The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While continuous assessment is regularly used in higher education, some of its limitations are often ignored. In particular, the importance of the delivered product tends to be emphasised over that of the actual learning process, which may result in some academic misconducts. To address this situation, and to promote students' honesty and awareness of their learning process, a framework involving...
In this paper we will present a case study and an analysis conducted to evaluate the use of lecture learning as a helpful companion to the classical teaching. This effort is done around the Opencast Matterhorn software, a system that is able to record classroom presentations and publish them on a LMS automatically, without the intervention of a technician dedicated to it. So we delivered a university-wide...
Mathematics and physics courses are recognized as a crucial foundation for the study of engineering, and often are prerequisite courses for the basic engineering curriculum. But how does performance in these prerequisite courses affect student performance in engineering courses? This study evaluated the relationship between grades in prerequisite math and physics courses and grades in subsequent electrical...
Cosmology is a data intensive field that will become more so in the coming years. In this scenario, GPU-computing is becoming very relevant for analysing large catalogs within a reasonable amount of time. In this work, we investigate the acceleration of the analysis by using a hybrid MPI-CUDA implementation.
Visually stimulated brain-computer interfacing detects which target on a screen a user is gazing at; however, this is also accomplished by tracking gaze points with a camera. These two approaches have been independently investigated and sometimes doubts about BCI with visual stimuli are raised in terms of usability compared to eye tracking interfaces (ETI). This paper answers this question by investigating...
The teaching materials used by Taiwanese students in class are compiled by different publishers according to the curriculum outline established by the Ministry of Education. However, limited by the layout of teaching materials, it is impossible to incorporate all knowledge referred by the curriculum outline into teaching materials, thus, some are selected and some are abandoned. For example, as the...
Detailed analyses of the behaviors of operating system and applications are significant for taking full advantage of the precious hardware resources and improving performance. This paper focus on their DRAM access behaviors based on access proportion and row-buffer miss ratio (RBM). The access proportions of Kernel and User vary greatly in different stages throughout the lifetime of a process. Most...
Current human-robot-interaction research methods could benefit from an age-appropriate scale that measures children's attitudes towards robots. This paper presents the design process and evidence for the validity of the Children's Openness to Interacting with a Robot Scale (COIRS). We report findings from a pilot test on a diverse population of 172 U.S. students between the ages of 8–11. High average...
This paper presents a strategy to solve the fuzzy coalition formulation problem, which is a difficult topic in multi-agent system (MAS). Based on the grey relational theory, a grey relational grade sequence has been firstly established to describe the relationship between agent capability and task requirement. Then a strategy for fuzzy coalition formation, which combines a stimulation mechanism with...
This paper puts forward the basic computer teaching practice by carrying out professional integration and the enhancement of computational science thinking ability. Since 2007 the teaching system has been applied extensively in a number of universities. Feasibility and validity of the system are proven. The practice has demonstrated that it is an effective way to promote the students' ability of computer...
Modernization of human technology overtime result the need of more freedom technology such as ‘wired glove' to replace current trend. Joystick, mouse, keyboard and other related output device will be replaced by ‘Wired Glove’ technology which given user more freedom and user friendly. ‘Wired Glove’ does not only limited to personal computer used only, but it can be design to control motor, robot,...
This study attempted to develop valid, reliable, and good fit model game design scales. The first draft of instrument with fifty items was subjected to statistical analyses. Exploratory factor analysis with factor loadings of at least 0.50 was utilized to determine the dimensions and the validity of constructs. Reliability of items was ensured through Cronbach's alpha analysis. Items with alpha values...
This article addresses trust in computer systems as a social phenomenon, which depends on the type of relationship that is established through the computer, or with other individuals. It starts by theoretically contextualizing trust, and then situates trust in the field of computer science. Then, describes the proposed model, which builds on what one perceives to be trustworthy and is influenced by...
Presence or feel being located in virtual environment can make the Virtual Reality application more effective. One type of Virtual Reality application is Image-based Virtual Reality application; which defined as the panoramic virtual environment that mimic the real environment which users can interact with. Due to the limited interaction function, none research exists between Image-based Virtual Reality...
This paper tried to examine the students' acceptances for the use of Blackboard Learning System using Technology Acceptance Model (TAM) as an analysis approach. Four factors of TAM namely Perceived Ease of Use, Perceived Usefulness, Attitude, Behavior Intention, and Perceived Interactivity as an additional factor were used as the evaluation model factors to measure the students' technology acceptance...
In this paper a game for working memory assessment in children between 4 to 7 years old is introduced. We evaluate the validity of the game as an assessment tool by comparing its results on a group of pre-school children with a commercially validated working memory test. Since the correctness of an assessment highly depends on the attentional state of the subject, several algorithms have been developed...
The use of educational software in teaching and learning Science, Mathematics and English are encouraged among teachers. The Ministry of Education (MOE) has provided teachers with a variety of software to achieve the objectives and goals of teaching and learning Science, Mathematics and English and also helped students to master Mathematics and Science concepts easily. The purpose of this study was...
Opportunistic mobile networks consist of mobile devices which are intermittently connected via short-range radios. Forwarding in such networks relies on selecting relays to carry and deliver data to destinations upon opportunistic contacts. Due to the intermittent network connectivity, relays in current forwarding schemes are selected separately in a distributed manner. The contact capabilities of...
Over the past forty years, significant research has been done on story/narrative generation in which the computer is the author. Many existing systems generate stories by filling in a template or copying an analogous story (and changing the time, place, etc.) or by prompting the user to provide a start to the story. Very few systems generate variable stories without these techniques. While it is impossible...
The rapid growth of the Internet and digitized content made text/image distribution simpler. The ability to protect and secure information is vital to the growth of electronic commerce and to the growth of the Internet itself. Most data embedding techniques used so far lead to distortions in the original image. These distortions create problems in some areas where protection of data is immensely required...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.