A multi-case study with three online communities that use customized instantiations of the Integrated Learning Design Environment (ILDE) platform is presented to explore and understand how teachers' motivations to...
ISBN:
(纸本)9783031679971;9783031679988
A multi-case study with three online communities that use customized instantiations of the Integrated Learning Design Environment (ILDE) platform is presented to explore and understand how teachers' motivations to participate in OCs are related to their perceptions about incentives and features implemented in OCsupporting platforms. Datawas collected following amixed-method approach. Across-case analysis, including a correlation analysis of teachers' motivations and their perception about different incentive mechanisms, suggests that there is a relationship between these factors. Teachers' main motivation is to gain knowledge, and they perceive recommendation systems, tutorials, news sections and social features as the most interesting features to be implemented in an OC of teachers. In contrast, they consider reputation as the least important motivator, and they do not perceive features such as users' rankings or contributors' acknowledgement sections as important. These results contribute to the improvement of the supporting platforms for OC of teachers and the integration in teaching practice.
51% of Ethereum Blocks are OFAC Censored was one of the annual headlines in the year 2022. Short for Office of Foreign Assets Control, OFAC, as a division of the U.S. Treasury Department, made itself go on the stage o...
An I-shaped tile proposed in this paper is used to construct an enharmonically conformed Tonnetz space that preserves more music-theoretic information related to tonality, arguably the original purpose of a Tonnetz, t...
ISBN:
(纸本)9783031606373;9783031606380
An I-shaped tile proposed in this paper is used to construct an enharmonically conformed Tonnetz space that preserves more music-theoretic information related to tonality, arguably the original purpose of a Tonnetz, than the standard parallelogram tiles currently used in the literature. The resulting tiling is monohedral, monomorphic and enantiomorphic, giving music-theoretic meaning in particular to the non-horizontal tile boundaries that cross fifths-related regions.
Due to the sheer breadth of content covered and large enrollment numbers in fundamental chemistry courses at the University of Central Florida (UCF), instructors and course designers often look for ways to accommodate...
ISBN:
(纸本)9783031606083;9783031606090
Due to the sheer breadth of content covered and large enrollment numbers in fundamental chemistry courses at the University of Central Florida (UCF), instructors and course designers often look for ways to accommodate a high degree of learner variability-in terms of interest, background, and content knowledge-to enhance the potential for student success. One way to accomplish this is through incorporating an adaptive instructional system (AIS), such asCanvasMastery Paths (MP), into the course design and implementation processes: a method ultimately aimed at improving student learning outcomes through the development and delivery of flexible, robustly aligned content-assessment sequences. In the current study, four (4) MP course modules on the topics of Measurements, Atomic Theory, Quantum Mechanics, and Molecular Polarity were created, with two optional surveys administered at the completion of the modules to gather insight into students' sentiments toward and perceived learning impact from MP. Overall, students felt like they had a better understanding of the course material and that MP had improved their attitude toward general chemistry.
Data re-identification methods are becoming increasingly sophisticated and can lead to disastrous data breaches. Re-identification is a key research topic for computer scientists as it can be used to reveal vulnerabil...
详细信息
ISBN:
(纸本)9783031680236;9783031680243
Data re-identification methods are becoming increasingly sophisticated and can lead to disastrous data breaches. Re-identification is a key research topic for computer scientists as it can be used to reveal vulnerabilities of de-identification methods such as anonymisation or pseudonymisation. However, re-identification, even for research purposes, involves processing personal data. From this background, this paper aims to investigate whether re-identification carried out by computer scientists for research purposes can be considered GDPR-compliant. This issue is paramount to contribute to improving the state of knowledge concerning data security measures.
In collaborative multi-user environments, participants must often locate and assimilate information from specific screen regions swiftly and repeatedly. This necessity can engender operational redundancies that detrim...
ISBN:
(纸本)9783031613500;9783031613517
In collaborative multi-user environments, participants must often locate and assimilate information from specific screen regions swiftly and repeatedly. This necessity can engender operational redundancies that detrimentally impact the efficacy of collaborative efforts. To address this issue, the present study conceptualizes information-seeking behaviors as screen zoom actions and devises an experimental framework wherein the zoom center and the modality of interaction serve as independent variables. The objective is to ascertain which modal of interaction facilitates the most efficient information retrieval. The findings indicate that voice commands with clearly defined semantics significantly enhance information search efficiency. Conversely, the performance of traditional keyboard_mouse inputs and rudimentary voice commands is markedly diminished. Collectively, this research delineates the interaction dynamics elicited by diverse modalities within a singular task context, thereby offering novel insights for ameliorating operational redundancies in multi-user collaborative settings.
The increase of electric vehicles has exacerbated the need for adequate security measures in the electric vehicle charging ecosystem (EVCE). Integrating IT services into the electric vehicle charging infrastructure ex...
ISBN:
(数字)9783031621390
ISBN:
(纸本)9783031621383;9783031621390
The increase of electric vehicles has exacerbated the need for adequate security measures in the electric vehicle charging ecosystem (EVCE). Integrating IT services into the electric vehicle charging infrastructure exposes it to several new attack vectors. In this paper, we apply a vulnerability analysis method to assess the current security posture of the internet-connected EVCE components. Our method is based on penetration testing principles using open-source cybersecurity search engines. Using this method, we gathered security-related information apparently associated with eight charging station vendors and three management systems, and we found 13 vulnerable technologies containing 81 vulnerabilities. Based on the information provided by vulnerability databases, we classified the threats according to the STRIDE model and analyzed the potential consequences of the vulnerabilities in terms of the security properties that can be violated.
Course evaluation plays a crucial role in analysing the effectiveness of a course. Despite the emerging trend of applying learning analytics approaches to course evaluation, only limited research has been conducted on...
ISBN:
(纸本)9789819744411;9789819744428
Course evaluation plays a crucial role in analysing the effectiveness of a course. Despite the emerging trend of applying learning analytics approaches to course evaluation, only limited research has been conducted on reviewing and examining the features of relevant practices. This study analysed the learning analytics approaches used for supporting course evaluation. It covered 27 empirical studies collected from Scopus that were published between 2013 and 2022. The results show the purposes of course evaluation based on learning analytics, including the enhancement of learning experience, effectiveness in learning and teaching, and learning performance and engagement. They also highlight the popular types of data for the learning analytics approaches, such as student performance, feedback, and online learning behaviours, as well as the analytical methods frequently applied, such as statistical tests, content analysis, and descriptive statistics. Additionally, the data visualisation methods most frequently used are also identified, such as tables, bar charts, and line charts. These findings inform the use of learning analytics in course evaluation and provide practical references for its implementation.
In this paper, we introduce a proposal towards a formal grammatical model that captures different types of negation uniformly, in terms of pragmatic structuring. The central objective of the paper is the analysis of t...
ISBN:
(数字)9783031608780
ISBN:
(纸本)9783031608773;9783031608780
In this paper, we introduce a proposal towards a formal grammatical model that captures different types of negation uniformly, in terms of pragmatic structuring. The central objective of the paper is the analysis of the relation between focusing and negation, modeling both 'focus negation' and 'sentential negation'. We propose a modular grammatical model, with separate but interrelated representations for syntax, semantics and information structure. We argue for a two-level analysis of negation, such that next to semantics it operates at the level of information structure. The main concern of the paper is the formal grammatical modeling of the IS-level, where negation targets the communicative function determined by the given focus structure.
Authors such as Hook, Tymozcko, and Cohn have used still imagery to model relation systematic pitch correlation and convey new analytical insights. Here we explore the pedagogical advantages of using industry-level gr...
ISBN:
(纸本)9783031606373;9783031606380
Authors such as Hook, Tymozcko, and Cohn have used still imagery to model relation systematic pitch correlation and convey new analytical insights. Here we explore the pedagogical advantages of using industry-level graphic software to produce animations in a visual language to which many users are habituated. This paper describes some of the technological resources and the advantages that they afford. It then presents fixed-image representations, and describes animated ones, of analyses of short cyclic progressions of harmonies in songs by Richard Rodgers (as performed by Ella Fitzgerald) and Nick Cave (as adapted and performed by Johnny Cash), as well as a passage of Schubert.
暂无评论