نتایج جستجو برای: learner hidden agenda
تعداد نتایج: 110851 فیلتر نتایج به سال:
Fill-in-the-blank items are commonly featured in computer-assisted language learning (CALL) systems. An item displays a sentence with a blank, and often proposes a number of choices for filling it. These choices should include one correct answer and several plausible distractors. We describe a system that, given an English corpus, automatically generates distractors to produce items for preposi...
In designing intelligent web based educational systems different student needs and preferences should be taken into consideration. Personalization of a system usually results in an increase in its effectiveness, which can be measured by the degree to which learning outcomes are achieved. However, taking into account the individual requirements of each learner and adjusting the system to their n...
BACKGROUND A recent mixed-methods study on the state of emergency medical services (EMS) research in Canada led to the generation of nineteen actionable recommendations. As part of the dissemination plan, a survey was distributed to EMS stakeholders to determine the anticipated impact and feasibility of implementing these recommendations in Canadian systems. METHODS An online survey explored ...
A signi cant source of di culty in language learning is the presumed \incompleteness" of the overt information available to a language learner, termed here an `overt form', when they hear an utterance. The complete structural description assigned to an utterance by linguistic analysis includes representational elements not directly apparent in the overt form, but which play a critical role in l...
In times of heightened uncertainty and unpredictability it is believed that incrementalist approaches that are not resolute to order and control in information security risk management (ISRM) are necessary. This is because information security incidents that occur in context are noted to differ one from another. Incrementalist approaches to ISRM apply when contextual security risk instances are...
Regena Spratling, PhD, RN, CPNP, Rita H. Pickler, PhD, RN, PNP-BC, FAAN, Christina Calamaro, PhD, CRNP, Juanita Conkin Dale, PhD, RN, CPNP-PC, Sharron Docherty, PhD, RN, PNP-BC, FAAN, Catherine J. Goodhue, MN, CPNP, Jill Kilanowski, PhD, RN, APRN, CPNP, FAAN, Ann Marie McCarthy, PhD, RN, FAAN, Mary C. O’Laughlen, PhD, RN, FNP-BC, FAAAAI, Lois S. Sadler, PhD, RN, PNP-BC, FAAN, Leigh Small, PhD, ...
This paper investigates an information-theoretic approach to the problem of collaborative representation learning: how to extract salient features of statistical relationships in order to build cooperatively meaningful representations of some relevant content. Modeling the structure of data and its hidden representations by independently identically distributed samples, our goal is to study fun...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید