Skill Assessment Management System (SAM) has been popularly accepted by educational institutions. However, there has been little effort in previous studies using advanced statistical models to evaluate and therefore p...
详细信息
Skill Assessment Management System (SAM) has been popularly accepted by educational institutions. However, there has been little effort in previous studies using advanced statistical models to evaluate and therefore possibly to improve this system. In order to improve quality of existing systems, our effort aimed at identifying important predictors of students' satisfaction. In this study, the principal component analysis and logistic regression models were built to identify important predictors. It was found that "effectiveness of the assessment system", "getting help to use the system in class", "system performance" and "responsiveness" were associated with students' satisfaction. The logistic regression model and correlation analysis indicated that the predictors "effectiveness of the assessment system" and "getting help to use the system in class" had strong effects on students' satisfaction. The survey instrument was tested for reliability and validity.
RFID is automatic object identifying technology via radio frequency. And its application areas are un-describable for its convenience and pervasiveness. However, because the communication channel between the verifier ...
详细信息
ISBN:
(纸本)9780387741581
RFID is automatic object identifying technology via radio frequency. And its application areas are un-describable for its convenience and pervasiveness. However, because the communication channel between the verifier and the tag is wireless, serious privacy problems such as the data leakage and the data traceability can be occur. Without resolving these privacy problems, RFID system cannot be adapted fully in any area. Many kinds of security protocols have been proposed to resolve these problems. However, previous proposals did not satisfy security requirements and still leaved vulnerabilities. In this paper, we describe the security vulnerabilities of previous works for RFID systems. Finally, we propose a security protocol which based on one-time pad scheme using random nonce and shared secret values. The proposed protocol satisfies security requirements such as the data secrecy, data anonymity and the data authenticity between the verifier and the tag. We have proved security requirements satisfaction formally by using GNY logic.
The transformation from platform independent models to platform specific models is a key technology in OMG's MDA. The mapping relations between different models are the foundation and basis for the transformation....
详细信息
This paper presents a new multi-objective evolutionary algorithm (MOEA) which adopts a radial basis function (RBF) approach in order to reduce the number of fitness function evaluations performed to reach the Pareto f...
详细信息
ISBN:
(纸本)9781424407026
This paper presents a new multi-objective evolutionary algorithm (MOEA) which adopts a radial basis function (RBF) approach in order to reduce the number of fitness function evaluations performed to reach the Pareto front. The specific method adopted is derived from a comparative study conducted among several RBFs. In all cases, the NSGA-II (which is an approach representative of the state-of-the-art in the area) is adopted as our search engine with which the RBFs are hybridized. The resulting algorithm can produce very reasonable approximations of the true Pareto front with a very low number of evaluations, but is not able to spread solutions in an appropriate manner. This led us to introduce a second stage to the algorithm in which it is hybridized with rough sets theory in order to improve the spread of solutions. Rough sets, in this case, act as a local search approach which is able to generate solutions in the neighborhood of the few nondominated solutions previously generated. We show that our proposed hybrid approach only requires 2,000 fitness function evaluations in order to solve test problems with up to 30 decision variables. This is a very low value when compared with today's standards reported in the specialized literature.
The Microelectronics WebLab at MIT allows students to do actual (not simulated) laboratory research on state-of-the art equipment through the Internet. This study assesses the use of WebLab in a junior-level course on...
详细信息
Prisoner’s Dilemma is a common game theory scenario in which two players must choose between acting cooperatively or out of pure self-interest. What a player decides affects not only his own outcome but also that of ...
详细信息
Diversity preservation has already been established as an important concern for evolutionary computation. Clustering techniques were, among others, successfully applied to this purpose. Another important aspect of the...
详细信息
Diversity preservation has already been established as an important concern for evolutionary computation. Clustering techniques were, among others, successfully applied to this purpose. Another important aspect of the research on evolutionary computation is related to linkage learning - the detection of the problem structure avoiding disruption of building blocks when new individuals are generated. This paper presents a novel approach which is a new estimation of distribution algorithm (EDA) where clustering plays two roles: diversity preservation and linkage learning. Initial empirical investigations illustrate the behavior of the algorithm when solving two benchmark optimization problems.
Gene expression is the transformational procedure from genetic information of genome to proteome which affect the life activities of cells. The Regulation of gene expression determines the structure, quantity and func...
详细信息
High-quality engineering design requires an understanding of how the resulting engineered artifact interacts with society, the natural environment, and other aspects of context. This study examines how first-year engi...
详细信息
High-quality engineering design requires an understanding of how the resulting engineered artifact interacts with society, the natural environment, and other aspects of context. This study examines how first-year engineering undergraduates approached two engineering design tasks. We focused on how much students considered contextual factors during problem-scoping, a critical part of the design process. As part of a larger, longitudinal study, we collected data from 160 students at four U.S. institutions. Students varied in their consideration of each design task's context, and women's responses were more likely to be context-oriented than men's. Overall, context-orientation was positively correlated between the two design tasks, despite differences in data collection and analysis. Having found that beginning engineering students, particularly women, are sensitive to important contextual factors, we suggest that efforts to broaden participation in engineering should consider legitimizing and fostering context-oriented approaches to engineering earlier in the curriculum.
This paper studies the schema conversion from relational schemas to XML DTDs. As functional dependencies play an important role in schema conversion process, the concept of functional dependency for XML DTDs is propos...
详细信息
This paper studies the schema conversion from relational schemas to XML DTDs. As functional dependencies play an important role in schema conversion process, the concept of functional dependency for XML DTDs is proposed to preserve the semantics implied by functional dependencies and keys of relational schemas. A conversion method called NeT-FD (nesting- based translation with functional dependencies) is proposed to convert relational schemas to XML DTDs in the presence of functional dependencies and keys. The method presented here can preserve the semantics implied by functional dependencies and keys of relational schemas and can convert multiple tables to XML DTDs at the same time.
暂无评论