Finding Traces of High and Low Achievers by Analyzing Undergraduates' E-book Logs
نویسندگان
چکیده
We investigated the learning behavior of undergraduates with e-book logs. E-book logs from 99 undergraduates taking an information science course were collected. First, we analyzed differences between nine high-achieving students and three low-achieving students. A log recorded before a class session in which the same e-book was used as a textbook was considered a preview log, and one recorded after a class session was considered a review log. The analysis of preview frequency indicates that the low achievers did not perform the previews, but many high achievers frequently did. The review frequency demonstrates that regardless of high and low achievements, students performed reviews. We added the logs of six relatively low achievers and analyzed more details of the preview logs of high and low achievers. The number of page flips and durations of preview logs revealed that relatively low achievers tried to perform previews, but they gave the endeavor up easily.
منابع مشابه
Comparing Learners’ Writing Self Beliefs: High Achievers versus Low Achievers
The purpose of the present study was to compare writing high achievers and low achievers TEFL (teaching English as foreign language) learners’ writing self-beliefs. Subjects, based on their officially recorded scores on the writing course, were assigned in two 22-member groups of high and low achievers. The adapted English version of Mills’ and Péron’s (2008) questionnaire and the Foreign Langu...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کاملEvaluation of Reservoir Properties Using Wireline Logs of Well Sarai-Sidhu-1, Punjab Platform, Central Indus Basin, Pakistan
The well Sarai Sidhu-01 is located on Punjab Platform, Central Indus Basin, Pakistan. Punjab Platform is the eastern part of Central Indus Basin, and tectonically it is the stable portion of Indus Basin, which was least affected during Tertiary Himalayan orogeny. This study attempts to decipher reservoir potential for hydrocarbon exploration. It aims to delineate a subsurface hydrocarbon bearin...
متن کاملNon-cognitive characteristics predicting academic success among medical students in Sri Lanka
BACKGROUND To identify non-cognitive and socio-demographic characteristics determining academic success of Sri Lankan medical undergraduates. METHODS A retrospective study among 90 recently graduated students of the Faculty of Medical Sciences, University of Sri Jayewardenepura, Sri Lanka. Students were stratified into two equal groups; 'High-achievers' (honours degree at the final MBBS exami...
متن کامل