• Title/Summary/Keyword: computer-based evaluation

Search Result 2,308, Processing Time 0.03 seconds

UML-ITS Usability Evaluation of Intelligent Tutoring System

  • Sehrish Abrejo;Amber Baig;Mutee U Rahman;Adnan Asghar Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.123-129
    • /
    • 2023
  • The most effective tutoring method is one-on-one, face-to-face in-person human tutoring. However, due to the limited availability of human tutors, computer-based alternatives have been developed. These software based alternatives are called Intelligent Tutoring Systems (ITS) which are used to tutor students in different domains. Although ITS performance is inferior to that of human teachers, the field is growing and has recently become very popular. User interfaces play key role in usability perspective of ITS. Even though ITS research has advanced, the majority of the work has concentrated on learning sciences while mostly disregarding user interfaces. Because of this, the present ITS includes effective learning modules but a less effective interface design. Usability is one approach to gauge a software's performance, while "ease of use" is one way to assess a software's quality. This paper measures the usability effectiveness of an ITS which is designed to teach Object-Oriented (OO) analysis and design concepts using Unified Modeling Language (UML). Computer Supported Usability Questionnaire (CSUQ) survey was conducted for usability evaluation of UML-ITS. According to participants' responses to the system's usability survey, all responses lie between 1 to 3 scale points which indicate that the participants were satisfied and comfortable with most of the system's interface features.

Evaluation of different attacks on Knowledge Based Authentication technique

  • Vijeet Meshram
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.111-115
    • /
    • 2023
  • Knowledge Based Authentication is the most well-known technique for user authentication in a computer security framework. Most frameworks utilize a straightforward PIN (Personal Identification Number) or psssword as an data authenticator. Since password based authenticators typically will be software based, they are inclined to different attacks and weaknesses, from both human and software.Some of the attacks are talked about in this paper.

Development of Theocratical Model and Evaluation Tool for Learning Epistemic Frame using Computer based Learning System (컴퓨터기반 교육시스템의 인식론적 프레임 학습을 위한 이론모형 구축과 평가도구 개발)

  • Choi, Younyoung;Seo, Donggi;Jung, Sunho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.354-360
    • /
    • 2018
  • Recently, the computer aided learning system has promoted a new educational concept and education system. The purpose of this study is to construct a theoretical model for the epistemic frame and evaluation tool which is emphasized according to the 21st century. Specifically, first, this study conducted a domain analysis of epistemic frame. Second, this study developed an evaluation tool to measure epistemic frame. Finally, the evaluation tool is examined in terms of validity and reliability using factor analysis and Cronbach's alpha. As a result, the theoretical model was presented through the consultation of the Advisory Group and the evaluation tool was empirically validated. We expect that this study will provide a useful information to researchers and practitioners who want to develop a computer based learning tool for learning epistemic frame.

A study on the application of mission-based weapon system cybersecurity test and evaluation (임무 기반의 무기체계 사이버보안 시험평가 적용 연구)

  • Kim, Ik-jae;Kang, Ji-won;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.71-81
    • /
    • 2021
  • This paper examines the ongoing research on ways to improve cybersecurity during the entire life cycle of weapons systems applied in advanced countries such as the United States, analyzes restrictions on obtaining domestic weapons systems, and presents effective security evaluation measures. By consistently performing mission-based risk assessment in the cybersecurity test and evaluation plan suitable for domestic circumstances at all stages of acquisition, important information is provided to major decision-making organizations in a timely manner to support decision-making, and to respond to identified vulnerabilities in cybersecurity. It is proposed to set the rules of engagement so that the protection measures can be verified, and a simulated invasion is proposed. In addition, the proposed cybersecurity test and evaluation system was compared with the domestic weapon system test and evaluation. Through this, the mission-based risk assessment element was grafted into the cybersecurity test and evaluation system research conducted so far to identify risks in a timely manner between acquisition projects, thereby supplementing the capability to support major decision-making.

A Study on The Pre-feasibility Assessment Using The AHP : Focusing on The Case of Public Project

  • Park, Deuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.163-168
    • /
    • 2015
  • Various methods have been used to solve the problem of the evaluation of the complex decision-making. In the case of public projects, used the AHP method to evaluate the pre-feasibility of the projects. In this paper, The pre-feasibility was referring to the 'General guidelines for the pre-feasibility' of the KDI and was used the AHP to evaluate for public projects of the H-city. In order to achieve this object, the structured hierarchical model and questionnaire developed based on the evaluation guidelines of the KDI. Also, the weight of evaluation factor was calculated based on the AHP method and was obtained the evaluation results for the project implementation alternative.

Feature Impact Evaluation Based Pattern Classification System

  • Rhee, Hyun-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.25-30
    • /
    • 2018
  • Pattern classification system is often an important component of intelligent systems. In this paper, we present a pattern classification system consisted of the feature selection module, knowledge base construction module and decision module. We introduce a feature impact evaluation selection method based on fuzzy cluster analysis considering computational approach and generalization capability of given data characteristics. A fuzzy neural network, OFUN-NET based on unsupervised learning data mining technique produces knowledge base for representative clusters. 240 blemish pattern images are prepared and applied to the proposed system. Experimental results show the feasibility of the proposed classification system as an automating defect inspection tool.

Subjective Evaluation on Perceptual Tracking Errors from Modeling Errors in Model-Based Tracking

  • Rhee, Eun Joo;Park, Jungsik;Seo, Byung-Kuk;Park, Jong-Il
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.6
    • /
    • pp.407-412
    • /
    • 2015
  • In model-based tracking, an accurate 3D model of a target object or scene is mostly assumed to be known or given in advance, but the accuracy of the model should be guaranteed for accurate pose estimation. In many application domains, on the other hand, end users are not highly distracted by tracking errors from certain levels of modeling errors. In this paper, we examine perceptual tracking errors, which are predominantly caused by modeling errors, on subjective evaluation and compare them to computational tracking errors. We also discuss the tolerance of modeling errors by analyzing their permissible ranges.

Process-oriented Evaluation Method for Computational Thinking (컴퓨팅 사고력의 과정중심 평가 방안)

  • Lee, Jeonghun;Cho, Jungwon
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.95-104
    • /
    • 2021
  • Software education is drawing attention as an education for fostering future talents who will lead the 4th industrial revolution. The purpose of software education for everyone from kinder to adults is not simply to develop programming skills, but to develop "Computational Thinking," a problem-solving ability that effectively solves real-world problems based on computing. Therefore, how to cultivate and evaluate computational thinking is a very important issue. This paper proposed a method of applying a process-based performance evaluation method to evaluate computational thinking ability in the process of solving learners' problems. The developed contents were revised and supplemented through two Delphi surveys by a group of experts consisting of five university professors and five incumbent information teachers majoring in computer science and computer education to verify the effectiveness of the final model. I hope This paper can contribute to the study of evaluating computer thinking ability from the perspective of problem solving.

Inscribed Approximation based Adaptive Tessellation of Catmull-Clark Subdivision Surfaces

  • Lai, Shuhua;Cheng, Fuhua(Frank)
    • International Journal of CAD/CAM
    • /
    • v.6 no.1
    • /
    • pp.139-148
    • /
    • 2006
  • Catmull-Clark subdivision scheme provides a powerful method for building smooth and complex surfaces. But the number of faces in the uniformly refined meshes increases exponentially with respect to subdivision depth. Adaptive tessellation reduces the number of faces needed to yield a smooth approximation to the limit surface and, consequently, makes the rendering process more efficient. In this paper, we present a new adaptive tessellation method for general Catmull-Clark subdivision surfaces. Different from previous control mesh refinement based approaches, which generate approximate meshes that usually do not interpolate the limit surface, the new method is based on direct evaluation of the limit surface to generate an inscribed polyhedron of the limit surface. With explicit evaluation of general Catmull-Clark subdivision surfaces becoming available, the new adaptive tessellation method can precisely measure error for every point of the limit surface. Hence, it has complete control of the accuracy of the tessellation result. Cracks are avoided by using a recursive color marking process to ensure that adjacent patches or subpatches use the same limit surface points in the construction of the shared boundary. The new method performs limit surface evaluation only at points that are needed for the final rendering process. Therefore it is very fast and memory efficient. The new method is presented for the general Catmull-Clark subdivision scheme. But it can be used for any subdivision scheme that has an explicit evaluation method for its limit surface.

An Analysis Method and Environment for Team Project-Based Learning in Non-Face-to-Face Situation for Student Evaluation (비대면 팀 프로젝트 기반 수업 평가를 위한 분석 방법 및 평가환경)

  • Lee, Jaiyun;Han, Seyoung;Choi, Changbeom
    • Journal of Engineering Education Research
    • /
    • v.25 no.3
    • /
    • pp.3-10
    • /
    • 2022
  • An educator may utilize various pedagogies such as hands-on practice, practicum, and project-based learning to enhance a student's competency. Among various pedagogies, project-based learning is one of the well-known pedagogies that may provide similar on-the-job experience. In general, an educator may divide the students into small groups and assign tasks to check students' cooperation skills and achievements during project-based learning. However, an educator may experience difficulties operating project-based learning due to the COVID-19 pandemic. Most of the team activities are done in non-face-to-face meetings, and as a consequence, the educator may not find an underachieving team easily and cannot intervene appropriately. This study introduces a rigorous analysis method to evaluate team activities to analyze individual students' participation and contributions. First, this study develops evaluation rubrics by conducting questionnaires to professors and students to find an appropriate weight value for the evaluation scale. Then, this research introduces an analysis environment to evaluate students automatically. The analysis environment collects dialog data from social network services and measures interactions among students in a team. After measuring interactions, the environment generates a report to visualize the team activities. We applied the proposed method and environment to the capstone design course to show the effectiveness of the method and environment. Based on the case study, the environment showed that the analysis method could easily indicate the teams' activities and check the level of participation.