We present the first study that analyses and understands the information seeking behaviour of teachers and pedagogical engineers in the context of Serious Games. Although digital serious games are increasingly recogni...
ISBN:
(纸本)9783031490644;9783031490651
We present the first study that analyses and understands the information seeking behaviour of teachers and pedagogical engineers in the context of Serious Games. Although digital serious games are increasingly recognized as valuable educational resources, research into teachers and pedagogical engineers' information-seeking behaviour and needs in this area remains sparse. To fill this gap, we engaged with 31 teachers to examine how they find, use and orchestrate digital serious games for their everyday classrooms. We conducted two workshops with the participants and used an elicitation toolkit to gather: teachers information sources, needs and challenges.
The purpose of this study was to investigate the usability of three high-fidelity interactable prototypes with a stepper control, a slider control, and a picker control, and to suggest design improvements and recommen...
ISBN:
(纸本)9783031613500;9783031613517
The purpose of this study was to investigate the usability of three high-fidelity interactable prototypes with a stepper control, a slider control, and a picker control, and to suggest design improvements and recommendations. Participants used an Apple mobile phone to complete five tasks related to smart bed angle adjustment. A usability test was used to collect quantitative data (time to complete the tasks and SUS scores), and the results were tested using repeated measures one-way ANOVA. Users' subjective attitudes and user experiences of the different programmes were also collected through post-test interviews and observations of the experimenters. The final results showed that: (1) The use of shortcut input or one-button direct access in the angle adjustment control can significantly improve the efficiency of user adjustment. (2) Avoiding the display of too many numbers in the adjustment area can improve the intuition of user operation. (3) Introducing multimodal feedback in the process of angle adjustment can help to guide the user, convey key information and state changes, and further enhance the user experience.
This paper presents a new theoretical approach to analyzing the relationship between Bitcoin's market price and its mining cost, aiming to substantiate the self-sustaining nature of Bitcoin's security. Previou...
ISBN:
(纸本)9783031488054;9783031488061
This paper presents a new theoretical approach to analyzing the relationship between Bitcoin's market price and its mining cost, aiming to substantiate the self-sustaining nature of Bitcoin's security. Previous empirical studies reveal a long-term correlation between price and cost, while shorter-term analysis often reveals significant divergences, particularly during price bubbles. The correlation between price and cost is a critical feature for the safe confirmation of transactions and suggests that the crypto asset has a fundamental value. On the other hand, divergences, which yield profit for miners, should serve as a factor that encourages organized mining operations, raising the mining cost and thereby enhancing Bitcoin's security. Thus, Bitcoin's security seems organically maintained by an interplay of correlation and recurring divergences. Understanding the dynamics of mining costs and the mechanism driving the correlation and divergences between price and cost is essential for comprehending Bitcoin's security and how it is sustained. By leveraging recursive methods in economics, this paper introduces a new theoretical model in which the rational decisions of miners determine mining costs. According to this model, the proof-of-work (PoW) mechanism combined with fluctuating Bitcoin price drives the long-term correlation and recurring divergences between price and cost. It demonstrates a rationale for the self-sustainability of Bitcoin's security.
Novice programmers face various errors during the learning of a programming language. Most of them need help from instructors since they lack error resolution skills. On the other side, instructors spend a lot of time...
ISBN:
(纸本)9783031630279;9783031630286
Novice programmers face various errors during the learning of a programming language. Most of them need help from instructors since they lack error resolution skills. On the other side, instructors spend a lot of time figuring out students' error causes. Long error detection times result in delayed and failed feedback, leading to a loss of student motivation. To support instructor's fast feedback, a detection method of error cause is needed. Existing detection methods, which are code-based, detect common and specific errors that can be identified by analyzing source code. These methods do not cover the diverse error patterns of novice programmers sufficiently, such as logical defects. To resolve this issue, it may be beneficial to detect rough and correct error causes of diverse error patterns. In this paper, a prediction method of rough error cause is proposed by considering not only source code, but also problem information, execution results, and the cognitive level indicating programming skills. We assume that different programming skills lead to different error patterns, which can help roughly but precisely predict error causes of runtime and logic errors in novice programmers. For performance evaluation, data from two introductory programming courses are used to validate the effectiveness of the cognitive level. Additionally, the usability for fast feedback is validated by comparing the error causes detection times of the instructors in each case.
Teacher-led lessons can successfully convey concepts depending on the teacher's preparation. However, it is challenging to convey a specific concept in an online environment without a well-designed learning path t...
ISBN:
(纸本)9783031630279;9783031630286
Teacher-led lessons can successfully convey concepts depending on the teacher's preparation. However, it is challenging to convey a specific concept in an online environment without a well-designed learning path to guide students. Learning paths allow students to backtrack the prerequisite content from a specific lesson inwhich they areweak or skip to related content inwhich they have a strong understanding, resulting in efficient learning. Knowledge maps, as the basis of personalized learning paths, can be generated from educational data by deriving prerequisite relationships between two knowledge concepts. We have aimed to enhance knowledge maps by adding the prerequisite relationships obtained by applying deductive reasoning to previous maps. Using test data from Company D, we first generated prerequisite relationships using the least absolute shrinkage and selection operator, random forest, and hidden Markov model for three datasets of the company. Next, we derived additional prerequisite relationships by applying deductive reasoning. The results showed that the knowledge maps of the three datasets had accuracies of 59%, 55%, and 84%, respectively, which were 3%, 10%, and 4% higher than those of the prior maps. As a result, "at risk" students can perform better using the enhanced knowledge maps by applying deductive reasoning.
Adpositional structures are commonly seen in English language, as there is one adposition in every eight English words statistically;Chinese, however, relies much less on such structures. In light of this prominent di...
ISBN:
(纸本)9789819742455;9789819742462
Adpositional structures are commonly seen in English language, as there is one adposition in every eight English words statistically;Chinese, however, relies much less on such structures. In light of this prominent difference between the two languages, this paper aims to analyse English adpositional structures under the analytical framework of Clause Complex model, and provides a new approach to the English-Chinese translation of such structures and its teaching. By applying Clause Complex Theory to the analysis of English sentences and Parsing-Translating-Assembling translation model (PTA model) to the reproduction of corresponding Chinese sentences, over 5,000 sentences are processed. In our work, adpositional structures are looked into and categorised as follows: prepositional structures include (1) prep. + Ving, (2) prep. + wh-clause, and (3) A + prep. + B + prep. + C;postpositional structures consist of: (1) word, (2) phrase, and (3) attributive clause;circumpositional structures are studied as well. Meanwhile, their respective translation processes are demonstrated through the PTA model.
The EU Regulation 2022/868 (Data Governance Act) designs a European data governance framework to facilitate data sharing, shaping the role of the Data Intermediation Service Provider. This paper aims to clarify, from ...
ISBN:
(纸本)9783031680236;9783031680243
The EU Regulation 2022/868 (Data Governance Act) designs a European data governance framework to facilitate data sharing, shaping the role of the Data Intermediation Service Provider. This paper aims to clarify, from a levelism perspective, the main features of the Data Governance Act framing it as a macro-level model, and to explore the data intermediation service provider's role as one of multiple subjective stand-points in this data governance model. In doing so, it attempts to capture the main legal properties of data intermediation service and it brings them to the fore, identifying potential semantic constraints that may need to be addressed when engineering a data governance model in line with legally desirable outcomes. This paper builds on the existing cross-sectoral literature at the intersection of law and technology by relying on the research method of legal analysis and lays the groundwork for implementing a data governance model that integrates and consolidates different levels, dimensions, and facets of the in-force legal framework.
In the past fifteen years, cryptocurrencies have grown from a whitepaper released on a mailing list to an ecosystem supporting millions of transactions a day using a whole host of technology never imagined before. How...
ISBN:
(纸本)9783031488054;9783031488061
In the past fifteen years, cryptocurrencies have grown from a whitepaper released on a mailing list to an ecosystem supporting millions of transactions a day using a whole host of technology never imagined before. However, governments have been slow to keep up. We present an analysis of regulatory developments from within the EU and by the Financial Action Task Force (FATF). These regulatory responses focus on intermediaries such as cryptocurrency exchanges, and wallet providers. We trace the AML/CFT policy recommendationsmade by the FATF, and examine the EU's Fifth Anti-Money Laundering Directive and upcoming Markets in Crypto-Assets (MiCA) regulation. Here we find a natural tension: the pace of regulation is slower than the pace of technology, so the scope is non-comprehensive, yet current trials to accelerate this pace are leading to subtle conflicting errors. These findings present a deeper understanding of the ongoing regulatory dilemma, its essence, and suggest directions for the future of cryptocurrency regulation.
In this paper we propose a method to classify the students' textual descriptions of algorithms. This work is based on a wealth of data (programming tasks, related algorithm descriptions, and Peer Assessment data),...
ISBN:
(纸本)9783031630279;9783031630286
In this paper we propose a method to classify the students' textual descriptions of algorithms. This work is based on a wealth of data (programming tasks, related algorithm descriptions, and Peer Assessment data), coming from 6 years of use of the system Q2A, in a "Fundamentals of computer Programming" course, given at first year in our university's computerscience curriculum. The descriptions are submitted, as part of the answer to a computer programming task, through Q2A, and are subject to (formative) Peer Assessment. The proposed classification method aims to support the teacher on the analysis of the quite numerous students' descriptions, in ours as well as in other similar systems. We 1) process the students' submissions, by topic automated extraction (BERTopic) and by separate Large Language Models, 2) compute their degree of suitability as "algorithm description", in a scale from BAD to GOOD, and 3) compare the obtained classification with those coming from the teacher's direct assessment (expert: one of the authors), and from the Peer Assessment. The automated classification does correlate with both the expert classification and the grades given by the peers to the "clarity" of the descriptions. This result is encouraging in view of the production of a Q2A subsystem allowing the teacher to analyse the students' submissions guided by an automated classification, and ultimately support fully automated grading.
In this paper, we present the development of a speech-based dialogue system tailored to train students for oral exams, an essential aspect of academic assessment. The system is based on open-source models designed for...
ISBN:
(纸本)9783031723117;9783031723124
In this paper, we present the development of a speech-based dialogue system tailored to train students for oral exams, an essential aspect of academic assessment. The system is based on open-source models designed for the German language. It was evaluated component-wise.
暂无评论