60,908 Hits in 5.6 sec

Introducing Cognition in Web-Based, Learning Management Systems for Vocabulary Teaching

Maria Paradia, Yiouli Kritikou, Vera Stavroulaki, Panagiotis Demestichas, George Dimitrakopoulos, Sotirios Glavas, Napoleon Mitsis
2012 Network and Communication Technologies  
Nowadays, connectivity is practically imposed for everyone, as it is used for professional interactions, information retrieval, or just for entertainment.  ...  The system proposed is capable of monitoring the user's activity and adapting accordingly, so as to improve the learning process as a whole.  ...  Currently, the need for communication and access to information becomes necessary on a daily basis in peoples' routine.  ... 
doi:10.5539/nct.v1n1p51 fatcat:ujbd3qnvn5bb3hizhxghek5udq

User-oriented web-based learning management systems for enhanced vocabulary teaching

Yiouli Kritikou, Vera Stavroulaki, Maria Paradia, Panagiotis Demestichas
2010 Procedia - Social and Behavioral Sciences  
Bayesian Networks concepts are used for monitoring past preferences, and for acquiring knowledge and determining the likelihood of future preferences, through the use of certain parameters.  ...  The presented system is a web-based learning management system, which uses cognition mechanisms in order to take into consideration both users' past preferences and their current feedback, with respect  ...  Introduction In contemporary societies the need for communication and access to information becomes continuously an increasing part of every field of human initiative.  ... 
doi:10.1016/j.sbspro.2010.12.183 fatcat:utp7wrdv6fedtdqisjac7hn5tu

User Profile Modeling in the context of web-based learning management systems

Yiouli Kritikou, Panagiotis Demestichas, Evgenia Adamopoulou, Konstantinos Demestichas, Michael Theologou, Maria Paradia
2008 Journal of Network and Computer Applications  
Brusilovsky et al., in [27] , also support the development of an adaptive e-learning platform, whose main components, for achieving adaptation, are Value-Added Services, Student Modeling Servers, and Topic  ...  Section 5 discusses on User Profile Modeling, by defining a 3-layer model which makes use of Bayesian Networks, with a view to predicting user preferences.  ...  The data collected in the User Monitoring component are transferred to the User Model, in order to serve as input for the adaptation of the user profile.  ... 
doi:10.1016/j.jnca.2007.11.006 fatcat:ln7mkeagbjc5vdyidoibednraq

The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework

Manal Alohali, Nathan Clarke, Steven Furnell
2018 International Journal of Advanced Computer Science and Applications  
The analysis of results was also useful in demonstrating how risk is not the same for all users and how the proposed model is effective in adapting to differences between users offering a novel approach  ...  Three risk assessment models were proposed that depend on user-centric and behavior-related factors when calculating risk.  ...  For the purposes of this Paper, three risk estimation models are proposed.  ... 
doi:10.14569/ijacsa.2018.091018 fatcat:ca6j6b32orcdxh4cgp5vrlb3oy

Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model

Chien-Lung Hsu, Yi-Chuan Liao
2019 Future Internet  
This study develops a contingent mediation model to investigate whether user perception enhances customer stickiness through emotional connection and further assess such mediating effect varies with different  ...  adaptivity.  ...  Adaptivity provides the solution to resolve these problems. Under high levels of adaptivity, users can access more precise and reliable information.  ... 
doi:10.3390/fi11060134 fatcat:xonsfgf4mreybnaasejbl57haa

Learning under Concept Drift: an Overview [article]

2010 arXiv   pre-print
In Section 2 we discuss the adaptivity mechanisms of the concept drift learners. In Section 3 we overview the principle mechanisms of concept drift learners.  ...  In this report we present a context of concept drift problem 1. We focus on the issues relevant to adaptive training set formation.  ...  The sources of concept drift are again twofold: adversary behavior trying to overcome the control as well as changing behavior of legitimate users.  ... 
arXiv:1010.4784v1 fatcat:zyeo767qtfdh5esvxjkkltnscy

Analysis and Prediction of Mobile Internet Users' Behavior Preferences

Ming-sheng ZHAO, Wei WU
2018 DEStech Transactions on Computer Science and Engineering  
The number of mobile Internet users is mounting, and the behavior preferences of its users also show some new characteristics and a tendency of diversification.  ...  the underlying reasons of differences in behavior preferences between different users.  ...  Acknowledgment This research was supported by Top-notch Academic Programs Project of Jiangsu Higher Education Institutions (No. PPZY2015A058).  ... 
doi:10.12783/dtcse/ccnt2018/24780 fatcat:giqlwolxuvbdtaaytwm37zvvky

Understanding Complexity in Charging Infrastructure through the Lens of Social Supply–Demand Systems

Jurjen Helmus, Mike Lees, Robert Hoed
2022 World Electric Vehicle Journal  
Despite the sheer volume of literature, limited attention has been paid to the characteristics and variance of charging behavior of EV users.  ...  Using this conceptual model, we estimate the rate complexity, using three developed ratios that relate to the (1) necessity of sharing resources, (2) probabilities of queuing, and (3) cascading impact  ...  In the simplest abstraction of the system, users do not share information with, or adapt their behavior to, other users.  ... 
doi:10.3390/wevj13030044 fatcat:2zkncnl5xrdfbjktxpsa6m3cdu

Step-Enhancement of Memory Retention for User Interest Prediction

Fulian Yin, Pei Su, Sitong Li, Long Ye
2020 IEEE Access  
However, merely focusing on the memory forgetting mechanism (the retention-only model) or considering the superimposition of interest retention in short term (the gradual-retention model), existing methods  ...  User behavior modeling and interest prediction are always the key elements in preference analysis, product recommendation and personalized service.  ...  Here we predict user behaviors based on their daily viewing duration (in hours) by use of different interest models (the retention-only model, the gradual-retention model, and our SEMR model with estimated  ... 
doi:10.1109/access.2020.3002225 fatcat:2at4u44innaldlstimcqii64sa

Context-Aware Mobile Power Management Using Fuzzy Inference as a Service [chapter]

Mohammad Moghimi, Jagannathan Venkatesh, Piero Zappi, Tajana Rosing
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Competition among running applications for access to sensor data in order to independently retrieve similar context information is both inefficient and redundant.  ...  For example, the context manager designed in [15] retrieves raw context information from sensors, offering high-level context aimed at providing an adaptive UI.  ...  Defining the optimal thresholds for each member of TimeOfDay is highly dependent on the behavior of the user.  ... 
doi:10.1007/978-3-642-36632-1_18 fatcat:h3dkvmklfnbljphh7bok26avpm

Towards User-Centric Intervention Adaptiveness: Influencing Behavior-Context based Healthy Lifestyle Interventions

Hafiz Syed Muhammad Bilal, Muhammad Bilal Amin, Jamil Hussain, Syed Imran Ali, Muahmmad Asif Razzaq, Musarrat Hussain, Asim Abbas Turi, Gwang Hoon Park, Sun Moo Kang, Sungyoung Lee
2020 IEEE Access  
Initially, the quantification of user lifelog to estimate the condition of users' behavior status.  ...  The availability of information avoids the mental stress of memorizing the pattern for the whole week as well give freedom to access the education material whenever and where ever they want to access.  ...  the impact of financial and emotional distress on behavior adaption.  ... 
doi:10.1109/access.2020.3026688 fatcat:svxynsdmrjfs3puss7izvg7ovi

Awareness and Control of Personal Data Based on the Cyber-I Privacy Model

Li Tang, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, He Li, Shaoyin Cheng
2014 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops  
Advantages of the user-centric CIPM are twofold: (1) reflecting a user's privacy needs to different applications; (2) adapting to a user's privacy demand changes.  ...  However, these privacy settings are application-oriented and have to be done manually by users for different applications.  ...  The future work will be carried out to refine the generation mechanisms of both initial and adaptive CIPM, provide more awareness and control service, and conduct further evaluations on the CIPM.  ... 
doi:10.1109/uic-atc-scalcom.2014.10 dblp:conf/uic/TangMHALC14 fatcat:5jiqym4tanf4vdapruszctmh7i

Event-Driven Implicit Authentication for Mobile Access Control

Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer
2015 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies  
Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated.  ...  The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time  ...  network information etc.) of the user.  ... 
doi:10.1109/ngmast.2015.47 dblp:conf/ngmast/YaoYKS15 fatcat:o53n5aeunrawla2kspaz3uhepq

Optimizing the Update Packet Stream for Web Applications [chapter]

Muthuprasanna Muthusrinivasan, Manimaran Govindarasu
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We thus propose extensions to the traditional periodic refresh model based on an adaptive smart sync approach that enables variable rate updates closely modeling expected user behavior over time.  ...  The Internet has evolved to an extent where users now expect any-where any-time and any-form access to their personalized data and applications of choice.  ...  In this paper, we analyze a sizeable subset of GMAIL user interactions with the cloud, to determine optimal user behavior models for likelihood estimation (update interval adaptation) and to also study  ... 
doi:10.1007/978-3-642-30376-0_8 fatcat:vvh7x2egvzhvljxvnqltkwqik4

Autonomous Network-Based Integration Architecture for Multi-Agent Systems under Dynamic and Heterogeneous Environment

Deng Xian-Rui, Liu Yu-Bin, Feng Yu-Fen
2015 International Journal of Smart Home  
Autonomous load distribution can be achieved through the integrated access method, which reduces the total load of the system for the number of Pull-MAs sent to the system decrease.  ...  In addition, the information structure of integrated service area is effective to improve the ratio of the satisfaction of Pull-MAs with joint request on one node.  ...  Acknowledgement This work is supported by the Hebei province science and technology plan project, No. 13220319D and Doctor Foundation of Tangshan Normal University No. 07A01.  ... 
doi:10.14257/ijsh.2015.9.5.18 fatcat:6sw2fsrkcje43d5jcv2eesv7iy
« Previous Showing results 1 — 15 out of 60,908 results