首页 > 最新文献

2008 Third International Conference on Digital Information Management最新文献

英文 中文
Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication 时间签名-击键和单击模式的实现,用于实用和安全的身份验证
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746782
M. Sharif, Tariq Faiz, M. Raza
The analysis of keystroke dynamics (KD) is a developing biometric technique for user authentication. In computer security, its use is limited to some constraints such as longer typing and practice sessions. In this paper, a practical user authentication system is proposed that combines a conventional login/password method and a said biometric technique. The conventional password authentication method is enhanced through analysis of keystroke dynamics (KD) and click patterns (CP). In this way increased security level is achieved without using long and complicated passwords. For this, an application is developed to demonstrate the technique and the results are analyzed. user time signatures (TS) are identified after analyzing user KD and CP. Based on ability to follow their specific TS, users are categorized into beginner, standard and expert. At the time of login, the user inputs are matched with respective database records for authentication.
击键动力学分析是一种新兴的用户认证生物识别技术。在计算机安全领域,它的使用受到一些限制,比如较长的打字时间和练习时间。本文提出了一种实用的用户认证系统,该系统结合了传统的登录/密码方法和上述生物识别技术。通过对击键动力学(KD)和点击模式(CP)的分析,对传统的密码认证方法进行了改进。这样可以在不使用长而复杂的密码的情况下提高安全级别。为此,开发了一个应用程序来演示该技术并对结果进行了分析。用户时间签名(TS)是通过分析用户的KD和CP来识别的,根据用户遵循特定TS的能力将用户分为初学者、标准型和专家型。在登录时,用户输入将与用于身份验证的相应数据库记录相匹配。
{"title":"Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication","authors":"M. Sharif, Tariq Faiz, M. Raza","doi":"10.1109/ICDIM.2008.4746782","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746782","url":null,"abstract":"The analysis of keystroke dynamics (KD) is a developing biometric technique for user authentication. In computer security, its use is limited to some constraints such as longer typing and practice sessions. In this paper, a practical user authentication system is proposed that combines a conventional login/password method and a said biometric technique. The conventional password authentication method is enhanced through analysis of keystroke dynamics (KD) and click patterns (CP). In this way increased security level is achieved without using long and complicated passwords. For this, an application is developed to demonstrate the technique and the results are analyzed. user time signatures (TS) are identified after analyzing user KD and CP. Based on ability to follow their specific TS, users are categorized into beginner, standard and expert. At the time of login, the user inputs are matched with respective database records for authentication.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Algorithm of the longest commonly consecutive word for Plagiarism detection in text based document 基于文本的文档中最长共同连续词检测算法
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746827
Agung Sediyono, K. Ku-Mahamud
Plagiarism is a form of academic misconduct which has increased with the easy access to obtain information through electronic documents and the Internet. The problem of finding document plagiarism in full text document can be viewed as a problem of finding the longest common parts of strings. Moreover, the detection system has to be capable to determine and visualize not only the common parts but also the location of the common parts in both the source and the observed document. Unlike previous research, this paper proposes a numerical based comparison algorithm that is comparable in the computation time without loosing the word order of common parts. Based on the experiment, the proposed algorithm outperforms the suffix tree in the length of observed paragraph below one hundred words.
抄袭是一种学术不端行为,随着通过电子文档和互联网获取信息的便利,这种行为有所增加。全文文档中查找文档剽窃的问题可以看作是查找字符串最长公共部分的问题。此外,检测系统必须不仅能够确定和可视化所述共同部分,而且还能够确定所述共同部分在源文件和所观察文件中的位置。与以往的研究不同,本文提出了一种基于数值的比较算法,该算法在计算时间上具有可比性,并且不会丢失公共部分的词序。实验结果表明,该算法在100个单词以下的观察段落长度上优于后缀树算法。
{"title":"Algorithm of the longest commonly consecutive word for Plagiarism detection in text based document","authors":"Agung Sediyono, K. Ku-Mahamud","doi":"10.1109/ICDIM.2008.4746827","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746827","url":null,"abstract":"Plagiarism is a form of academic misconduct which has increased with the easy access to obtain information through electronic documents and the Internet. The problem of finding document plagiarism in full text document can be viewed as a problem of finding the longest common parts of strings. Moreover, the detection system has to be capable to determine and visualize not only the common parts but also the location of the common parts in both the source and the observed document. Unlike previous research, this paper proposes a numerical based comparison algorithm that is comparable in the computation time without loosing the word order of common parts. Based on the experiment, the proposed algorithm outperforms the suffix tree in the length of observed paragraph below one hundred words.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A robust cooperation approach for mobile multimedia adhoc networks 移动多媒体自组网的鲁棒合作方法
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746759
J. Bahi, M. Eskandar, A. Mostefaoui
In wireless ad hoc networks, nodes are energy constrained. As they communicate far off destinations using intermediate relays, it may not be in interest of a node to expend its energy in relaying and consequently reducing its own lifetime. On the other hand, if all nodes decide not to always accept relay requests, the network throughput will drop dramatically i.e., the lifetime of the whole network is reduced. Obviously, from a single node point of view, these two extreme attitudes are opposite to its interest. We addressed this issue by proposing a novel distributed approach that guarantees tasks affectation to nodes with regard to their energy constraints. The key idea behind is to guarantee to all nodes that they share tasks in function of their energy provisions. In this paper, we tackle the problem of nodes mobility and its impact on the behaviour of our proposed approach. We evaluated the performance of our approach under several scenarios and showed that it still improves the network lifetime.
在无线自组织网络中,节点受到能量限制。由于它们使用中间中继与遥远的目的地进行通信,因此节点在中继中消耗能量并因此减少自身的生命周期可能不符合其利益。另一方面,如果所有节点都决定不总是接受中继请求,则网络吞吐量将急剧下降,即整个网络的生命周期将缩短。显然,从单个节点的角度来看,这两种极端的态度与它的利益是相反的。我们通过提出一种新颖的分布式方法来解决这个问题,该方法可以保证任务对节点的能量约束的影响。其背后的关键思想是保证所有节点在其能量供应的作用下共享任务。在本文中,我们解决了节点移动性问题及其对我们提出的方法行为的影响。我们在几个场景下评估了我们的方法的性能,并表明它仍然可以改善网络生命周期。
{"title":"A robust cooperation approach for mobile multimedia adhoc networks","authors":"J. Bahi, M. Eskandar, A. Mostefaoui","doi":"10.1109/ICDIM.2008.4746759","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746759","url":null,"abstract":"In wireless ad hoc networks, nodes are energy constrained. As they communicate far off destinations using intermediate relays, it may not be in interest of a node to expend its energy in relaying and consequently reducing its own lifetime. On the other hand, if all nodes decide not to always accept relay requests, the network throughput will drop dramatically i.e., the lifetime of the whole network is reduced. Obviously, from a single node point of view, these two extreme attitudes are opposite to its interest. We addressed this issue by proposing a novel distributed approach that guarantees tasks affectation to nodes with regard to their energy constraints. The key idea behind is to guarantee to all nodes that they share tasks in function of their energy provisions. In this paper, we tackle the problem of nodes mobility and its impact on the behaviour of our proposed approach. We evaluated the performance of our approach under several scenarios and showed that it still improves the network lifetime.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121925093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile education: Towards affective bi-modal interaction for adaptivity 移动教育:面向情感双模互动的适应性
Pub Date : 2008-11-01 DOI: 10.3991/ijim.v3i2.774
Efthymios Alepis, M. Virvou, K. Kabassi
One important field where mobile technology can make significant contributions is education. However one criticism in mobile education is that students receive impersonal teaching. Affective computing may give a solution to this problem. In this paper we describe an affective bi-modal educational system for mobile devices. In our research we describe a novel approach of combining information from two modalities namely the keyboard and the microphone through a multi-criteria decision making theory.
移动技术可以做出重大贡献的一个重要领域是教育。然而,对移动教育的一种批评是,学生接受的教学没有人情味。情感计算可以解决这一问题。本文描述了一种面向移动设备的情感双模教育系统。在我们的研究中,我们描述了一种通过多标准决策理论将键盘和麦克风两种模式的信息结合起来的新方法。
{"title":"Mobile education: Towards affective bi-modal interaction for adaptivity","authors":"Efthymios Alepis, M. Virvou, K. Kabassi","doi":"10.3991/ijim.v3i2.774","DOIUrl":"https://doi.org/10.3991/ijim.v3i2.774","url":null,"abstract":"One important field where mobile technology can make significant contributions is education. However one criticism in mobile education is that students receive impersonal teaching. Affective computing may give a solution to this problem. In this paper we describe an affective bi-modal educational system for mobile devices. In our research we describe a novel approach of combining information from two modalities namely the keyboard and the microphone through a multi-criteria decision making theory.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
E-business and strategy management in Digital Information Management methodologies: An adaptive algorithmic approach 数字信息管理方法中的电子商务和战略管理:一种自适应算法方法
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746704
A. Lipitakis
In this paper we show that e-business and strategic management problems in digital information management (DIM) methodologies and smart environments (SE) can be efficiently solved by using corresponding adaptive algorithmic procedures. Case studies representing characteristic e-business problems and strategic management methodologies in DIM & SE are presented by considering the proposed algorithmic approach. The adaptability and compactness of the proposed algorithmic schemes combined by the proper choice of singular perturbation parameters allow the (near) optimum solution of a wide class e-business and strategic management problems in digital information management and smart environments.
在本文中,我们证明了电子商务和战略管理问题在数字信息管理(DIM)方法和智能环境(SE)中可以通过使用相应的自适应算法程序有效地解决。通过考虑所提出的算法方法,给出了代表DIM和SE中典型电子商务问题和战略管理方法的案例研究。所提出的算法方案的适应性和紧凑性与适当选择的奇异扰动参数相结合,允许在数字信息管理和智能环境中广泛的电子商务和战略管理问题的(接近)最佳解决方案。
{"title":"E-business and strategy management in Digital Information Management methodologies: An adaptive algorithmic approach","authors":"A. Lipitakis","doi":"10.1109/ICDIM.2008.4746704","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746704","url":null,"abstract":"In this paper we show that e-business and strategic management problems in digital information management (DIM) methodologies and smart environments (SE) can be efficiently solved by using corresponding adaptive algorithmic procedures. Case studies representing characteristic e-business problems and strategic management methodologies in DIM & SE are presented by considering the proposed algorithmic approach. The adaptability and compactness of the proposed algorithmic schemes combined by the proper choice of singular perturbation parameters allow the (near) optimum solution of a wide class e-business and strategic management problems in digital information management and smart environments.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent vertical handover decision model to improve QoS 提高服务质量的智能垂直切换决策模型
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746775
Hasina Attaullah, F. Iqbal, M. Javed
In order to sustain connection and service in heterogeneous wireless environment, vertical handover is necessary. Now-a-days research focus is to optimize vertical handover so that optimized and application specific (QoS based) handover can be made possible. In this paper, an intelligent approach to vertical handover is proposed. The fuzzy logic based decision making is used to select among the available networks. Triggers and events are used to generate the input which is sent to fuzzy expert system. In this way, the intelligent selection of networks can optimize vertical handover and improve QoS of real-time application running on mobile device which is roaming around heterogeneous wireless networks.
为了在异构无线环境下保持连接和业务,需要进行垂直切换。目前的研究重点是优化垂直切换,使优化的和特定应用(基于QoS)的切换成为可能。本文提出了一种智能的垂直切换方法。采用基于模糊逻辑的决策方法对可用网络进行选择。使用触发器和事件生成输入,并将其发送给模糊专家系统。通过对网络的智能选择,可以优化垂直切换,提高在异构无线网络中漫游的移动设备上运行的实时应用的QoS。
{"title":"Intelligent vertical handover decision model to improve QoS","authors":"Hasina Attaullah, F. Iqbal, M. Javed","doi":"10.1109/ICDIM.2008.4746775","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746775","url":null,"abstract":"In order to sustain connection and service in heterogeneous wireless environment, vertical handover is necessary. Now-a-days research focus is to optimize vertical handover so that optimized and application specific (QoS based) handover can be made possible. In this paper, an intelligent approach to vertical handover is proposed. The fuzzy logic based decision making is used to select among the available networks. Triggers and events are used to generate the input which is sent to fuzzy expert system. In this way, the intelligent selection of networks can optimize vertical handover and improve QoS of real-time application running on mobile device which is roaming around heterogeneous wireless networks.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130338268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Design, implementation and use of a remote network lab as an aid to support teaching computer network 设计、实现和使用一个远程网络实验室作为辅助教学的计算机网络
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746847
Marco Aravena Vivar, Andrés Alejandro Ramos Magna
This article presents the design, implementation and use of a remote network lab as an aid to support teaching computer networks. The purpose is to enable students complement the learning of the theory with practical experimentation in networking devices from any room with Internet access. Unlike the current solutions based on mainly emulation and simulation software, the remote laboratory presented is a server and a Web application that allows the students to interact remotely with commercial network devices, such as cutting-edge switches, routers and firewall that are widely used in the workplace. This proposal reduces the expenses of installing new laboratories and moving students who are far from their classrooms. The use of the remote laboratory has been compared, by means of a quasi- experiment, to the use of traditional network labs with seniors students of computing engineering. The outcomes show a similarity between both approaches, turning the remote network lab an effective tool to support teaching computer network.
本文介绍了一个辅助计算机网络教学的远程网络实验室的设计、实现和使用。目的是让学生在任何可以上网的房间使用网络设备进行实际实验,以补充理论学习。与目前主要基于仿真和仿真软件的解决方案不同,远程实验室是一个服务器和一个Web应用程序,允许学生与商业网络设备进行远程交互,例如在工作场所广泛使用的尖端交换机、路由器和防火墙。这一建议减少了安装新实验室和转移远离教室的学生的费用。通过准实验的方式,将远程实验室的使用与计算机工程专业高年级学生传统网络实验室的使用进行了比较。结果显示了两种方法的相似性,使远程网络实验室成为支持计算机网络教学的有效工具。
{"title":"Design, implementation and use of a remote network lab as an aid to support teaching computer network","authors":"Marco Aravena Vivar, Andrés Alejandro Ramos Magna","doi":"10.1109/ICDIM.2008.4746847","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746847","url":null,"abstract":"This article presents the design, implementation and use of a remote network lab as an aid to support teaching computer networks. The purpose is to enable students complement the learning of the theory with practical experimentation in networking devices from any room with Internet access. Unlike the current solutions based on mainly emulation and simulation software, the remote laboratory presented is a server and a Web application that allows the students to interact remotely with commercial network devices, such as cutting-edge switches, routers and firewall that are widely used in the workplace. This proposal reduces the expenses of installing new laboratories and moving students who are far from their classrooms. The use of the remote laboratory has been compared, by means of a quasi- experiment, to the use of traditional network labs with seniors students of computing engineering. The outcomes show a similarity between both approaches, turning the remote network lab an effective tool to support teaching computer network.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"22 6 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Hierarchical segmentation of digital mammography by agents competition 基于agent竞争的数字乳房x线造影分层分割
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746776
A. Melouah, H. Merouani
A new hybrid approach for mammography segmentation is suggested in this work. The segmentations proceed by refining successively, in a way that macro regions at each step are recovered. Two segmentation techniques, thresholding and Markov field, enter in competition to segment theses regions. The technique which gives the best results according to a given criterion will take on the process. However, using the same segmentation for all macro regions is not necessary. Thus, the new obtained regions will become candidates for a novel segmentation. The process continues till verification of a stop criterion.
本文提出了一种新的乳房x线摄影分割混合方法。分割是通过连续的细化来进行的,每一步的宏观区域都会被恢复。阈值分割和马尔可夫域分割这两种分割技术相互竞争。根据给定的标准给出最佳结果的技术将采用该过程。但是,没有必要对所有宏观区域使用相同的分割。因此,新获得的区域将成为新分割的候选区域。该过程将继续进行,直到确认停止条件为止。
{"title":"Hierarchical segmentation of digital mammography by agents competition","authors":"A. Melouah, H. Merouani","doi":"10.1109/ICDIM.2008.4746776","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746776","url":null,"abstract":"A new hybrid approach for mammography segmentation is suggested in this work. The segmentations proceed by refining successively, in a way that macro regions at each step are recovered. Two segmentation techniques, thresholding and Markov field, enter in competition to segment theses regions. The technique which gives the best results according to a given criterion will take on the process. However, using the same segmentation for all macro regions is not necessary. Thus, the new obtained regions will become candidates for a novel segmentation. The process continues till verification of a stop criterion.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an automatic real-time assessment of online discussions in Computer-Supported Collaborative Learning practices 计算机支持的协作学习实践中在线讨论的自动实时评估
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746758
S. Caballé, F. Xhafa, A. Abraham
The discussion process plays an important social task in Computer-Supported Collaborative Learning (CSCL) where participants can discuss about the activity being performed, collaborate with each other through the exchange of ideas that may arise, propose new resolution mechanisms, and justify and refine their own contributions, and as a result acquire new knowledge. Indeed, learning by discussion when applied to collaborative learning scenarios can provide significant benefits for students in collaborative learning, and in education in general. As a result, current educational organizations incorporate in-class online discussions into web-based courses as part of the very rationale of their pedagogical models. However, online discussions as collaborative learning activities are usually greatly participated and contributed, which makes the monitoring and assessment tasks time-consuming, tedious and error-prone. Specially hard if not impossible by humans is to manually deal with the sequences of hundreds of contributions making up the discussion threads and the relations between these contributions. As a result, current assessment in online discussions restricts to offer evaluation results of the content quality of contributions after the completion of the collaborative learning task and neglects the essential issue of constantly assessing the knowledge building as a whole while it is still being generated. In this paper, we propose a multidimensional model based on data analysis from online collaborative discussion interaction that provides a first step towards an automatic assessment in (almost) real time. The context of this study is a real on-line discussion experience that took place at the Open University of Catalonia.
讨论过程在计算机支持的协作学习(CSCL)中扮演着重要的社会任务,参与者可以讨论正在进行的活动,通过交换可能出现的想法而相互协作,提出新的解决机制,并证明和完善自己的贡献,从而获得新知识。事实上,通过讨论学习当应用于协作学习场景时,可以为学生在协作学习和一般教育中提供显著的好处。因此,当前的教育机构将课堂上的在线讨论纳入到基于网络的课程中,作为其教学模式的基本原理的一部分。然而,在线讨论作为一种协作学习活动,通常参与和贡献较多,这使得监测和评估任务耗时、繁琐且容易出错。特别困难的是,如果不是不可能的话,人工处理组成讨论线程的数百个贡献的序列以及这些贡献之间的关系。因此,目前在线讨论中的评估局限于在协作学习任务完成后提供对贡献内容质量的评估结果,而忽略了在知识构建仍在产生时对其进行整体持续评估的本质问题。在本文中,我们提出了一个基于在线协作讨论交互数据分析的多维模型,为(几乎)实时的自动评估提供了第一步。这项研究的背景是一个真实的在线讨论的经验,发生在加泰罗尼亚开放大学。
{"title":"Towards an automatic real-time assessment of online discussions in Computer-Supported Collaborative Learning practices","authors":"S. Caballé, F. Xhafa, A. Abraham","doi":"10.1109/ICDIM.2008.4746758","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746758","url":null,"abstract":"The discussion process plays an important social task in Computer-Supported Collaborative Learning (CSCL) where participants can discuss about the activity being performed, collaborate with each other through the exchange of ideas that may arise, propose new resolution mechanisms, and justify and refine their own contributions, and as a result acquire new knowledge. Indeed, learning by discussion when applied to collaborative learning scenarios can provide significant benefits for students in collaborative learning, and in education in general. As a result, current educational organizations incorporate in-class online discussions into web-based courses as part of the very rationale of their pedagogical models. However, online discussions as collaborative learning activities are usually greatly participated and contributed, which makes the monitoring and assessment tasks time-consuming, tedious and error-prone. Specially hard if not impossible by humans is to manually deal with the sequences of hundreds of contributions making up the discussion threads and the relations between these contributions. As a result, current assessment in online discussions restricts to offer evaluation results of the content quality of contributions after the completion of the collaborative learning task and neglects the essential issue of constantly assessing the knowledge building as a whole while it is still being generated. In this paper, we propose a multidimensional model based on data analysis from online collaborative discussion interaction that provides a first step towards an automatic assessment in (almost) real time. The context of this study is a real on-line discussion experience that took place at the Open University of Catalonia.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Two pattern classifiers for interval data based on binary regression models 基于二元回归模型的两个区间数据模式分类器
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746705
R. Souza, F. Cysneiros, D. C. F. Queiroz, Roberta Fagundes
This paper introduces two classifiers for interval symbolic data based on logit and probit regression models, respectively. Each example of the learning set is described by a feature vector, for which each feature value is an interval and a binary response that defines the class of this example. For each classifier two versions are considered. First fits a classic binary regression model conjointly on the lower and upper bounds of the interval values assumed by the variables in the learning set. Second fits a classic binary regression model separately on the lower and upper bounds of the intervals. The prediction of the class for new examples is accomplished from the computation of the posterior probabilities of the classes. To show the usefulness of this method, examples with synthetic symbolic data sets with overlapping classes are considered.
本文分别介绍了基于logit和probit回归模型的区间符号数据分类器。学习集的每个示例由一个特征向量描述,其中每个特征值是一个区间和一个定义该示例类的二进制响应。对于每个分类器考虑两个版本。首先在学习集中的变量所假设的区间值的下界和上界联合拟合一个经典的二元回归模型。其次分别在区间的下界和上界拟合经典二元回归模型。对新样本的类的预测是通过计算类的后验概率来完成的。为了证明该方法的有效性,我们考虑了具有重叠类的合成符号数据集的示例。
{"title":"Two pattern classifiers for interval data based on binary regression models","authors":"R. Souza, F. Cysneiros, D. C. F. Queiroz, Roberta Fagundes","doi":"10.1109/ICDIM.2008.4746705","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746705","url":null,"abstract":"This paper introduces two classifiers for interval symbolic data based on logit and probit regression models, respectively. Each example of the learning set is described by a feature vector, for which each feature value is an interval and a binary response that defines the class of this example. For each classifier two versions are considered. First fits a classic binary regression model conjointly on the lower and upper bounds of the interval values assumed by the variables in the learning set. Second fits a classic binary regression model separately on the lower and upper bounds of the intervals. The prediction of the class for new examples is accomplished from the computation of the posterior probabilities of the classes. To show the usefulness of this method, examples with synthetic symbolic data sets with overlapping classes are considered.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132976975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 Third International Conference on Digital Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1