2,695 research outputs found
A Heritage Language Learner’s Literacy Practices in a Korean Language Course in a U.S. University: From a Multiliteracies Perspective
Drawing on multiliteracies, the author examines how a multiliteracies curriculum in a 3rdyear Korean heritage language (HL) class at a southeastern U.S. university contributed to the development of a student’s HL literacy skills. Print-based and multimodal responses (i.e., a digital animation movie) to the readings of students’ choices and language logs were aligned with the four components of a multiliteracies pedagogy (i.e., situated practice, overt instruction, critical framing, and transformative practice). The qualitative data analysis suggests that a multiliteracies curriculum helped an HL learner develop motivation to read in Korean, adopt an agentive take on Korean language learning, and form an emerging literate identity as a legitimate reader and writer in the HL. The author discusses important implications for reading/literacy educators in various contexts
A Framework for Discovery and Diagnosis of Behavioral Transitions in Event-streams
Date stream mining techniques can be used in tracking user behaviors as they attempt to achieve their goals. Quality metrics over stream-mined models identify potential changes in user goal attainment. When the quality of some data mined models varies significantly from nearby models—as defined by quality metrics—then the user’s behavior is automatically flagged as a potentially significant behavioral change. Decision tree, sequence pattern and Hidden Markov modeling being used in this study. These three types of modeling can expose different aspect of user’s behavior. In case of decision tree modeling, the specific changes in user behavior can automatically characterized by differencing the data-mined decision-tree models. The sequence pattern modeling can shed light on how the user changes his sequence of actions and Hidden Markov modeling can identifies the learning transition points. This research describes how model-quality monitoring and these three types of modeling as a generic framework can aid recognition and diagnoses of behavioral changes in a case study of cognitive rehabilitation via emailing. The date stream mining techniques mentioned are used to monitor patient goals as part of a clinical plan to aid cognitive rehabilitation. In this context, real time data mining aids clinicians in tracking user behaviors as they attempt to achieve their goals. This generic framework can be widely applicable to other real-time data-intensive analysis problems. In order to illustrate this fact, the similar Hidden Markov modeling is being used for analyzing the transactional behavior of a telecommunication company for fraud detection. Fraud similarly can be considered as a potentially significant transaction behavioral change
LANGUAGE USE AND PERCEPTIONS OF ENGLISH AS A FOREIGN LANGUAGE (EFL) LEARNERS IN A TASK-BASED CLASS IN "SECOND LIFE "
Situated in cognitive interactionist theory and driven by task-based language teaching (TBLT), this study employed a multiple methods design to better address research questions regarding EFL learners' language use and perceptions about their language practices during task-based interaction in Second Life (SL). Findings showed that students perceived SL as a viable platform for language learning. Nine adult EFL learners worldwide were recruited to participate in this virtual course and used avatars to interact with peers via voice chat in simulated real-life tasks.
Quantitative results revealed that confirmation checks, clarification requests and comprehension checks were the three most frequently used strategies. Two strategies that had not been documented in previous SL research were found--metacognitive strategy and "spell out the word." Negotiation patterns were also identified: single-layered and multi-layered trigger-resolution sequences. Additionally, the interrelationship among task types, negotiation and strategies was established--jigsaw task prompted the most instances of negotiation and strategy use whereas opinion-exchange task triggered the least. Results also indicated that EFL students had a statistically significant improvement on syntactic complexity and variety as well as on linguistic accuracy across all measured levels.
Three core themes emerged from qualitative data: 1) perceptions about factors that impact virtual learning experience in SL, 2) attitudes toward learning English via avatars in SL, and 3) beliefs about the effects of task-based instruction on learning outcomes in SL. SL was endorsed as a promising learning environment owing to its conspicuous features, simulated immersion, augmented reality, tele/copresence and masked identities via avatars.
This study demonstrated that implementation of task-based instruction can be maximized by 3-D, simulated features in SL, as evidenced in that 1) convergent tasks with single-outcome conditions stimulate more cognitive and linguistic processes; 2) 3-D multimodal resources in SL provide additional visual and linguistic support; 3) pre-task planning can optimize the quality of learners' linguistic performance; 4) real-life tasks that capitalize on SL features, accommodate learners' cultural/world knowledge, and simulate real-life tasks can make a difference in their virtual learning experiences; and 5) avatar identities boost learners' sense of self-image and confidence
Browse-to-search
This demonstration presents a novel interactive online shopping application based on visual search technologies. When users want to buy something on a shopping site, they usually have the requirement of looking for related information from other web sites. Therefore users need to switch between the web page being browsed and other websites that provide search results. The proposed application enables users to naturally search products of interest when they browse a web page, and make their even causal purchase intent easily satisfied. The interactive shopping experience is characterized by: 1) in session - it allows users to specify the purchase intent in the browsing session, instead of leaving the current page and navigating to other websites; 2) in context - -the browsed web page provides implicit context information which helps infer user purchase preferences; 3) in focus - users easily specify their search interest using gesture on touch devices and do not need to formulate queries in search box; 4) natural-gesture inputs and visual-based search provides users a natural shopping experience. The system is evaluated against a data set consisting of several millions commercial product images. © 2012 Authors
A Correlation Framework for Continuous User Authentication Using Data Mining
Merged with duplicate records: 10026.1/572, 10026.1/334 and 10026.1/724 on 01.02.2017 by CS (TIS)The increasing security breaches revealed in recent surveys and security threats reported in the media reaffirms the lack of current security measures in IT systems. While most reported work in this area has focussed on enhancing the initial login stage in order to counteract against unauthorised access, there is still a problem detecting when an intruder has compromised the front line controls. This could pose a senous threat since any subsequent indicator of an intrusion in progress could be quite subtle and may remain hidden to the casual observer. Having passed the frontline controls and having the appropriate access privileges, the intruder may be in the position to do virtually anything without further challenge. This has caused interest'in the concept of continuous authentication, which inevitably involves the analysis of vast amounts of data. The primary objective of the research is to develop and evaluate a suitable correlation engine in order to automate the processes involved in authenticating and monitoring users in a networked system environment. The aim is to further develop the Anoinaly Detection module previously illustrated in a PhD thesis [I] as part of the conceptual architecture of an Intrusion Monitoring System (IMS) framework
Adolescent Visual Voices: Discovering Emerging Identities Through Photovoice, Perspective and Narrative
This qualitative multicase study seeks to create dynamic pedagogical space - meaning making capacities encouraging multiple types of participation - where adolescent voices are privileged. Opening pedagogical space sits at the intersection of feminist standpoint theory, critical consciousness and social constructivism. Disturbingly, space supporting the inner lives and voices of students is shrinking in current educational environments, partially due to prescriptive curricula and rigid standards. The rationale for this study emanates from the researcher’s (as co-participant) educational journey and professional experience at the middle school and higher education levels. This study’s purpose explores, “what happens when space is created for middle school students to engage in photovoice participatory action research with narrative self-construction and perspective taking?” The writer’s assumptions comprise thinking around photography stimulating renewal of classroom space for imagining, sharing lived experiences and exploring alternative possibilities. Participants include 15 middle school students across two case studies situated in voluntary after school programs. Participant sites constitute a suburban middle school and an urban University in partnership with community outreach. Qualitative methodology, including a photovoice participatory action hybrid model, informs the two cycle analyses: visual content analysis codes photographs through frequency counts leading to meta-themes while thematic narrative analysis examines discussions and narrative self construction through In Vivo coding leading to meta-theme construction. Framed by three guiding questions, findings are advanced and through reflection and synthesis, the following analytic categories emerge supported by the conceptual framework – pedagogical space reveals strengths; diffuses power; and explores identity. Researcher assumptions are challenged as participants use pedagogical spaces to showcase, “here’s what I am,” rather than, “here’s what I long to be.” Conclusions gleaned from findings include: photographs are multiliteracies opening channels for communication, comprehension and cultural diversity; and middle school students seek power neutral opportunities to explore identity, demonstrate what they know, and engage in topics they care about. Recommendations support classroom habits integrating new literacies, museum components, bi-weekly autobiographical narratives and reflexive memo writing. This research contributes to the fields of adolescent identity, disciplinary literacy, feminist theory, participatory action research, secondary education and visual arts
Interactive visualization of event logs for cybersecurity
Hidden cyber threats revealed with new visualization software Eventpa
Initial CONNECT Architecture
Interoperability remains a fundamental challenge when connecting heterogeneous systems which encounter and spontaneously communicate with one another in pervasive computing environments. This challenge is exasperated by the highly heterogeneous technologies employed by each of the interacting parties, i.e., in terms of hardware, operating system, middleware protocols, and application protocols. The key aim of the CONNECT project is to drop this heterogeneity barrier and achieve universal interoperability. Here we report on the development of the overall CONNECT architecture that will underpin this solution; in this respect, we present the following contributions: i) an elicitation of interoperability requirements from a set of pervasive computing scenarios, ii) a survey of existing solutions to interoperability, iii) an initial view of the CONNECT architecture, and iv) a series of experiments to provide initial validation of the architecture
- …