Enhancing Protocol Evaluation Through Semantic Modification of Local Benchmarks
نویسندگان
چکیده
A computer based evaluation is essential to allow us to assess students’ protocols without human intervention in R SAT (Reading Strategy Assessment Tool). Word matching and Latent Semantic Analysis (LSA) approaches were explored for use in the evaluation of protocols and. experimentally it was found that word matching alone outperformed LSA or LSA in combination with word matching. Why does LSA not work well with the R SAT protocol evaluation? This paper demonstrates that modifying the benchmarks on which it is based can indeed benefit its performance. A variety of local benchmark modifications are investigated and results are compared against human expert. The preliminary results show that modified local benchmarks improve the R SAT protocol evaluation on local bridging strategy: 0.1 increase in correlation and 8% increase in percent agreement between original benchmarks and modified benchmarks.
منابع مشابه
AHP Techniques for Trust Evaluation in Semantic Web
The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...
متن کاملAHP Techniques for Trust Evaluation in Semantic Web
The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...
متن کاملUsing Latent Semantic Analysis and Word Matching to Enhance Bridging Reading Strategy Identification
The main goal of this study is to identify bridging reading strategy -a strategy that a reader uses to make a connection from the current sentence to previous sentences to help understanding the meaning of the text. For a specific target sentence, there are two types of bridging: local and distal. Benchmarks were created to help represent each type of bridging. The two immediate prior sentences...
متن کاملAn IPv6 and OLSR based Architecture for Integrating WLANs & MANETs to the Internet
This paper presents the results from a performance evaluation on a Mobile IPv6 based test-bed composed of WLANs (Wireless Local Area Networks), MANETs (Mobile Ad-hoc Networks) and the Internet. Location management and handoff efficiency is measured in terms of session setup delay and handoff delay. The mobiles, connected as a MANET, employ the OLSR (Optimized Link State Routing) protocol for ro...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010