3,182 research outputs found

    BRIDGING THE DISTANCE IN OPEN AND DISTANCE LEARNING: DEVELOPING STUDENT-STUDENT AND STUDENT-LECTURER COLLABORATIVE FORUM

    Get PDF
    The internet has been a platform for individuals, groups of people and companies to interact with one another through the social media. The social media has truly aided interaction in academic settings and services through social networks, forums, blogs, among others. Forums are now been used as tools/platforms to create discussions, connect to people (mostly of similar interests) and as sources of relevant information. This work intends to make use of forums as tools in helping NOUN students to simplify their studies considering the peculiarity of the program. Based on an in-depth review of some relevant literatures, some key requirements have been considered in the development of the application. The app has been developed and tested against the objective. The system was implemented using MYSQL database, hypertext pre-processor (PHP), JavaScript and apache server. The methodology employed was Object-oriented analysis and design (OOAD). The developed system is user friendly and was designed with student, lecturers, and admin interfaces to assist users interact using friendly interfaces. The implication for students is the provision of a platform for student – student, student – lecturers and student to management interactions. Other implications for the ODL institution, the government are discussed

    Top Comment or Flop Comment? Predicting and Explaining User Engagement in Online News Discussions

    Full text link
    Comment sections below online news articles enjoy growing popularity among readers. However, the overwhelming number of comments makes it infeasible for the average news consumer to read all of them and hinders engaging discussions. Most platforms display comments in chronological order, which neglects that some of them are more relevant to users and are better conversation starters. In this paper, we systematically analyze user engagement in the form of the upvotes and replies that a comment receives. Based on comment texts, we train a model to distinguish comments that have either a high or low chance of receiving many upvotes and replies. Our evaluation on user comments from TheGuardian.com compares recurrent and convolutional neural network models, and a traditional feature-based classifier. Further, we investigate what makes some comments more engaging than others. To this end, we identify engagement triggers and arrange them in a taxonomy. Explanation methods for neural networks reveal which input words have the strongest influence on our model's predictions. In addition, we evaluate on a dataset of product reviews, which exhibit similar properties as user comments, such as featuring upvotes for helpfulness.Comment: Accepted at the International Conference on Web and Social Media (ICWSM 2020); 11 pages; code and data are available at https://hpi.de/naumann/projects/repeatability/text-mining.htm

    Behavioural Dimensions for Discovering Knowledge Actor Roles Utilising Enterprise Social Network Metrics

    Get PDF
    The identification of distinct user roles is an important theme in social media research. However, for Enterprise Social Networks (ESN), the use of social media within organisations, research identifying such roles is still lacking. Yet, understanding user roles, in particular regarding their knowledge con-tributions and communication behaviour, might usefully support companies in managing critical knowledge resources. Against this backdrop, in this research-in-progress paper we derive 16 metrics characterising the participation behaviour, message content and structural position of ESN users of an Australian professional services firm. Based on a factor analysis, we identify four distinct dimensions of ESN user behaviour: Contribution & networking, information provision, contact dispersion and invisible usage. With this research we contribute to the literature by transferring concepts and meth-ods of organisation science and social media research to an ESN context. Further, our approach forms the basis for the identification of different types of knowledge actors, which might ultimately help to improve organisational knowledge transparency

    Analysis, classification and comparison of scheduling techniques for software transactional memories

    Get PDF
    Transactional Memory (TM) is a practical programming paradigm for developing concurrent applications. Performance is a critical factor for TM implementations, and various studies demonstrated that specialised transaction/thread scheduling support is essential for implementing performance-effective TM systems. After one decade of research, this article reviews the wide variety of scheduling techniques proposed for Software Transactional Memories. Based on peculiarities and differences of the adopted scheduling strategies, we propose a classification of the existing techniques, and we discuss the specific characteristics of each technique. Also, we analyse the results of previous evaluation and comparison studies, and we present the results of a new experimental study encompassing techniques based on different scheduling strategies. Finally, we identify potential strengths and weaknesses of the different techniques, as well as the issues that require to be further investigated

    A Survey of Monte Carlo Tree Search Methods

    Get PDF
    Monte Carlo tree search (MCTS) is a recently proposed search method that combines the precision of tree search with the generality of random sampling. It has received considerable interest due to its spectacular success in the difficult problem of computer Go, but has also proved beneficial in a range of other domains. This paper is a survey of the literature to date, intended to provide a snapshot of the state of the art after the first five years of MCTS research. We outline the core algorithm's derivation, impart some structure on the many variations and enhancements that have been proposed, and summarize the results from the key game and nongame domains to which MCTS methods have been applied. A number of open research questions indicate that the field is ripe for future work

    Simulating heterogeneous behaviours in complex systems on GPUs

    Get PDF
    Agent Based Modelling (ABM) is an approach for modelling dynamic systems and studying complex and emergent behaviour. ABMs have been widely applied in diverse disciplines including biology, economics, and social sciences. The scalability of ABM simulations is typically limited due to the computationally expensive nature of simulating a large number of individuals. As such, large scale ABM simulations are excellent candidates to apply parallel computing approaches such as Graphics Processing Units (GPUs). In this paper, we present an extension to the FLAME GPU 1 [1] framework which addresses the divergence problem, i.e. the challenge of executing the behaviour of non-homogeneous individuals on vectorised GPU processors. We do this by describing a modelling methodology which exposes inherent parallelism within the model which is exploited by novel additions to the software permitting higher levels of concurrent simulation execution. Moreover, we demonstrate how this extension can be applied to realistic cellular level tissue model by benchmarking the model to demonstrate a measured speedup of over 4x

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work
    • 

    corecore