489 research outputs found

    Evaluation of usage patterns for web-based educational systems using web mining

    Get PDF
    Virtual courses often separate teacher and student physically from one another, resulting in less direct feedback. The evaluation of virtual courses and other computer-supported educational systems is therefore of major importance in order to monitor student progress, guarantee the quality of the course and enhance the learning experience for the student. We present a technique for the usage evaluation of Web-based educational systems focussing on behavioural analysis, which is based on Web mining technologies. Sequential patterns are extracted from Web access logs and compared to expected behaviour

    マーカーレス腫瘍位置決めを目的とした深層学習に基づく患者固有標的輪郭予測モデルの開発

    Get PDF
    京都大学新制・課程博士博士(人間健康科学)甲第24542号人健博第113号新制||人健||8(附属図書館)京都大学大学院医学研究科人間健康科学系専攻(主査)教授 中尾 恵, 教授 杉本 直三, 教授 黒田 知宏学位規則第4条第1項該当Doctor of Human Health SciencesKyoto UniversityDFA

    Data mining technology for the evaluation of web-based teaching and learning systems

    Get PDF
    Instructional design for Web-based teaching and learning environments causes problems for two reasons. Firstly, virtual forms of teaching and learning result in little or no direct contact between instructor and learner, making the evaluation of course effectiveness difficult. Secondly, the Web as a relatively new teaching and learning medium still requires more research into learning processes with this technology. We propose data mining – techniques to discover and extract knowledge from a database – as a tool to support the analysis of student learning processes and the evaluation of the effectiveness and usability of Web-based courses. We present and illustrate different data mining techniques for the evaluation of Web-based teaching and learning systems

    Reliability of brain-computer interface language sample transcription procedures

    Get PDF
    We tested the reliability of transcribing language samples of daily brain-computer interface (BCI) communication recorded as language activity monitoring (LAM) logfiles. This study determined interrater reliability and interjudgeagreement for transcription of communication of veterans with amyotrophic lateral sclerosis using a P300-based BCI as an augmentative and alternative communication (AAC) system. KeyLAM software recorded logfiles in a universal logfile format during use of BCI-controlled email and word processing applications. These logfiles were encrypted and sent to our laboratory for decryption, transcription, and analysis. The study reports reliability results on transcription of 345 daily logfile samples. The procedure was found to be accurate across transcribers/raters. Frequency of agreement ratios of 97.6% for total number of words and 93.5% for total utterances were found as measures of interrater reliability. Interjudge agreement was 100% for both measures. The results indicated that transcribing language samples using LAM data is highly reliable and the fidelity of the process can be maintained. LAM data supported the transcription of a large number of samples that could not have been completed using audio and video recordings of AAC speakers. This demonstrated efficiency of LAM tools to measure language performance benefits to BCI research and clinical communities

    Measuring Complex Problem Solving in Jordanian Higher Education: Feasibility, Construct Validity and Logfile-Based Behavioural Pattern Analyses

    Get PDF
    This study investigated the feasibility and the applicability of using the third generation computer-based assessment of complex problem solving (CPS) based on the MicroDYN approach at the Jordanian higher education level. The tests were administered online via the eDia assessment platform for all data collections processes. We also investigated the role of strategic exploration and different problem-solving and test-taking behaviours in CPS success, using logfile data to visualize and quantify students’ problem-solving behaviour on ten CPS problems with varying difficulty levels and characteristics. Additionally, in the present study, we go beyond the borders of most studies that focus on students’ problem-solving behaviour pattern analyses in European cultures and education systems and examine Arabic students’ CPS behaviour. Results show that students in the Arabic school system interpret CPS problems the same way. That is, we confirmed the two-dimensional model of CPS, indicating the processes of knowledge acquisition and knowledge application as separate dimensions during the problem-solving process. Analyzing log data, we have identified large differences in students’ test-taking behavior in terms of the effectiveness of their exploration strategy, time-on-task, and number of trials at an international level (Jordan and Hungary). We identified four latent classes in both samples based on the students’ exploration strategy behavior. The tested process indicators proved to be non-invariant over the different latent profiles; that is, there are big differences in the role of the number of manipulations executed, time-on-task, and type of strategy used in actual problem-solving achievement between students that fall within different thinking profiles. Based on the results from the studies, we can conclude that online computer-based assessment is valid and reliable in the Jordanian higher education context. This study contributes to understanding how students from different educational contexts behave while solving complex problems

    A Programming Environment Evaluation Methodology for Object-Oriented Systems

    Get PDF
    The object-oriented design strategy as both a problem decomposition and system development paradigm has made impressive inroads into the various areas of the computing sciences. Substantial development productivity improvements have been demonstrated in areas ranging from artificial intelligence to user interface design. However, there has been very little progress in the formal characterization of these productivity improvements and in the identification of the underlying cognitive mechanisms. The development and validation of models and metrics of this sort require large amounts of systematically-gathered structural and productivity data. There has, however, been a notable lack of systematically-gathered information on these development environments. A large part of this problem is attributable to the lack of a systematic programming environment evaluation methodology that is appropriate to the evaluation of object-oriented systems

    Non-business use of the World Wide Web : A study of selected Western Australian organisations

    Get PDF
    Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what extent is the World Wide Web used by employees for non-business related activities in organisations and can filtering or organisational policies impact on this activity? This research specifically examines contextually, the level of misuse with respect to the use of the World Wide Web in three selected Western Australian organisations using multiple interpretive case study as the vehicle for the study. The research is significant internationally to all organisations that use Internet in their everyday work. The research has discovered anomalous behaviour on the part of non-business users who have employed a variety of techniques and tactics to mask their activities. Also, organisational management in the cases examined had demonstrated shortfalls in their perception of misuse within their organisations and, the implementation of effective policy

    Sql Injection Attacks and Countermeasures: a Survey of Website Development Practices

    Get PDF
    This study involved the development and subsequent use of a bespoke SQL Injection vulnerability scanner to analyze a set of unique approaches to common tasks, identified by conducting interviews with developers of high-traffic Web sites. The vulnerability scanner was developed to address many recognized shortcomings in existing scanning software, principal among which were the requirements for a comprehensive yet lightweight solution, with which to quickly test targeted aspects of online applications; and a scriptable, Linux-based system. Emulations of each approach were built, using PHP and MySQL, which were then analyzed with the aid of the bespoke scanner. All discovered vulnerabilities were resolved and despite the variety of approaches to securing online applications, adopted by those interviewed; a small number of root causes of SQL Injection vulnerabilities were identified. This allowed a SQL injection security checklist to be compiled to facilitate developers in identifying insecure practices prior to an online application\u27s initial release and following any modifications or upgrades
    corecore