首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 250 毫秒
1.
传统的出题模式存在大量的弊端,开发一款系统、科学、高效的通用试题库管理系统是十分有必要的。介绍了一个通用试题库管理系统的设计思想,详细阐述了设计目标、系统结构,该系统由题库管理、试卷管理、生成试卷、用户管理、汇总统计、打印、帮助等九个主模块组成,对每个子模块的功能作了详细描述,并阐述了试题库管理系统的核心技术,抽取现有试卷、自动组卷、手动组卷等三种生成试卷的实现方式。  相似文献   

2.
林江毅 《科技广场》2013,(5):109-112
本文采用遗传算法(Genetic Algorithm,GA)实现自动组卷的系统中,并没有充分考虑试卷中知识点(测试维度)的分值分布,提出一种新的遗传算法(New Genetic Algorithm,NGA)来实现自动组卷功能,并重新定义了适应度函数,加快收敛速度。仿真实验表明,NGA算法不仅高效,且能生成一份有效试卷,使得试卷分值能在测试的维度上尽量实现均匀分布。  相似文献   

3.
自动组卷系统是计算机辅助教学的重要组成部分,而遗传算法以其全局寻优和智能搜索的特性,得到了广泛的运用。根据自动组卷系统的特点,将遗传算法合理应用于自动组卷中,在遗传算法中,设计了双种群机制,并以试卷难度、试卷区分度、试卷的估计用时、知识点分布为基础构造适应度函数,通过轮盘赌选择方法、多点交叉和变异,较好地解决了自动组卷的多重目标寻优问题。  相似文献   

4.
本文针对目前自动组卷系统存在试卷质量低、抽题效率低和缺乏智能性的不足,从试卷控制指标的设置、组卷的算法的设计等方面探讨如何提高自动组卷的试卷质量、速度和智能化等问题。  相似文献   

5.
网络化考试是新时期高校课程考核形式发展的一种趋势,其中试题库构建和自动组卷方案是衡量试卷质量的重要因素。本文对网络化考试中的试题库设计、自动组卷策略和试卷统计分析进行研究,给出试题在数据库中的结构,提出运用新兴智能优化算法进行自动组卷的发展方向,论述了试卷统计分析应具有的功能。  相似文献   

6.
研究了自动生成试卷所需的数据结构及参数设置,提出了利用遗传算法进行试卷生成的主要设计目标,同时对试卷生成的约束条件和适应度函数进行了细致的分析。为了有效利用遗传算法实现试卷的自动生成并达到理想的结果,对遗传算法进行了改进,并成功的应用于试卷生成过程中。实践证明生成的试卷合乎要求,具有较高的可信度并取得了良好的效果。  相似文献   

7.
《计算机应用基础》作为高校必开的公共基础课,考试是课程教学中必须进行的一个环节,然而测考试前的出题、试卷印制,考后的阅卷、登分工作给教师带来了庞大的工作量,为了解决此类问题,越来越多的高校都会采用在线考试系统以取代传统的笔试。然而Office试题的试卷自动组卷是考试系统中的难点。本文将对Office试题自动组卷实现过程作以论述。  相似文献   

8.
运用Auto CAD内嵌的面向对象的VBA语言设计了工程制图试题库模块程序,实现了试卷的自动组卷和互动组卷功能。设计的试题库系统组题速度快,修改方便,具备良好的互动性和扩展性,并能严格保证试卷的图形标准化要求。  相似文献   

9.
基于Java的自动组卷系统的实现   总被引:1,自引:0,他引:1  
针对网络化考试的要求,为了使生成的试卷更科学、合理和有区分度,文中讨论了组卷原则,并提出了一套简单实用的组卷算法。  相似文献   

10.
自动组卷算法要求适应测试的多种约束条件,从题库中高效快速的组成多份彼此等值的试卷。常见的约束条件有统计学约束和非计量学目标,统计学约束有区分度、难度、测量精度等,非计量学目标有内容和题型分布、时间控制、"敌对题"的检测等等。本文分析一些常用的计算机自动组卷算法,结合各算法的特点,为实际应用中如何选择合适的算法进行智能组卷提供一些建议。  相似文献   

11.
一个基于安全模型的测试用例生成工具   总被引:1,自引:0,他引:1  
在基于安全评估标准的安全数据库管理系统(Security Database Management System, SDBMS)的安全功能测评中,存在的困难问题之一就是缺乏合适的测试用例.而目前基于安全产品形式化规约的测试用例自动生成方法并不能完全适用于这种需要.因为包括SDBMS在内的大多数信息安全产品的系统规约并不能真实的反映现实系统的行为,系统中的操作除了要完成其预定的功能外,同时还必须满足安全产品安全策略的约束.本文采用了基于安全产品安全策略模型的测试用例自动生成方法,设计并实现了一个测试用例自动化生成工具——CaseBuilder.该工具可针对SDBMS快速生成能够满足产品安全策略测试要求的测试用例集.  相似文献   

12.
13.
Timeline generation systems are a class of algorithms that produce a sequence of time-ordered sentences or text snippets extracted in real-time from high-volume streams of digital documents (e.g. news articles), focusing on retaining relevant and informative content for a particular information need (e.g. topic or event). These systems have a range of uses, such as producing concise overviews of events for end-users (human or artificial agents). To advance the field of automatic timeline generation, robust and reproducible evaluation methodologies are needed. To this end, several evaluation metrics and labeling methodologies have recently been developed - focusing on information nugget or cluster-based ground truth representations, respectively. These methodologies rely on human assessors manually mapping timeline items (e.g. sentences) to an explicit representation of what information a ‘good’ summary should contain. However, while these evaluation methodologies produce reusable ground truth labels, prior works have reported cases where such evaluations fail to accurately estimate the performance of new timeline generation systems due to label incompleteness. In this paper, we first quantify the extent to which the timeline summarization test collections fail to generalize to new summarization systems, then we propose, evaluate and analyze new automatic solutions to this issue. In particular, using a depooling methodology over 19 systems and across three high-volume datasets, we quantify the degree of system ranking error caused by excluding those systems when labeling. We show that when considering lower-effectiveness systems, the test collections are robust (the likelihood of systems being miss-ranked is low). However, we show that the risk of systems being mis-ranked increases as the effectiveness of systems held-out from the pool increases. To reduce the risk of mis-ranking systems, we also propose a range of different automatic ground truth label expansion techniques. Our results show that the proposed expansion techniques can be effective at increasing the robustness of the TREC-TS test collections, as they are able to generate large numbers missing matches with high accuracy, markedly reducing the number of mis-rankings by up to 50%.  相似文献   

14.
网上成绩管理系统已经成为很多学校管理成绩、公布成绩、查询成绩的一个重要工具。然而,网上成绩录入无疑会增加教师的工作量。如果系统能自动生成成绩质量分析表,那么网上录入成绩工作便会成为教师乐于做的事情。在自动生成质量分析表的功能里,排名是比较难实现的一部分,主要通过研究动态变量名的方式来实现排名。  相似文献   

15.
在自行构建的超声频谱分析系统上,研究表面缺陷对声波调制的声学机理,提出一种基于单缺陷回波的局部频谱分析而对表面缺陷类型进行检测的方法,给出了用超声频域分析法对工件表面缺陷特征分析的实例,并用计算机检测系统得出了相应的试验结果,从而提高了检测可靠性.此检测方法可成为计算机辅助对缺陷进行分析的依据.  相似文献   

16.
戴银飞 《现代情报》2006,26(11):209-210
通过采用网络安全技术中经常使用的“报文摘要”算法.将考生的试卷内容和考生的考号进行摘要计算,然后生成一个固定长度的摘要.而考生试卷中的任何一个字节变化都会影响到该摘要,从而保证考卷的数据完整性。因此.当答卷被修改,或者考生对其答案是否被修改提出质疑时。系统会提供明确的证据。  相似文献   

17.
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cybercriminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated, the cybercriminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a malicious Web server. This is known as a drive-by download. In a drive-by download a user's computer system is infected while interacting with the malicious endpoint, often without them being made aware the attack has taken place. An attacker can gain control of the system by exploiting unpatched system vulnerabilities and this form of attack currently represents one of the most common methods employed. In this paper we build a machine learning model using machine activity data and tweet metadata to move beyond post-execution classification of such URLs as malicious, to predict a URL will be malicious with 0.99 F-measure (using 10-fold cross-validation) and 0.833 (using an unseen test set) at 1 s into the interaction with the URL. Thus, providing a basis from which to kill the connection to the server before an attack has completed and proactively blocking and preventing an attack, rather than reacting and repairing at a later date.  相似文献   

18.
介绍了一种可可广泛应用于舰船液位监控和测量的自动控制系统,该系统将先进的计算机控制技术、嵌入式微机控制技术、传感器技术、精确测量技术结合在一起,以工控机组态作为上位机进行监控,触摸屏作为人机操作界面;分析了舰船液位测控设备的设计流程及控制系统的功能,建立了控制系统组成结构,研究了系统硬件设计和软件设计中的主要要求及实现方法。该系统在实际应用中稳定可靠,自动化程度高,操作简便、直观,取得了很好的效果。  相似文献   

19.
In image retrieval, most systems lack user-centred evaluation since they are assessed by some chosen ground truth dataset. The results reported through precision and recall assessed against the ground truth are thought of as being an acceptable surrogate for the judgment of real users. Much current research focuses on automatically assigning keywords to images for enhancing retrieval effectiveness. However, evaluation methods are usually based on system-level assessment, e.g. classification accuracy based on some chosen ground truth dataset. In this paper, we present a qualitative evaluation methodology for automatic image indexing systems. The automatic indexing task is formulated as one of image annotation, or automatic metadata generation for images. The evaluation is composed of two individual methods. First, the automatic indexing annotation results are assessed by human subjects. Second, the subjects are asked to annotate some chosen images as the test set whose annotations are used as ground truth. Then, the system is tested by the test set whose annotation results are judged against the ground truth. Only one of these methods is reported for most systems on which user-centred evaluation are conducted. We believe that both methods need to be considered for full evaluation. We also provide an example evaluation of our system based on this methodology. According to this study, our proposed evaluation methodology is able to provide deeper understanding of the system’s performance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号