This paper presents results from three experiments which investigate the evolution of referential communication in embodied dynamical agents. Agents, interacting with only simple sensors and motors, are evolved in a t...
详细信息
In well-defined domains there exist well-accepted criteria for detecting good and bad student solutions. Many ITS implement these criteria characterize solutions and to give immediate feedback. While this has been sho...
详细信息
ISBN:
(纸本)9780615306292
In well-defined domains there exist well-accepted criteria for detecting good and bad student solutions. Many ITS implement these criteria characterize solutions and to give immediate feedback. While this has been shown to promote learning, it is not always possible in ill-defined domains that typically lack well-accepted criteria. In this paper we report on the induction of classification rules for student solutions in an ill-defined domain. 1 We compare the viability of classifications using statistical measures with classification trees induced via C4.5 and Genetic programming.
This paper examines the formation of self-organizing feature maps (SOFM) by the direct optimization of a cost function through a genetic algorithm (GA). The resulting SOFM is expected to produce simultaneously a topol...
详细信息
In the present work, the architecture of a knowledge-based free-text response assessment system is presented, which can assess free-text responses on open-ended questions based on text comprehension theories. Its main...
详细信息
ISBN:
(纸本)9781627483339
In the present work, the architecture of a knowledge-based free-text response assessment system is presented, which can assess free-text responses on open-ended questions based on text comprehension theories. Its main advantages are the facts of extending the knowledge base and assessing responses on questions of different types. It is constituted from three basic modules: The first module is the Normalization Module (NoM), which is responsible for converting free-text responses into normalized responses, as well as, converting technical text into "functional system". The second module is the Functional System Module (FSM), which depicts all entities of a technical text and the relations among them, and is presented, by the representation of microstructure and macrostructure of a Computer Networks domain technical text, according to Denhiere-Baudet Text Comprehension Model. The third module is the Assessment Module (AM), responsible for assessing the normalized responses. It is based on data, obtained by experimental studies on microstructure and macrostructure, constructed by secondary school students, during reading technical texts and responding to questions.
This work presents a branch & bound method that allows software managers to determine the optimum order for the development of a network of dependent software parts that have value to customers. In many different ...
详细信息
ISBN:
(纸本)9789898111388
This work presents a branch & bound method that allows software managers to determine the optimum order for the development of a network of dependent software parts that have value to customers. In many different circumstances the method allows for the development of complex and otherwise expensive software from a relatively small investment, favoring the use of software development as a means of obtaining competitive advantage.
For many educational applications such as learning tools for argumentation, structured diagrams are a suitable form of external representation. However, student-created graphs pose some problems to ITS designers, espe...
详细信息
Todaypsilas Information Technology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-ad...
详细信息
Todaypsilas Information Technology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-added by embedding other hidden-service within the main service, hence promoting value-added to the service. The value-added services are accomplished by using the technique of Multiple Keys and Messages Embedding (MKME), which hidden-contents can be retrieved only by applying the correct corresponding decryption keys This paper presents the design and algorithm for multiple keys and messages embedding on 3D Video GIS, based on Steganography concept. The quality of the resulting product was also investigated. The main data used is geospatial video, which is primarily used by the elderly and disables people so that they can feel the surroundings on their desktop while sitting at home.
The next generation of wireless sensor networks will integrate communication systems beyond the third generation paradigm. As a result of this integration, the new communication systems will be fed by the sensor netwo...
详细信息
The next generation of wireless sensor networks will integrate communication systems beyond the third generation paradigm. As a result of this integration, the new communication systems will be fed by the sensor networks with information gathered from the environment, achieving context awareness. To reach the necessary end-to-end connectivity between all-IP networks and sensor networks, the IETF 6LoWPAN working group has designed an IPv6 adaptation layer for low power devices. This protocol stack provides IPv6 interoperability to the sensor networks, thus avoiding as much overhead as possible. This paper analyses and evaluates the associated IP communication overhead in each possible 6LoWPAN scenario, from intra to inter network communication. We conclude that, even the 6LoWPAN offering a light weight IP solution for link local sensor network communication, it has a relatively high overhead when data flows between different networks. In order to avoid the communication overhead when global IPv6 addressing is necessary we propose a new solution based on a 6LoWPAN global-to-link-layer address translation.
In emergency response organizations with very limited resources, information technologies are not adequately explored. In such organizations, the simple adoption of new information technologies is not productive, as t...
详细信息
ISBN:
(纸本)9781424416509
In emergency response organizations with very limited resources, information technologies are not adequately explored. In such organizations, the simple adoption of new information technologies is not productive, as their efficient use depends on many other interrelated technologies. This work describes a model to help understanding these interrelationships. The model allows the cooperative evaluation of an organization through different perspectives. Using the model, an organization can measure its maturity level and guide the investment in emergency response capabilities. The information technology dimension of the model has been applied to the firefight organization in Brazil.
暂无评论