Session T3E THE APPLICATION OF KANO'S MODEL FOR IMPROVING WEB-BASED LEARNING PERFORMANCE

合集下载

Sessiontimer协商失败导致呼叫被释放案例分析论文

Sessiontimer协商失败导致呼叫被释放案例分析论文

Session timer协商失败导致呼叫被释放案例分析论文Session timer协商失败导致呼叫被释放案例分析论文摘要:首先介绍了在IMS5.0 SIT测试中碰到的两个因为Session timer 协商失败导致呼叫被释放的案例,然后对比RFC4028的规定分析了问题发生时各个网元的处理是否合规,最后总结介绍RFC4028的规定。

关键词:Session timer;IMS;SIP;终端;ATS在IMS5.0 SIT测试中发现多款终端在使用ATS的HOLD业务时有断话问题,跟踪消息显示是由于ATS的释放,但最终分析确认是终端对session timer的支持存在问题,造成终端和ATS的session timer协商出现问题,导致呼叫被释放。

基于此,对比RFC4028分析了测试中碰到的两个session timer相关问题,并总结RFC4028规范。

1 案例分析1.1 案例一该终端做主叫呼叫其他用户,其他用户有HOLD业务,呼叫接通后用户拍叉保持该终端用户,保持失败呼叫被释放。

对该终端用户来说流程如下所示。

从消息中可看出,在会话建立初期,ATS发送给终端的200响应中携带Session-Expires头域要求开启会话上的session timer,刷新时间为1800秒,refresher为uas(即ATS)如图1所示。

图1 会话建立初期的消息终端被HOLD后ATS要发re-INVITE给终端,在re-INVITE中携带了Session-Expires头域,其值为当前会话的刷新间隔1800秒,同时按照RFC4028,在发起后续刷新请求时尽量保持refresher身份不变,在上次会话中uas作为refresher,即ATS本端完成会话刷新操作。

而在本次会话中ATS成为了uac,所以在re-INVITE消息Session-Expires头域的refresher参数值为uac(还是ATS),如图2所示。

Oracle Argus Safety 8.1 用户指南说明书

Oracle Argus Safety 8.1 用户指南说明书
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.

first part 第一部分second part第二部分third part -回复

first part 第一部分second part第二部分third part -回复

first part 第一部分second part第二部分thirdpart -回复问题[first part 第一部分second part第二部分third part]。

回答第一部分:[first part 第一部分]是什么?第一部分主要是关于介绍问题的背景和基本概念。

在这一部分,我们将回答以下问题:问题的起源是什么?问题的重要性是什么?相关的基本概念是什么?首先,我们需要明确问题的起源。

问题通常源于某种需求或者困扰。

例如,如果问题是关于环境污染的,那么问题的起源可能是人类社会活动导致了大量的污染物释放到环境中。

接下来,我们需要说明问题的重要性。

为什么这个问题值得研究或者关注?这可能是因为问题对人类生活和环境有重要影响,或者因为问题还没有得到解决。

例如,在环境污染问题中,它可能对人类健康和生态系统造成了负面影响,而且我们还没有找到完全解决该问题的方法。

最后,我们需要介绍相关的基本概念。

这些是理解和解决问题所需的关键概念。

在环境污染问题中,基本概念可能包括大气污染、水污染和土壤污染等。

第二部分:[second part第二部分]是什么?第二部分是关于问题的原因和解决方法的讨论。

在这一部分,我们将回答以下问题:问题的原因是什么?问题的解决方法有哪些?每种方法的优缺点是什么?首先,我们将探讨问题的原因。

问题通常不是单一原因造成的,而是多个因素共同作用的结果。

例如,在环境污染问题中,大气污染可能是由工业排放、车辆排放和燃煤等多种原因导致的。

接下来,我们将介绍针对该问题的解决方法。

解决问题可以有多种方式,每种方式都有其优缺点。

例如,在环境污染问题中,我们可以采取技术手段如净化设备来减少污染物排放,也可以通过法规和政策来规范工业生产和交通运输等。

每种方法都有其对环境和经济的影响。

最后,我们将评估每种解决方法的优缺点。

这有助于我们选择最合适的解决方案。

例如,净化设备虽然可以减少污染物排放,但其成本较高;而法规和政策可以起到长期监管的作用,但执行难度较大。

软考高级架构师系统设计40题

软考高级架构师系统设计40题

软考高级架构师系统设计40题1. In a system design, which of the following is the most important consideration for scalability?A. Hardware performanceB. Software architectureC. Network bandwidthD. User interface design答案:B。

解析:软件架构对于系统的可扩展性至关重要。

硬件性能在一定程度上影响,但不是最关键的。

网络带宽主要影响数据传输,对可扩展性的直接影响较小。

用户界面设计与系统的可扩展性关系不大。

2. When designing a system, which principle should be followed to ensure high availability?A. RedundancyB. Minimization of componentsC. Simple architectureD. Low cost答案:A。

解析:冗余是确保高可用性的重要原则。

减少组件可能会降低复杂性,但不一定能保证高可用性。

简单架构有助于理解和维护,但不是保证高可用性的关键。

低成本通常不是高可用性设计的首要考虑因素。

3. Which of the following is a key factor in determining theperformance of a system?A. The number of usersB. The algorithm usedC. The color scheme of the interfaceD. The brand of the hardware答案:B。

解析:算法的优劣直接决定了系统的性能。

用户数量会影响系统负载,但不是决定性能的根本因素。

界面的颜色方案与性能无关。

硬件品牌对性能有一定影响,但算法的影响更为关键。

工程师英语面试题目(3篇)

工程师英语面试题目(3篇)
9. Explain the concept of fluid mechanics and its application in chemical engineering.
10. How would you conduct a risk assessment for a chemical plant?
7. How would you design a scalable system for handling millions of users simultaneously?
8. What is the role of a database in a web application, and what are some common database technologies?
6. How would you conduct a geotechnical investigation for a construction project?
7. Describe the process of designing a water distribution system.
8. What is the significance of structural analysis in civil engineering?
3. Explain the operation of a diode and a transistor.
4. How would you design a power distribution system for a residential area?
5. What is the importance of power factor correction in electrical systems?

微软Volume Licensing 消费化IT指南说明书

微软Volume Licensing 消费化IT指南说明书

B r i e fMICROSOFT LICENSING FOR THE CONSUMERIZATION OF IT May 2012All Volume License ProgramsContents Summary (1)Introduction (1)Key Questions to Ask in Any Scenario (1)Common Scenarios (2)Scenario 1: Bringing a Tablet Device Not Running Windows to Work (2)Scenario 2: Working Remotely (3)Scenario 3: Bring Your Own PC (4)Scenario 4: The Road Warrior (6)Coming Enhancements with Windows 8 (7)Additional Resources (7)SummaryThe purpose of this brief is to guide users on Microsoft Volume Licensing requirements for common scenarios related to their using various personal devices at work. This brief applies to Windows 7 and prior versions. IntroductionWhether you refer to it as the “Consumerization of IT (CoIT)” or “Bring Your Own Device (BYOD),” one thing is certain: The proliferation of personal devices and users expecting that they can use them for work-related purposes presents new opportunities—and new challenges. The anytime, anywhere access to information and people opens up new avenues for user collaboration and productivity. However, this has left many IT departments scrambling to accommodate user expectations and determine how they will support new technologies while maintaining control over their IT data and network. One challenge is ensuring that users and devices are properly licensed. Microsoft licensing is continually evolving to meet this challenge. The keys to determining proper licensing are to ask the right questions and understand the scenario and requirements. The following information will guide you on what questions to ask and some common scenarios to help you determine your licensing needs.Key Questions to Ask in Any ScenarioWhen determining the licensing requirements for a given scenario, consider some key questions about the user, the device, and the location that will inform your decision.User Device LocationCommon ScenariosThe following hypothetical scenarios are designed to illustrate the licensing requirements for five common CoIT scenarios.Scenario 1: Bringing a Tablet Device Not Running Windows to Worksituationkey questionsrequired licensesrecommended approachScenario 2: Working Remotelysituationkey questionsrequired licensesrecommended approach Scenario 3: Bring Your Own PCsituationkey questionsrequired licensesrecommended approachScenario 4: The Road Warriorsituationkey questionsrequired licensesrecommended approachComing Enhancements with Windows 8Windows 8 licensing will offer even more flexibility for addressing the consumerization of IT. For a preview, refer to this Windows Team Blog post.Additional ResourcesFor more information, please refer to the following Microsoft Volume Licensing briefs:∙Licensing Windows 7 for Use in Virtual Environments∙Licensing the Core CAL Suite and Enterprise CAL Suite∙Licensing Windows Server 2008 R2 Remote Desktop Services and Terminal Services∙Licensing Microsoft Desktop Application Software for Use with Windows Server Remote Desktop Services© 2012 Microsoft Corporation. All rights reserved.This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. This information is provided to help guide your authorized use of products you license; it is not your agreement. Your use of products licensed under your volume license agreement is governed by the terms and conditions of that agreement. In the case of any conflict between this information and your agreement, the terms and conditions of your agreement control. Prices for licenses acquired through Microsoft resellers are determined by the reseller.。

point72 academy case study -回复

point72 academy case study -回复Point72 Academy Case Study: Unlocking the Power of Data-Driven Investment StrategiesIntroduction:In this case study, we will dive into the world of Point72 Academy, a prestigious training program that aims to develop top talent for Steven Cohen's investment firm, Point72 Asset Management. We will explore how the program leverages data-driven investment strategies, using real-world examples and industry insights to understand the impact of these strategies on portfolio management and decision-making.Background:Point72 Academy was launched in 2015 with the goal of recruiting and fostering the next generation of investment professionals. The program is highly selective, admitting only a handful of candidates each year from top-tier universities. The curriculum at Point72 Academy focuses on exposing participants to real-world investment scenarios, combining classroom learning with hands-onexperience to develop their skills in analyzing financial markets and making investment decisions.Leveraging Data to Drive Investment Strategies:One of the key pillars of Point72 Academy's curriculum is the use of data-driven investment strategies. With an increasing influx of information and technological advancements, the investment landscape has become more complex. Point72 Academy recognizes the potential of leveraging data to gain a competitive edge in investment decision-making.The program imparts participants with valuable skills in data analysis, allowing them to make sense of vast amounts of structured and unstructured data. By harnessing these skills, participants learn to identify patterns, relationships, and correlations that may not be immediately apparent. This analytical approach helps in generating investment ideas and identifying market inefficiencies that can be exploited for generating alpha.Real-World Application:The application of data-driven investment strategies can be seen in Point72 Academy's approach to portfolio management. Participants at the academy are trained in using quantitative models and algorithms to analyze market trends and identify potential investment opportunities. They learn to develop and backtest trading strategies using historical data, in order to understand the risk-return characteristics of different investment strategies.Moreover, Point72 Academy emphasizes the importance of incorporating alternative data sources into investment analysis. By considering unconventional datasets such as satellite imagery, social media sentiment, and web scraping, participants learn to identify unique insights that can enhance investmentdecision-making. For example, analyzing satellite imagery of parking lots can provide indications of consumer activity and help predict retail sales performance.Risk Management and Compliance:While data-driven investment strategies can provide significant advantages, Point72 Academy recognizes the importance of robustrisk management and compliance processes. Participants are trained in understanding the potential pitfalls associated with data analysis, such as data biases, overfitting, and model risk. They learn to implement risk management frameworks that ensure investment decisions are made within appropriate risk limits, and compliance with legal and regulatory requirements.Industry Insights:The integration of data-driven investment strategies has become increasingly prevalent across the asset management industry. Point72 Academy plays a vital role in equipping its participants with the skills needed to thrive in this evolving landscape.According to a survey by BarclayHedge, over 70 of hedge funds now use alternative data in their investment process. This highlights the growing importance of data-driven strategies in generating alpha. Consequently, demand for investment professionals proficient in data analysis and quantitative modeling is on the rise.Conclusion:Point72 Academy stands at the forefront of investment training programs by successfully incorporating data-driven strategies into their curriculum. Through its rigorous training and emphasis on real-world applicability, the academy equips participants with the necessary skills to build successful careers in the asset management industry.As the investment landscape continues to evolve, data-driven strategies will play a pivotal role in generating alpha and driving investment decisions. Point72 Academy's focus on data analysis, risk management, and compliance ensures that candidates are well-prepared to navigate this ever-changing industry landscape successfully.。

大学体验英语第三册电子教案(第二版)unit3-Session1


Do you know more?




I am really into famous bands. I am on a student budget. I can’t beat that. to watch one’s spending.
I like to follow fashion.
Listen and read
Dialogue Samples
Dialogue 1 The Pros and Cons of famous Brands
Lead-in question Do you know how to describe different attitudes towards buying famous brands?
Lead-in question Do you know how to talk about piracy?
Dialogue Sample Study
Read the second dialogue in pairs and speak out some useful expressions for talking about the piracy.
Task 1 Talking about favorite drinks
Situation: Two students are talking about their favorite drinks, each trying to argue for this/her own preferred brand and against the other’s choice.
Listen and read
Dialogue 2 Why piracy exists?

3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。

WESTLAW CASE NOTEBOOK 快速参考指南 与 LiveNote Stream Man

WESTLAW® CASE NOTEBOOK™QUICK REFERENCE GUIDE LiveNote™ Stream Manager™Installation GuideThis guide provides information on installing LiveNote™ Stream Manager™. For information on using Stream Manager, download the free LiveNote Stream Manager Quick Reference Guide at /law-products/c/LiveNote-Stream-Manager-Quick-Reference-Guide/p/990001263.IntroductionOVERVIEW OF LIVENOTE STREAM MANAGERStream Manager enables you to transmit deposition transcripts live over the Internet, over a local network, or to users who are connected physically to the CAT system. Transmitting a live transcript is referred to as streaming. Stream Manager streams transcripts to LiveNote versions 9 and 10; West Case Notebook, West LiveNote, Westlaw Case Notebook, and Westlaw Case Notebook (Transcripts); and LiveNote Central. West Case Notebook, West LiveNote, Westlaw Case Notebook, and Westlaw Case Notebook (Transcripts) are all referred to in this guide as Case Notebook.LiveNote or Case Notebook can be installed on a computer at the deposition, or off site, or both. Some participants can view the streamed transcript via LiveNote or Case Notebook, and other participants can be off site viewing the streamed testimony via the Internet.Note: You can install Stream Manager on the same computer as the CAT system, but you must start and configure Stream Manager before you start the CAT system.Stream Manager accommodates Local and Global Stream Sessions. A Global session streams over the Internet. A Local session is one that only people on the local network can access, which you can use for privacy or if you are concerned about confidential or proprietary information. You can set up Local Stream Sessions on the fly. Refer to online Help for details. PREREQUISITES FOR CREATING GLOBAL SESSIONS (INTERNET STREAMING)Before installing Stream Manager, you must:∙Have a LiveNote Central account; if you do not have an account, you can send an email to ********************to request one.∙Schedule a session for Stream Manager.For information on scheduling a Stream Manager session, refer to online Help. HARDWARE REQUIREMENTSThe following hardware is recommended for Stream Manager:∙PC with at least an 800 MHz Pentium processor (1 GHz or faster recommended)∙64 MB of RAM minimum (1 GB or more recommended)∙250 MB of available hard disk space (60 GB recommended)∙Screen resolution: 800 x 600 (1024 x 768 recommended)∙Screen colors: 256 (16-bit recommended) For assistance using LiveNote Stream Manager call1-800-290-9378 or email westlaw. softwaresupport@. For free reference materials, visit/westlaw/guides.THOMSONREUTERSWESTLAWThomson Reuters Westlaw comprises industry leading online research, print products, software, tools, and services that help legal professionals perform their work faster and more efficiently, every day.WESTLAW® CASE NOTEBOOK™QUICK REFERENCE GUIDEInstalling LiveNote Stream ManagerIf you are upgrading a previous installation of Stream Manager, your existing license code should beprovided to the installer automatically. If you install Stream Manager on a different computer, you needto type your license code manually. To obtain your license code, complete these steps:1.On the computer where Stream Manager was installed previously, open Stream Manager andlog on to an existing session.2.Click Help, and then click About LiveNote Stream Manager. The About LiveNote StreamManager dialog box is displayed.3.Write down the license code for future reference.4.When you are installing the new version of Stream Manager on the other computer, type thelicense code in the User Information dialog box (step 8 below).To obtain a license code, you can send an email to ****************************************** orcall Customer Technical Support at 1-800-290-9378.To install Stream Manager, complete these steps:Note: If you are upgrading Stream Manager version 1.6.0 or earlier, you must uninstall theapplication manually and restart your computer before installing the current version ofStream Manager.1.From the computer where you want to install Stream Manager, go to/software/stream-manager/default.aspx. TheLiveNote Stream Manager download page is displayed.2.Click the PROCEED WITH DOWNLOAD button. Follow the on-screen instructions to completethe download and installation.3.Once the download finishes, locate the installer and double-click to launch it. The Welcome tothe LiveNote Stream Manager Installation Wizard dialog box is displayed.4.Click Next. The License Agreement dialog box is displayed.5.Click I accept the license agreement, and then click Next. The Readme Information dialog box isdisplayed.6.After reviewing the Readme information, click Next. The User Information dialog box isdisplayed.7.Type your name, organization, and license code in the appropriate boxes, and then select theappropriate installation option (Anyone who uses this computer or Only for m e).Note: If you are upgrading a previous installation of Stream Manager, your license code should beentered automatically. If you are installing Stream Manager on a different computer, typeyour existing license code in the boxes provided.8.Click Nex t. The Destination Folder dialog box is displayed.9.Click Nex t. The Ready to Install the Application dialog box is displayed.10.Click Next to begin the installation. If you are prompted to install additional serial port drivers, clickInstall to proceed. When the installation is complete, a dialog box is displayed indicating thatStream Manager was installed successfully.11.Click Finish.To access Stream Manager, double-click the LiveNote Stream Manager icon ( ) that was created onyour desktop.Published 01/18. L-375732.© 2018 Thomson Reuters. All rights reserved. RM173165.The trademarks used herein are the trademarks of their respective owners.West trademarks are owned by West Publishing Corporation.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Session T3E THE APPLICATION OF KANO'S MODEL FOR IMPROVING WEB-BASED LEARNING PERFORMANCE
Wan-I Lee1, Bih-Yaw Shih2, Liang-Jung Tu 3
Abstract In the past decade, information and network technology had been widely utilized in learning activities. Therefore, many r esearch were conducted on web-based learning. Most of them focused on improving functions of web-based learning platform, including multimedia interface, web-based self-exam, intelligent tutor and etc. Some focused on the learning performance of web-based learning by comparing with traditional classroom. However, rare research focused on improving students’ web learning performance according to their needs, learning behaviors’ records, and personal characteristics. The purpose of the research was to construct the web-based learning environment based on students’ needs and develop suitable teaching strategies for each individual. In the research, the concept of customer relationship management(CRM) was applied to provide a satisfied learning experience. Kano?(1984) evaluation table for classifying the students’ needs into three types (must-be, one-dimensional, and attractive) was first applied to conduct functional or dysfunctional form of questions on students of a Cyber University in southern Taiwan. Then, according to students’ needs, learning behaviors’ records, and personal characteristics, teaching strategy reasoning was utilized to select more suitable materials for each student. Ultimately not only students’ learning efficiency, but also their learning satisfactions were measured. Therefore, more clues were provided to improve the webbased learning environment, and enhance the students’ satisfaction. Index Terms Web-based learning, Kano? model, Learning performance, Students’ need The history of the development of web-based learning could be categorized as four periods[1]: (1) Teaching by mail with text only (2) Teaching by broadcast with voice only (3) Teaching by video without interaction (4) Teaching by web with multimedia Meanwhile, application tools of Internet such as E-mail, ICQ, GroupWare, and etc. are utilized to increase the interaction of web-based learning[8]. Also, the virtual classroom is simulated by the application of web-based evaluation, personal score records and etc.[10]. Currently, research about the virtual classroom are discussed as follows: (1) Web-based learning environment: Related research are discussed in Table I. TABLE I The Compare of Distance Learning Environments Research Discussion Environment Functions Topic Internet Theme- System logon, teaching Exploration manage, digital library, Environments mailbox, forum, Video Conference, assistant center, learning result demo, communication book. Interactive Web-based teaching Virtual assistant, notebook, Classroom teaching material, blackboard, pencil, curriculum syllabus. Enhancing Web-based Feedback, Synchronous handing, voice Q&A, Distance On-time question. Learning Environments, for example PDA Researcher Chi-Syan Lin & Cang-Xuan Shen (2000)
0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA 32 nd ASEE/IEEE Frontiers in Education Conference T3E-27
Session 3E
including course on demand, real time feed back, web-based teaching assistant and etc., are integrated into the web-based learning environment. Meanwhile, the invent of wireless communication and handful electronic appliances such as Palm, PDA, the web-based leaning activities could be performed from any place at any time. (1) Web-based learning strategy: Related research are discussed in Table II. TABLE II The Compare of Distance Teaching and Learning Strategies Research Discussion Content of Strategies Researcher Topic Group LearningAll on line learners are divided Wu-Yuin into several groups, the Hwang, Chialearners must be Chin Li, & Chuncommunicate, solve the Feng Hsiao problems, and finish a project (2001) with their members of group. The teacher on internet classroom is a supervisor. Adult Learning • Cognitive Paradigm: Mei-Ying Chen Strategies cognitive elaboration (2000) theories, discovery method, scaffolding, constructivism, social learning. • Behaviorism: social learning, theory of operant conditioning, mastery learning. • Humanistic Views: student-based center learning, self-managed learning, problem-based learning, cooperative learning, learning community. Learners are Record the detail of Julie Gibson, teachers too communication by teacher Philip Rutherford and learners, then the latter? (1998) learners could preview and learn from it, so that make the learner could be a teacher. Previous research applied traditional learning strategy including constructive methodology, scaffolding theory, as well as web-based interaction and discussion tools to achieve cooperative learning. By the interaction between instructors and classmates, the knowledge of the student could be constructed gradually. (1) Web-based learning performance: Related research are discussed in Table III. TABLE III The Compare of Distance Learning Performance Research Discussion Content Researcher Topic On Line At first the researcher Nian-Shing Learning classify the behaviors of Chen & KanBehavior and web-based learner, and Min Lin (2001) Learning found that the learner Performance take more learning activities positively, the higher learning grades he/she could get. The learning grades is just one part of learning performance evaluation. Students’ Form the on line learner? Hsiu-Ping Evaluation of eyes, 77.9 percentage Yueh (2001) Web-Assisted learners think they Instructions learned more than before, 84 percentage learners will continue learning on line and recommend their friends to join the on line learning systems. The compare of For higher on line Scott A. D., performance learning performance, we William H. C., between should teach learners & David W. distance about computer and (2000) learning and Internet using skills at traditional first, and add more learning choice for on line communications. Previous research included the comparison between webbased and traditional learning as well as the analysis of webbased learning behavior. Most research had a positive attitude on the performance of web-based learning. (1) Related web-based learning research: Related research are discussed in Table IV. In this section, researchers mentioned that not only the learning environment, strategy, and performance, but also the evaluation, satisfaction and students’ needs should be focused. According to the literature review, the interaction, graphic user interface(GUI), and variety of materials of webbased learning had been enhanced by the dramatically development of information technology. However, rare of them focused on the analysis of students’ needs to segment
相关文档
最新文档