it for different purposes. We see several pos…
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.