... TAM versus PCI, using data gathered in a naturally occurring and
field-based adoption process.
References
1. Bahreininejad, A.: E-learning and associated issues in Iran. International Journal ... and junior high
school in Taiwan with Competence Indicators (CIs). CIs are the references for
editing teaching materials, designing instruction, planning and implementing
evaluation. Teac...
... Knowledge Points
3.2.1 Choosing the Knowledge Points
To choose knowledge points is the key of personalized scheduling of learning content,
which is mainly choosing the learning knowledge points on ... personalization in web-based
learning environment including learners’ styles, inferring engine, learning content
library and result analysis, and so on. Nobuko [7] studied student model,...
... teaching assistant of “Industry System Introduction”, and we
also maintain the WebCASE system as a system administrator. We can observe pro-
gress and result of each group either online or offline. ... Example*
Xinyu Zhang
1
, Nianlong Luo
1
, and Li Zheng
2
1
Computer and Information Management Center, Tsinghua University,
Beijing100084, China
{XinyuZhang,NianlongLuo}zxy@cic.tsinghua...
... chang-
ing the process structure through showing/hiding scenarios, changing the sequence of
stages, showing/hiding activities/activity-structure. The adaptation is expressed as
rules in APS. ... process models, an authoring tool for modeling
assessment processes with APS will be developed in the near future. In order to exe-
cute an instantiated model in existing LD and QTI compati...
... analysis. There are kinds of
algorithms in the system used to find out the errors in the code, such as brackets
matching algorithm, semicolon positioning algorithm and variable definition algo-
rithm. ... according to the analytical
database. This way is responsible for deleting the relative errors and positioning the
mistakes correctly. The main code is shown in the following:
pri...
... problem-solving issues with regards to computer
operating systems, including deleting cookies, rearranging hard disks, reinstalling
software, and so forth. However, the steps involved in these ... a battle against crimes in a big city. The “big city” is akin to the operating system
(Window XP) in a computer. The “crimes” are problems with computer usage, such
as a kidnapping of...
...
agent in the system,
which in charge of investigating the
learner who first use the system, providing a final test while the learner finishes the
whole learning process and storing these resulting ... emerging e-learning is reshaping the instructional community
and provides tremendous cost savings for both instructors and learners[1,2,3].
But it lacks in interaction aspect, intelli...
... example in Figure 2. The strokes in Figure 2(a), (b) and (c)
all have the same ‘during d’ relation as defined in Allen’s interval relationship mean-
ing that the duration of stroke a is within the ... been defined by the authors in [6]
with node substitution, merging, splitting, deletion and insertion. On the other hand,
we extend the work in [6] by adding the edge operations def...
... Collaborative e-tutoring in an intercultural e-learning course: A case study. In:
Li, H., Shi, G., Wang, Q., Zhao, Y. (eds.) Research in IT and education: A multi-
disciplinary perspective. Beijing Normal ... design and other learning information resources
accumulating. But the returning is very far from being expected. When we put our
almost infinite enthusiasm on the technology and...