Videos with tag performance
Results 1-6 of 6
 
18:30
18:30
18:30

TMA 4 - Discussing and designing an innovative reading interface of e-learning tool with recommended annotation to improve students' learning attention and performance

When students read a book, they usually make annotations on the text which they think important. Students have their preference in making annotations. Some prefer to underline important words; some prefer to use different colors on the important words; and some others may circle the important words in different colors. This research focuses on clustering students according to the similarity of their annotations. The clustering results then can be used to provide students feedback such like words they didn't annotate but probably is also important to them and sidebar notes made by other students who are in the same cluster.

Added: 1268 days ago by Alicia

Views: 1799 | Comments: 0 | Not yet rated

 
18:30
18:30
18:30

TMA 4 - Discussing and designing an innovative reading interface of e-learning tool with recommended annotation to improve students' learning attention and performance

When students read a book, they usually make annotations on the text which they think important. Students have their preference in making annotations. Some prefer to underline important words; some prefer to use different colors on the important words; and some others may circle the important words in different colors. This research focuses on clustering students according to the similarity of their annotations. The clustering results then can be used to provide students feedback such like words they didn't annotate but probably is also important to them and sidebar notes made by other students who are in the same cluster.

Added: 1268 days ago by Alicia

Views: 833 | Comments: 0 | Not yet rated

 
13:28
13:28
13:28

Modular Component Development and PHP Frameworks: reasons, advantages and shortcomings

PHP is the most common web language due to its broad availability and attractive price structure it is free. Unlike small projects or scripts, most of the web applications used in a revenue-making company are predominantly written using some kind of a PHP framework. To accommodate various technological and business needs, most frameworks provide unique features and fill a specific niche. There has been numerous research done on individual products or comparison of two or three for a specific task; however, current literature leaves the question of what is the best framework unanswered. This paper applies an empirical analysis to compare six major PHP frameworks: Yii, CodeIgniter, CakePHP, Symfony, Laravel and Zend. The criteria by which frameworks are assessed include execution performance (apache benchmark), memory usage (unit testing), security and popularity (Google trends and online surveys). As a conclusion, we assign a score to each product in each category; this score is used to rank a subject and to formulate the overall outlook as to what product to use in particular situation.

Added: 1389 days ago by paulb

Views: 1367 | Comments: 0 | star star star star star 

 
16:57
16:57
16:57

ICARUS Adaptive Tag Cloud Navigational and Recommender System

Current tagging systems experience several problems related to recommending accuracy of a resource. High number of users and related topical diversification, coupled with the unique vocabularies, as well as the popularity bias are some of the main obstacles to successful recommendation. The user interfaces, utilized for topical narrowing and searching for the specific term often fail at being intuitive and user friendly, mainly due to the inability to visualize subsequent navigational paths. This work presents a concept for ICARUS, a recommender system with integrated novel user interface, which attempts to produce an answer to these problems by utilizing approach for balancing of the user and popularity biases and an intuitive interface with navigational paths prediction. The research conducted focused on the user acceptance of the interface in order to provide the justification for the future development. The results showed that ICARUS interface has the potential to outperform the conventional ones.

Added: 1514 days ago by dsasa008

Views: 1761 | Comments: 0 | Not yet rated

 
19:05
19:05
19:05

Tablets – To Teach or Not to Teach

In this paper, a research plan which will evaluate the capability of the tablet to serve as a learning instrument will be covered. Additionally several measures of institutional and student readiness to proceed along this path will be covered. Review of literature (i.e. course recommended HCI journals) indicates that only two papers which discuss tablets are offered. Part of this limitation is due to the fact that the first successful tablet was only introduced in the marketplace on April 3, 2010. Researchers have had, as a result, a very limited exposure to this new technology. Anecdotal and other evidence suggests that while considerable numbers of tablets have already been sold, this technology is also becoming very popular and commonplace in post-secondary education space.

Added: 1998 days ago by alfonzk

Views: 423 | Comments: 0 | Not yet rated

 
11:48
11:48
11:48

Improving Network Security Analysis

Advances in information visualization are required to keep pace with the large amount of data being collected by information systems today. The study of Data Visualization is a relatively mature subject area with much research available on a broad scale. However the study of Network security analysis, and more specifically Network intrusion analysis would benefit from additional research. Also known as Security Visualization, implementing data visualization techniques to network analysis is relatively new. However Data Visualization techniques would provide a high level abstraction of the immense amount of data collected in an enterprise network. Also, since timeliness is a factor when identifying and mitigating security threats, data visualization can allow for the quick analysis of large volumes of network data. This quick analysis simply would not be possible if the raw data had to be mined an analyzed. In order to progress this area of research, a methodology was designed to support research that would identify the best way to visualize network data. This paper summarizes a task analysis methodology for identifying and experience sampling for proposing the best data visualization for Security Visualization.

Added: 2000 days ago by grahamlange

Views: 283 | Comments: 0 | Not yet rated