期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
学习行为投入评测框架构建与实证研究 被引量:29
1
作者 张琪 武法提 《中国电化教育》 CSSCI 北大核心 2018年第9期102-108,共7页
作为学习者实际表现的主要驱动力量,学习行为投入还未能形成有效的评测体系。该文在对学习行为投入本质探寻的基础上,利用学习者对信息交换活动的适应性调节过程分析学习行为投入的状态,建立周期反馈循环模型,确定了包含持续性(Persiste... 作为学习者实际表现的主要驱动力量,学习行为投入还未能形成有效的评测体系。该文在对学习行为投入本质探寻的基础上,利用学习者对信息交换活动的适应性调节过程分析学习行为投入的状态,建立周期反馈循环模型,确定了包含持续性(Persistence)、反思性(Reflection)、主动性(Initiative)与专注性(Concentration)的"PRIC"评测维度以表征学习行为投入的水平。据此构建了基于教育云平台的学习行为投入评测框架。框架指标的探索性因子分析表明,4个因子积累方差解释率为64.90%,因子载荷在0.625至0.930之间;验证性因子分析表明,各拟合指数良好,标准化路径系数在0.60至0.94之间,建构信度为0.949;主成分回归分析表明,4个因子对学习结果具有36%的解释力。为更准确的构建评价体系,利用层次分析法建立指标权重,"PRIC"各维度的权重分别为0.3263、0.2121、0.2516与0.2100。 展开更多
关键词 学习行为投入 “互联网+”教学 教育云平台 评测框架 实证研究
下载PDF
VTS评测框架与数据处理模型 被引量:1
2
作者 邵方明 刘人杰 陈长英 《大连海事大学学报》 CAS CSCD 北大核心 2001年第1期29-33,共5页
对我国港口船舶交通管理系统提出建设后评测和分析的方案 ,规范并统一评测标准 .建立一套评测体系并构造评测框架 .使用“事故相对减少次数”的概念 ,使得我国港口船舶交通管理系统数据部分的数学模型具有可行性和客观性 .
关键词 船舶交通管理系统 VTS评测框架 数学模型 港口
原文传递
学习行为投入:定义、分析框架与理论模型 被引量:69
3
作者 武法提 张琪 《中国电化教育》 CSSCI 北大核心 2018年第1期35-41,共7页
"关注学习测量"已成为教育技术发展的重要趋势,学习行为投入的研究正日益受到重视。该文旨在围绕学习行为投入理论模型、发生机制和本质特征展开探索。通过对传统教育场景以及学习分析视角的相关文献梳理,比较不同研究视角的... "关注学习测量"已成为教育技术发展的重要趋势,学习行为投入的研究正日益受到重视。该文旨在围绕学习行为投入理论模型、发生机制和本质特征展开探索。通过对传统教育场景以及学习分析视角的相关文献梳理,比较不同研究视角的侧重点以及局限性,构建了"互联网+"混合学习环境中的学习行为投入理论模型。该理论模型包含学习行为序列与信息交换活动之间的引发与重组,信息交换活动与学习行为投入之间的驱动与阻碍两个双向交互阶段,以及一个指向学习绩效的单向过程。基于此,对学习行为投入的本质进行了界定。学习行为投入是学习者借助无缝学习空间,在工具、学习方式与学习任务的调控下,与学习资源、共同体进行信息交换活动的行为表达结果,其本质是基于线上线下双重教育供给的适应性调节学习行为。该理论框架的建立为后续评测与分析工具的设计奠定了基础。 展开更多
关键词 学习行为投入 混合学习环境 定义 评测框架 理论模型
下载PDF
PISA2018全球胜任力评测 被引量:15
4
作者 李杨 曾小平 《外国中小学教育》 CSSCI 北大核心 2018年第5期25-32,共8页
全球胜任力是全球年轻人面对瞬息万变的世界,谋求可持续发展的必备能力。PISA2018将首次对"全球胜任力"进行评测。评测框架对全球胜任力采取了四维度、四基石的多维、立体的定义,并根据所测对象性质不同,采用了认知测试和学... 全球胜任力是全球年轻人面对瞬息万变的世界,谋求可持续发展的必备能力。PISA2018将首次对"全球胜任力"进行评测。评测框架对全球胜任力采取了四维度、四基石的多维、立体的定义,并根据所测对象性质不同,采用了认知测试和学生问卷两种评测方式。对PISA全球胜任力评测进行多角度审视,不仅可以丰富我国的测试理论和实践,还可以对在我国中小学全面开展"全球胜任力"教育提供重要的参考信息。 展开更多
关键词 PISA2018 全球胜任力 评测框架
下载PDF
Web服务资源消耗脆弱性检测技术研究 被引量:1
5
作者 史立敏 王晓茜 +2 位作者 张宏斌 刘心宇 汪旭童 《信息安全研究》 2021年第6期527-534,共8页
当前,针对Web应用层的分布式拒绝服务攻击(distributed denial of service,DDoS)形式愈加严峻,但是对此类DDoS的缓解手段研究较少且技术不够成熟,并且主要聚集于攻击过程中的检测和流量清洗,而缺乏针对Web服务器资源消耗脆弱性的主动检... 当前,针对Web应用层的分布式拒绝服务攻击(distributed denial of service,DDoS)形式愈加严峻,但是对此类DDoS的缓解手段研究较少且技术不够成熟,并且主要聚集于攻击过程中的检测和流量清洗,而缺乏针对Web服务器资源消耗脆弱性的主动检测手段.为此,提出了面向Web服务资源消耗脆弱性的检测模型和评测框架,能够检测Web服务资源消耗脆弱点,并且评测Web服务资源消耗脆弱程度,旨在Web服务受到攻击前预先分析和了解Web服务的资源消耗脆弱性安全问题,为网站安全性能优化和需要采取的防御手段提供支撑.通过对某网站的实际测评验证了本模型和框架的有效性,能够通过对实际应用的网站进行Web服务资源消耗脆弱性检测和评测,发现其Web服务资源消耗脆弱点. 展开更多
关键词 DDOS WEB服务资源 定向分析 脆弱性测试 评测框架
下载PDF
Determinants of international joint venture performance measurement: A theoretical framework
6
作者 Nguyen Huu Le Larimo Jorma 《Journal of Modern Accounting and Auditing》 2010年第11期11-24,共14页
International joint ventures (IJVs) have increasingly their role in business world and also in research field of international business. There have been a lot of studies related to determinant factors of IJV perform... International joint ventures (IJVs) have increasingly their role in business world and also in research field of international business. There have been a lot of studies related to determinant factors of IJV performance. However, there are very few studies focusing on the measurement of I Jr performance. Especially, researchers have ignored how foreign parent firms really choose their measures in the evaluation of their IJV performance. This research investigates determinant factors of performance measures of 1JVs. Determinant factors of IJV performance measures include motives for establishment, establishment mode, location of IJVs, distribution of ownership in IJVs, cultural background of parent firms, and trust between partners, IJV life stages, parent firms' international experience, and relatedness of the IJVs to their parents. Performance measures are divided into financial measures and non-financial measures. The paper shows how different determinant factors are expected to lead foreign parent firms preferring one kind of measure over the other. 展开更多
关键词 international joint ventures performance measurement non-financial measures financial measures
下载PDF
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
7
作者 Jin Li Jinfu Chen +5 位作者 Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang 《China Communications》 SCIE CSCD 2018年第2期190-208,共19页
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity. 展开更多
关键词 software vulnerability detection LOOPHOLES information security evaluationmethod testing framework
下载PDF
An easy-to-use evaluation framework for benchmarking entity recognition and disambiguation systems 被引量:1
8
作者 Hui CHEN Bao-gang WEI +2 位作者 Yi-ming LI Yong-huai LIU Wen-hao ZHU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第2期195-205,共11页
Entity recognition and disambiguation (ERD) is a crucial technique for knowledge base population and information extraction. In recent years, numerous papers have been published on this subject, and various ERD syst... Entity recognition and disambiguation (ERD) is a crucial technique for knowledge base population and information extraction. In recent years, numerous papers have been published on this subject, and various ERD systems have been developed. However, there are still some confusions over the ERD field for a fair and complete comparison of these systems. Therefore, it is of emerging interest to develop a unified evaluation framework. In this paper, we present an easy-to-use evaluation framework (EUEF), which aims at facilitating the evaluation process and giving a fair comparison of ERD systems. EUEF is well designed and released to the public as an open source, and thus could be easily extended with novel ERD systems, datasets, and evaluation metrics. It is easy to discover the advantages and disadvantages of a specific ERD system and its components based on EUEF. We perform a comparison of several popular and publicly available ERD systems by using EUEF, and draw some interesting conclusions after a detailed analysis. 展开更多
关键词 Entity recognition and disambiguation (ERD) Evaluation framework Information extraction
原文传递
Research Framework for Ecosystem Vulnerability:Measurement, Prediction, and Risk Assessment 被引量:2
9
作者 WANG Yajun ZHONG Lifang 《Journal of Resources and Ecology》 CSCD 2020年第5期499-507,共9页
The fragility of ecosystem health has become a key factor hindering the sustainable development of the ecological environment. Through a review of published research from domestic and foreign scholars, starting from t... The fragility of ecosystem health has become a key factor hindering the sustainable development of the ecological environment. Through a review of published research from domestic and foreign scholars, starting from the endogenous logic of studies in the field of ecosystem vulnerability(EV), this paper sorts out the literature on the aspects of measurement models, prediction methods and risk assessment, comprehensively defines the research category and scientific framework of EV, and analyzes the research ideas and development trends. We arrived at the following conclusions: 1) The connotation of ecosystem vulnerability not only embodies the change in the vulnerability of the natural environment, but it also reflects the irreversible damage to the ecosystem caused by excessive development and industrial production activities. 2) The setting of ecosystem vulnerability indices should aim to fully reflect the essential features of that vulnerability, which should include the index systems of natural, social, economic and other related factors. 3) There are many types of ecosystem vulnerability measurement methods, prediction models and risk evaluation models, which have different focuses and advantages. The most appropriate method should be adopted for conducting comprehensive and systematic evaluation, prediction and estimation according to the different representation and evolution mechanisms of the chosen research object and regional ecosystem vulnerability. 4) Based on the regional system characteristics, corresponding risk management measures should be proposed, and pertinent policy suggestions should be put forward to improve the ecological safety and sustainable development of an ecologically vulnerable area. 展开更多
关键词 ecosystem vulnerability measurement PREDICTION risk assessment research framework PROSPECTS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部