203 resultados para raccomandazione e-learning privacy tecnica rule-based recommender suggerimento


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Defining Issues Test (DIT), developed by Rest (1986), measures a person's level of moral development using hypothetical social dilemmas. Although the DIT is useful for measuring moral development in social settings, it might not adequately capture an individual's moral judgement abilities in solving work-related problems (Weber, 1990; Trevino, 1992; Welton et al., 1994). In the present study, the moral judgement levels of 97 accounting students were measured over a 1 year period using two separate test instruments, the DIT and a context-specific instrument developed by Welton et al. (1994). The test scores are significantly higher on the DIT than the Welton instrument (between the instruments and over time), suggesting that accounting students use higher levels of moral reasoning in resolving hypothetical social dilemmas and lower levels of moral reasoning in resolving context-specific dilemmas. The difference in test scores was highest during cooperative education (work placement programme), implying that the environment is a significant determinant on students' test scores.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As a popular technique in recommender systems, Collaborative Filtering (CF) has received extensive attention in recent years. However, its privacy-related issues, especially for neighborhood-based CF methods, can not be overlooked. The aim of this study is to address the privacy issues in the context of neighborhood-based CF methods by proposing a Private Neighbor Collaborative Filtering (PNCF) algorithm. The algorithm includes two privacy-preserving operations: Private Neighbor Selection and Recommendation-Aware Sensitivity. Private Neighbor Selection is constructed on the basis of the notion of differential privacy to privately choose neighbors. Recommendation-Aware Sensitivity is introduced to enhance the performance of recommendations. Theoretical and experimental analysis are provided to show the proposed algorithm can preserve differential privacy while retaining the accuracy of recommendations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

<b>Objective:</b> A study aimed at exploring the variation in perceptions of learning outcomes reported by undergraduate nursing students enrolled in a problem-based learning subject in a pre-registration Bachelor of Nursing course (BN).<br /><b>Method: </b>Students were asked to respond to four open-ended questions which focussed on their learning outcomes in the different teaching/learning modalities of the subject. Data were analysed in two phases using a modified phenomenographic analysis. In the first phase a set of categories of description were developed from the student responses to questions related to the learning modalities. In the second phase the individual responses were classified in terms of the categories. Finally, correlations between the learning modalities were identified. In this paper the approach to analysis, the process of category identification and the correlations between the learning modalities will be described and the implications for further research and teaching will be discussed.<br /><b>Results: </b>The findings indicated that there were two distinct groups of student responses. Inward focussed students who described outcomes in terms of their own learning and students whose focus was outward i.e. describing learning in terms of patient care and how learning relates to that care. Another important result shows the relationship between the learning modalities and outcomes. From the students' perspective, the most sophisticated outcomes of the lectures and laboratories were ideas and skills to be used and applied in clinical settings. Whereas, the group-based activities in which clinical problems were presented to the students in the form of Situation Improvement Packages (SIPS) focussed their attention on the clinical setting which constituted a preparation for the realities of clinical practice.<br /><b>Conclusion: </b>The findings from this study indicate that students perceive their learning in the group based teaching/learning modality (SIPS) as effective in focussing them on the reality of their role in the clinical practice environment while lectures and laboratories provided the skills and knowledge required for this setting.<br /><br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security protocol analysis has been discussed for quite some time in the past few years. Although formal methods have been widely used to identify various vulnerabilities, mainly susceptibility to freshness attacks and impersonation, the arisen inconsistent data between principals and collusion attacks held by a group of dishonest principals have been largely ignored. Moreover, the previous methods focus on reasoning about certain security-related properties and detecting known attacks against secure message, whereas there have been insufficient efforts to handle the above hidden but powerful attacks. In this paper, we address these critical issues and prove the efficiency and intuitiveness of rule-based dependency models in defending a protocol against the attacks. This is able to provide a numerical estimation to measure he occurrence of these attacks. It will be useful in enhancing the current protocol analysis.<br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An intelligent energy management system (IEMS) is developed to improve fuel efficiency of an internal combustion engine vehicle. It helps determine the best approach to run the engine system through dynamically analysing various factors relating to vehicle. The energy balance technique is implemented and utilised. The simulation outcome of the IEMS is compared against that of a conventional system under the same driving factors. The results show that the IEMS reduces the fuel consumption around 5.6% for the tested conditions.<br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The utilization of a fuzzy aspect within data analysis attempts to move from a quantitative to a more qualitative investigative environment. As such, this may allow the more non-quantitative researchers results they can use, based on sets of linguistic terms. In this paper an inductive fuzzy decision tree approach is utilized to construct a fuzzy-rule-based system for the first time in a biological setting. The specific biological problem considered attempts to identify the antecedents (conditions in the fuzzy decision rules) which characterize the length of song flight of the male sedge warbler when attempting to attract a mate. Hence, for a non-quantitative investigator the resultant set of fuzzy rules allows an insight into the linguistic interpretation on the relationship between associated characteristics and the respective song flight duration.<br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter discusses and illustrates some potential applications of discrete-event simulation (DES) techniques in structural reliability and availability analysis, emphasizing the convenience of using probabilistic approaches in modern building and civil engineering practices. After reviewing existing literature on the topic, some advantages of probabilistic techniques over analytical ones are highlighted. Then, we introduce a general framework for performing structural reliability and availability analysis through DES. Our methodology proposes the use of statistical distributions and techniques &ndash; such as survival analysis &ndash; to model component-level reliability. Then, using failure- and repair-time distributions and information about the structural logical topology (which allows determination of the structural state from their components&rsquo; state), structural reliability, and availability information can be inferred. Two numerical examples illustrate some potential applications of the proposed methodology to achieving more reliable and structural designs. Finally, an alternative approach to model uncertainty at component level is also introduced as ongoing work. This new approach is based on the use of fuzzy rule-based systems and it allows the introduction of experts&rsquo; opinions and evaluations in our methodology.<br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of instance selection is to identify which instances (examples, patterns) in a large dataset should be selected as representatives of the entire dataset, without significant loss of information. When a machine learning method is applied to the reduced dataset, the accuracy of the model should not be significantly worse than if the same method were applied to the entire dataset. The reducibility of any dataset, and hence the success of instance selection methods, surely depends on the characteristics of the dataset, as well as the machine learning method. This paper adopts a meta-learning approach, via an empirical study of 112 classification datasets from the UCI Repository [1], to explore the relationship between data characteristics, machine learning methods, and the success of instance selection method.<br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The learning experiences of first-year engineering students to a newly implemented engineering problem-based learning (PBL) curriculum is reported here, with an emphasis on student approaches to learning. Ethnographic approaches were used for data collection and analysis. This study found that student learning in a PBL team in this setting was mainly influenced by the attitudes, behaviour and learning approaches of the student members in that team. Three different learning cultures that emerged from the analysis of eight PBL teams are reported here. They are the finishing culture, the performing culture and the collaborative learning culture. It was found that the team that used a collaborative approach to learning benefited the most in this PBL setting. Students in this team approached learning at a deep level. The findings of this study imply that students in a problem-based, or project-based, learning setting may not automatically adopt a collaborative learning culture. Hence, it is important for institutions and teachers to identify and consider the factors that influence student learning in their particular setting, provide students with necessary tools and ongoing coaching to nurture deep learning approaches in PBL teams.<br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we purpose a rule pruning strategy to reduce the number of rules in a fuzzy rule-based classification system.A confidence factor, which is formulated based on the compatibility of the rules with the input patterns is under deployed for rule pruning.The pruning strategy aims at reducing the complexity of the fuzzy classification system and, at the same time, maintaining the accuracy rate at a good level.To evaluate the effectiveness of the pruning strategy, two benchmark data sets are first tested. Then, a fault classification problem with real senor measurements collected from a power generation plant is evaluated.The results obtained are analyzed and explained, and implications of the proposed rule pruning strategy to the fuzzy classification system are discussed. <br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the advent of Cloud Computing, IDS as a service (IDSaaS) has been proposed as an alternative to protect a network (e.g., financial organization) from a wide range of network attacks by offloading the expensive operations such as the process of signature matching to the cloud. The IDSaaS can be roughly classified into two types: signature-based detection and anomaly-based detection. During the packet inspection, no party wants to disclose their own data especially sensitive information to others, even to the cloud provider, for privacy concerns. However, current solutions of IDSaaS have not much discussed this issue. In this work, focus on the signature-based IDSaaS, we begin by designing a promising privacy-preserving intrusion detection mechanism, the main feature of which is that the process of signature matching does not reveal any specific content of network packets by means of a fingerprint-based comparison. We further conduct a study to evaluate this mechanism under a cloud scenario and identify several open problems and issues for designing such a privacy-preserving mechanism for IDSaaS in a practical environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tagging recommender systems allow Internet users to annotate resources with personalized tags. The connection among users, resources and these annotations, often called afolksonomy, permits users the freedom to explore tags, and to obtain recommendations. Releasing these tagging datasets accelerates both commercial and research work on recommender systems. However, adversaries may re-identify a user and her/his sensitivity information from the tagging dataset using a little background information. Recently, several private techniques have been proposed to address the problem, but most of them lack a strict privacy notion, and can hardly resist the number of possible attacks. This paper proposes an private releasing algorithm to perturb users' profile in a strict privacy notion, differential privacy, with the goal of preserving a user's identity in a tagging dataset. The algorithm includes three privacy preserving operations: Private Tag Clustering is used to shrink the randomized domain and Private Tag Selection is then applied to find the most suitable replacement tags for the original tags. To hide the numbers of tags, the third operation, Weight Perturbation, finally adds Lap lace noise to the weight of tags We present extensive experimental results on two real world datasets, Delicious and Bibsonomy. While the personalization algorithmis successful in both cases.