首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
教育   5篇
科学研究   2篇
信息传播   1篇
  2019年   1篇
  2018年   3篇
  2017年   1篇
  2016年   1篇
  2012年   1篇
  2009年   1篇
排序方式: 共有8条查询结果,搜索用时 15 毫秒
1
1.
The authors searched five scholarly databases for a decade of research publications examining learning from failure as an instructional strategy. Out of 187 publications, 62 were found to be relevant to the topic from which only 12 used experimental design to examine the issue and reported statistics appropriate for meta-analysis. The studies also represented only two of our search domains-productive failure and failure-driven memory. The small number of experimental studies on this topic is a telling indication of the state of experimental research in this area. However, they revealed a moderately positive result for the effect of learning from failure. An examination of moderating variables indicated that participants’ grade level, subject matter domain, and study’s duration, while not significant in explaining the differences across the examined studies, showed positive medium effect sizes. Instructional design implications of our findings and limitations of the study are discussed.  相似文献   
2.
Privacy-preserving collaborative filtering algorithms are successful approaches. However, they are susceptible to shilling attacks. Recent research has increasingly focused on collaborative filtering to protect against both privacy and shilling attacks. Malicious users may add fake profiles to manipulate the output of privacy-preserving collaborative filtering systems, which reduces the accuracy of these systems. Thus, it is imperative to detect fake profiles for overall success. Many methods have been developed for detecting attack profiles to keep them outside of the system. However, these techniques have all been established for non-private collaborative filtering schemes. The detection of shilling attacks in privacy-preserving recommendation systems has not been deeply examined. In this study, we examine the detection of shilling attacks in privacy-preserving collaborative filtering systems. We utilize four attack-detection methods to filter out fake profiles produced by six well-known shilling attacks on perturbed data. We evaluate these detection methods with respect to their ability to identify bogus profiles. Real data-based experiments are performed. Empirical outcomes demonstrate that some of the detection methods are very successful at filtering out fake profiles in privacy-preserving collaborating filtering schemes.  相似文献   
3.
An attentional-associative model (Schmajuk, Lam, & Gray Journal of Experimental Psychology: Animal Behavior Processes, 22, 321–349, 1996) assumes that nonreinforced presentations of an inhibitory conditioned stimulus (CS) do not decrease its inhibitory associations. However, the model predicts that extended presentations will decrease attention to the inhibitor, thereby decreasing both (1) the expression of its inhibitory power in a summation test and (2) the rate of acquisition in a retardation test. The model also predicts that subsequent presentations of the inhibitory CS with a novel CS will increase both (1) and (2). Using a predictive learning design in humans, Experiment 1 examined the predictions involving the summation tests, whereas Experiments 2 and 3 examined the predictions involving the retardation tests. Experimental results were in agreement with the predictions of the model.  相似文献   
4.
ABSTRACT

The main aim of this research is to evaluate the use of Influence in Agile Management at schools by the school administration, which is used with the purpose of increasing success and quality of schools. It is evaluated, within this context, that obtaining opinions of teachers from two different educational institutions would contribute to the improvement of the educational sector. This research aims at underlining which type of influence method used by the school administration would be more beneficial. Semi-structured interview, which is one of the types of qualitative approach, has been used in this research and 18 teachers were interviewed from two different educational institutions. According to the results of the semi-structured interview, teachers have expressed that they do not undertake the desired role in the decision-making process on the changes to be made at schools. They added that they are taking part in the decision-making process at low profiles, but they would like to take more active roles. Moreover, it has been observed that there is no initiative or plan to include teachers to the decision-making process and there is no training to the teachers on this issue even in universal values and disability.  相似文献   
5.
A short 12-item version of the Career Adapt-Abilities Scale–Short Form (CAAS-SF) was validated across three different age groups in the Turkish context. Scale scores demonstrated adequate to high internal consistency and 4-week test–retest reliability, good fit with the original four-factor model, factorial invariance across gender and age groups, strong convergence with the 24-item version, negative associations with trait anxiety and work stress, and positive associations with career decision self-efficacy. It was concluded that the Turkish version of the CAAS-SF appears to be a valid and reliable measure for assessing career adaptability and using it in career education and counseling process.  相似文献   
6.
In this paper, we propose a novel method for addressing the multi-equilibria consensus problem for a network of n agents with dynamics evolving in discrete-time. In this method, we introduce, for the first time in the literature, two concepts called primary and secondary layer subgraphs. Then, we present our main results on directed graphs such that multiple consensus equilibria states are achieved, thereby extending the existing single-state consensus convergence results in the literature. Furthermore, we propose an algorithm to determine the number of equilibria for any given directed graph automatically by a computer program. We also analyze the convergence properties of multi-equilibria consensus in directed networks with time-delays under the assumption that all delays are bounded. We show that introducing communication time-delays does not affect the number of equilibria of the given network. Finally, we verify our theoretical results via numerical examples.  相似文献   
7.
We present Biased LexRank, a method for semi-supervised passage retrieval in the context of question answering. We represent a text as a graph of passages linked based on their pairwise lexical similarity. We use traditional passage retrieval techniques to identify passages that are likely to be relevant to a user’s natural language question. We then perform a random walk on the lexical similarity graph in order to recursively retrieve additional passages that are similar to other relevant passages. We present results on several benchmarks that show the applicability of our work to question answering and topic-focused text summarization.  相似文献   
8.
Teachers’ episodic memories influence their beliefs. The investigation of episodic memories can help identify the teacher beliefs that limit technology-integration. We propose the Episode-Centered Belief Change (ECBC) model that utilizes teachers’ episodic memories for changing beliefs impeding effective technology integration. We also propose guidelines for using ECBC model in professional development to promote teacher belief change for effective technology integration. A preliminary study was conducted to apply the ECBC model in a teacher education course. The findings suggest that the ECBC model was effective in changing teacher beliefs regarding technology integration. Finally, the implications of the ECBC model and guidelines for research and practice are discussed.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号