1,357,643 research outputs found

    Testing Students' Accountability in Cooperative Learning Classroom: a Case Study of Writing 2 Class

    Full text link
    A classroom implementing cooperative learning (CL) has to carefully design and organize the lesson so that each student could interact with others, and most importantly all students are motivated to increase each, other's process of learning. It is because CL will benefit the students when they perform interaction structured by interdependence among the students. However, one major issues emerging under the cooperative learning classroom is to make sure that students gain the lesson objectives of the ‱ designed class, and in fact, the students really learn each other as well. The teacher needs to know best that students work cooperatively among the group, and each student contributes during the learning process. Students' accountability needs to be assessed in order to achieve the benefits of CL. Therefore, one primary way to ensure accountability is through testing.This research report is to investigate both the individual and group accountability in the cooperative learning classroom and whether or not CL setting benefits the students. The research is conducted in Writing 2class in which students work in-group by doing the team project writing on paragraphs. Students' individual and group accountability is assessed by the quizzes, and it is cross-checked through the class discussion.The study shows that students' individual accountability is supported by their competence. The performance of group accountability is closely related to their competence. Their answers and responses show positive effects of working and learning each other; therefore, they do benefit from this CL setting in Writing 2 class

    The Role of Interactivity in Local Differential Privacy

    Full text link
    We study the power of interactivity in local differential privacy. First, we focus on the difference between fully interactive and sequentially interactive protocols. Sequentially interactive protocols may query users adaptively in sequence, but they cannot return to previously queried users. The vast majority of existing lower bounds for local differential privacy apply only to sequentially interactive protocols, and before this paper it was not known whether fully interactive protocols were more powerful. We resolve this question. First, we classify locally private protocols by their compositionality, the multiplicative factor k≄1k \geq 1 by which the sum of a protocol's single-round privacy parameters exceeds its overall privacy guarantee. We then show how to efficiently transform any fully interactive kk-compositional protocol into an equivalent sequentially interactive protocol with an O(k)O(k) blowup in sample complexity. Next, we show that our reduction is tight by exhibiting a family of problems such that for any kk, there is a fully interactive kk-compositional protocol which solves the problem, while no sequentially interactive protocol can solve the problem without at least an Ω~(k)\tilde \Omega(k) factor more examples. We then turn our attention to hypothesis testing problems. We show that for a large class of compound hypothesis testing problems --- which include all simple hypothesis testing problems as a special case --- a simple noninteractive test is optimal among the class of all (possibly fully interactive) tests

    Computational complexity of reconstruction and isomorphism testing for designs and line graphs

    Get PDF
    Graphs with high symmetry or regularity are the main source for experimentally hard instances of the notoriously difficult graph isomorphism problem. In this paper, we study the computational complexity of isomorphism testing for line graphs of tt-(v,k,λ)(v,k,\lambda) designs. For this class of highly regular graphs, we obtain a worst-case running time of O(vlog⁥v+O(1))O(v^{\log v + O(1)}) for bounded parameters t,k,λt,k,\lambda. In a first step, our approach makes use of the Babai--Luks algorithm to compute canonical forms of tt-designs. In a second step, we show that tt-designs can be reconstructed from their line graphs in polynomial-time. The first is algebraic in nature, the second purely combinatorial. For both, profound structural knowledge in design theory is required. Our results extend earlier complexity results about isomorphism testing of graphs generated from Steiner triple systems and block designs.Comment: 12 pages; to appear in: "Journal of Combinatorial Theory, Series A

    Resummed event-shape variables in DIS

    Get PDF
    We complete our study of resummed event-shape distributions in DIS by presenting results for the class of observables that includes the current jet mass, the C-parameter and the thrust with respect to the current-hemisphere thrust axis. We then compare our results to data for all observables for which data exist, fitting for alpha_s and testing the universality of non-perturbative 1/Q effects. A number of technical issues arise, including the extension of the concept of non-globalness to the case of discontinuous globalness; singularities and non-convergence of distributions other than in the Born limit; methods to speed up fixed-order Monte Carlo programs by up to an order of magnitude, relevant when dealing with many x and Q points; and the estimation of uncertainties on the predictions.Comment: 41 page

    Inference in receiver operating characteristic surface analysis via a trinormal model‐based testing approach

    Get PDF
    Receiver operating characteristic (ROC) analysis is the methodological framework of choice for the assessment of diagnostic markers and classification procedures in general, in both two‐class and multiple‐class classification problems. We focus on the three‐class problem for which inference usually involves formal hypothesis testing using a proxy metric such as the volume under the ROC surface (VUS). In this article, we develop an existing approach from the two‐class ROC framework. We define a hypothesis‐testing procedure that directly compares two ROC surfaces under the assumption of the trinormal model. In the case of the assessment of a single marker, the corresponding ROC surface is compared with the chance plane, that is, to an uninformative marker. A simulation study investigating the proposed tests with existing ones on the basis of the VUS metric follows. Finally, the proposed methodology is applied to a dataset of a panel of pancreatic cancer diagnostic markers. The described testing procedures along with related graphical tools are supported in the corresponding R‐package trinROC, which we have developed for this purpose

    Inference in receiver operating characteristic surface analysis via a trinormal model‐based testing approach

    Full text link
    Receiver operating characteristic (ROC) analysis is the methodological framework of choice for the assessment of diagnostic markers and classification procedures in general, in both two‐class and multiple‐class classification problems. We focus on the three‐class problem for which inference usually involves formal hypothesis testing using a proxy metric such as the volume under the ROC surface (VUS). In this article, we develop an existing approach from the two‐class ROC framework. We define a hypothesis‐testing procedure that directly compares two ROC surfaces under the assumption of the trinormal model. In the case of the assessment of a single marker, the corresponding ROC surface is compared with the chance plane, that is, to an uninformative marker. A simulation study investigating the proposed tests with existing ones on the basis of the VUS metric follows. Finally, the proposed methodology is applied to a dataset of a panel of pancreatic cancer diagnostic markers. The described testing procedures along with related graphical tools are supported in the corresponding R‐package trinROC, which we have developed for this purpose

    The Implementation Of Fast Method For Acreditation Form Supporting Data

    Full text link
    The implementation phase at FAST method is established after the Construction Phase is already completed with a reference used in implementing the application based on use case, class diagram andactivity diagram fully designed at the previous phase.The testing conducted useswhite box testing. Of the advantages is when the application is tested, it can find out codes and strategies that take a role in developing the functions of each application module effectively. This seems to support the information system development with FAST method which one of its benefits to give a performance and accurate information. At this phase there are several things to test, namely: unit testing, static and dynamic analysis, scope of statement and mutation test. The case study used in implementing the application is the form supporting data at Lampung State Polytechnic
    • 

    corecore