نتایج جستجو برای: learner hidden agenda

تعداد نتایج: 110851  

2016
John Lee Donald Sturgeon Mengqi Luo

Fill-in-the-blank items are commonly featured in computer-assisted language learning (CALL) systems. An item displays a sentence with a blank, and often proposes a number of choices for filling it. These choices should include one correct answer and several plausible distractors. We describe a system that, given an English corpus, automatically generates distractors to produce items for preposi...

Journal: :IJOCI 2012
Danuta Zakrzewska

In designing intelligent web based educational systems different student needs and preferences should be taken into consideration. Personalization of a system usually results in an increase in its effectiveness, which can be measured by the degree to which learning outcomes are achieved. However, taking into account the individual requirements of each learner and adjusting the system to their n...

Journal: :CJEM 2015
J L Jensen I E Blanchard B L Bigham Aje Carter R Brown D Socha L H Brown A H Travers A M Craig L J Morrison

BACKGROUND A recent mixed-methods study on the state of emergency medical services (EMS) research in Canada led to the generation of nineteen actionable recommendations. As part of the dissemination plan, a survey was distributed to EMS stakeholders to determine the anticipated impact and feasibility of implementing these recommendations in Canadian systems. METHODS An online survey explored ...

1997
Bruce B. Tesar

A signi cant source of di culty in language learning is the presumed \incompleteness" of the overt information available to a language learner, termed here an `overt form', when they hear an utterance. The complete structural description assigned to an utterance by linguistic analysis includes representational elements not directly apparent in the overt form, but which play a critical role in l...

2009
Kennedy Njenga Irwin Brown

In times of heightened uncertainty and unpredictability it is believed that incrementalist approaches that are not resolute to order and control in information security risk management (ISRM) are necessary. This is because information security incidents that occur in context are noted to differ one from another. Incrementalist approaches to ISRM apply when contextual security risk instances are...

Journal: :Journal of pediatric health care : official publication of National Association of Pediatric Nurse Associates & Practitioners 2014
Regena Spratling Rita H Pickler Christina Calamaro Juanita Conkin Dale Sharron Docherty Catherine J Goodhue Jill Kilanowski Ann Marie McCarthy Mary C O'Laughlen Lois S Sadler Leigh Small Kathleen Speer Tami Thomas Susan Van Cleve Jennifer D'Auria Dolores C Jones

Regena Spratling, PhD, RN, CPNP, Rita H. Pickler, PhD, RN, PNP-BC, FAAN, Christina Calamaro, PhD, CRNP, Juanita Conkin Dale, PhD, RN, CPNP-PC, Sharron Docherty, PhD, RN, PNP-BC, FAAN, Catherine J. Goodhue, MN, CPNP, Jill Kilanowski, PhD, RN, APRN, CPNP, FAAN, Ann Marie McCarthy, PhD, RN, FAAN, Mary C. O’Laughlen, PhD, RN, FNP-BC, FAAAAI, Lois S. Sadler, PhD, RN, PNP-BC, FAAN, Leigh Small, PhD, ...

Journal: :Procedia - Social and Behavioral Sciences 2016

Journal: :CoRR 2016
Matías Vera Leonardo Rey Vega Pablo Piantanida

This paper investigates an information-theoretic approach to the problem of collaborative representation learning: how to extract salient features of statistical relationships in order to build cooperatively meaningful representations of some relevant content. Modeling the structure of data and its hidden representations by independently identically distributed samples, our goal is to study fun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید