12,649 results
Search Results
2. Late Departures from Paper-Based to Supported Networked Learning in South Africa: Lessons Learned
- Author
-
Kok, Illasha, Beter, Petra, and Esterhuizen, Hennie
- Abstract
Fragmented connectivity in South Africa is the dominant barrier for digitising initiatives. New insights surfaced when a university-based nursing programme introduced tablets within a supportive network learning environment. A qualitative, explorative design investigated adult nurses' experiences of the realities when moving from paper-based learning towards using tablets within a blended learning environment. Purposive sampling was applied. 45 (N) participants were included, each receiving a preloaded tablet (15 running on iOS, 15 on Android 4.2.2 Jelly Bean and 15 on Windows® 8 operating systems), being WiFi-dependent, integrated into a supportive learning network. Participants completed eleven compulsory Internet-based activities. Three reflective focus groups with 18 (n) participants concluded the project. Through self-empowerment and supportive environment, students adopted seamlessly, overcame network and resource-related challenges. Valuable lessons were learned within the digital divide, integrate tablets into distance learning from a resilient and pragmatic approach.
- Published
- 2018
- Full Text
- View/download PDF
3. Blockchain Applications in Higher Education Based on the NIST Cybersecurity Framework
- Author
-
Brady D. Lund
- Abstract
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within the education sector.
- Published
- 2024
4. Preparing Students for the Data-Driven Life Science Era through a Real-World Viral Infection Case
- Author
-
Laukens, Kris, Eyckmans, Marleen, De Neuter, Nicolas, Naulaerts, Stefan, Meysman, Pieter, and Van Ostade, Xaveer
- Abstract
While computational biology and bioinformatics became an inherent part of most life science degrees, it remains challenging to encourage students to employ these diverse skills in a practical research context. In this education paper, we present a method to enable students to acquire hands-on skills by the data-driven study of complex biomolecular datasets. The course starts with a series of introductory lectures, including a practical session on Cytoscape and associated computational network biology techniques. As we believe that enabling students to work on their own research questions will increase their motivation and interest, we introduced a recent hallmark virus-host protein-protein interaction article from which the database served as a starting point for the students to develop their research goal, which was presented and discussed in a first informal meeting. Over the next two months, about four interactive sessions were held, where students presented their problems, progress and challenges and exchanged ideas to help each other reach their goals. The role of the lecturers was to assist the students with independently collecting data and exploring new software tools for their research question. We present this concept and methods, and we share our experiences from an evaluation of the student learning outcomes.
- Published
- 2021
- Full Text
- View/download PDF
5. Network Utility Maximization by Updating Individual Transmission Rates
- Author
-
Pasechnyuk, Dmitry, Raigorodskii, Andrei M., Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Olenev, Nicholas N., editor, Evtushenko, Yuri G., editor, Jaćimović, Milojica, editor, Khachay, Michael, editor, and Malkova, Vlasta, editor
- Published
- 2021
- Full Text
- View/download PDF
6. Method of Encoding Structured Messages by Using State Vectors
- Author
-
Andrushchenko, Roman, Zaitsev, Sergei, Druzhynin, Oleksandr, Shelest, Mykhaylo, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Palagin, Alexander, editor, Anisimov, Anatoliy, editor, Morozov, Anatoliy, editor, and Shkarlet, Serhiy, editor
- Published
- 2020
- Full Text
- View/download PDF
7. Analysis and Optimization of the Resilience Enhancement Circle via Data Farming
- Author
-
Dally, Mario, Jahnen, Sebastian, Moll, Maximilian, Pickl, Stefan, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Mazal, Jan, editor, Fagiolini, Adriano, editor, and Vasik, Petr, editor
- Published
- 2020
- Full Text
- View/download PDF
8. Autonomous Agents and Multiagent Systems. Best and Visionary Papers : AAMAS 2023 Workshops, London, UK, May 29 –June 2, 2023, Revised Selected Papers
- Author
-
Francesco Amigoni, Arunesh Sinha, Francesco Amigoni, and Arunesh Sinha
- Subjects
- Artificial intelligence, Computer engineering, Computer networks, Software engineering, Social sciences—Data processing, Numerical analysis
- Abstract
This book contains visionary and best papers from the workshops held at the International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023, held in London, UK, during May 29–June 2, 2023.The 12 regular papers, 5 best papers and 7 visionary papers, presented were carefully reviewed and selected from a total of more than 110 contributions to the workshops. They focus on emerging topics and new trends in the area of autonomous agents and multiagent systems and stem from the following workshops:- Workshop on Autonomous Robots and Multirobot Systems (ARMS)- Workshop on Adaptive and Learning Agents (ALA)- Workshop on Interdisciplinary Design of Emotion Sensitive Agents (IDEA)- Workshop on Rebellion and Disobedience in Artificial Intelligence (RaD-AI)- Workshop on Neuro-symbolic AI for Agent and Multi-Agent Systems (NeSyMAS)- Workshop on Multiagent Sequential Decision Making under Uncertainty (MSDM)- Workshop on Citizen-Centric Multi-Agent Systems (C-MAS)
- Published
- 2024
9. Statistical Atlases and Computational Models of the Heart. Regular and CMRxRecon Challenge Papers : 14th International Workshop, STACOM 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 12, 2023, Revised Selected Papers
- Author
-
Oscar Camara, Esther Puyol-Antón, Maxime Sermesant, Avan Suinesiaputra, Qian Tao, Chengyan Wang, Alistair Young, Oscar Camara, Esther Puyol-Antón, Maxime Sermesant, Avan Suinesiaputra, Qian Tao, Chengyan Wang, and Alistair Young
- Subjects
- Computer vision, Computer science—Mathematics, Mathematical statistics, Machine learning, Computer engineering, Computer networks, Social sciences—Data processing
- Abstract
This book constitutes the proceedings of the 14th International Workshop on Statistical Atlases and Computational Models of the Heart, STACOM 2023, as well as the Cardiac MRI Reconstruction Challenge, CMRxRecon Challenge. There was a total of 53 submissions to the workshop. The 24 regular workshop papers included in this volume were carefully reviewed and selected from 29 paper submissions. They deal with cardiac segmentation, modelling, strain quantification, registration, statistical shape analysis, and quality control. In addition, 21 papers from the CMRxRecon challenge are included in this volume. They focus on fast CMR image reconstruction and provide a benchmark dataset that enables the broader research community to promote advances in this area of research.
- Published
- 2024
10. Statistical Atlases and Computational Models of the Heart. Regular and CMRxMotion Challenge Papers : 13th International Workshop, STACOM 2022, Held in Conjunction with MICCAI 2022, Singapore, September 18, 2022, Revised Selected Papers
- Author
-
Oscar Camara, Esther Puyol-Antón, Chen Qin, Maxime Sermesant, Avan Suinesiaputra, Shuo Wang, Alistair Young, Oscar Camara, Esther Puyol-Antón, Chen Qin, Maxime Sermesant, Avan Suinesiaputra, Shuo Wang, and Alistair Young
- Subjects
- Computer vision, Computer science—Mathematics, Mathematical statistics, Machine learning, Computer engineering, Computer networks, Social sciences—Data processing
- Abstract
This book constitutes the proceedings of the 13th International Workshop on Statistical Atlases and Computational Models of the Heart, STACOM 2022, held in conjunction with the 25th MICCAI conference. The 34 regular workshop papers included in this volume were carefully reviewed and selected after being revised and deal with topics such as: common cardiac segmentation and modelling problems to more advanced generative modelling for ageing hearts, learning cardiac motion using biomechanical networks, physics-informed neural networks for left atrial appendage occlusion, biventricular mechanics for Tetralogy of Fallot, ventricular arrhythmia prediction by using graph convolutional network, and deeper analysis of racial and sex biases from machine learning-based cardiac segmentation. In addition, 14 papers from the CMRxMotion challenge are included in the proceedings which aim to assess the effects of respiratory motion on cardiac MRI (CMR) imaging quality and examine the robustness of segmentation models in face of respiratory motion artefacts. A total of 48 submissions to the workshop was received.
- Published
- 2023
11. Virtualization in Education: Portable Network Laboratory
- Author
-
Barrionuevo, Mercedes, Gil, Cristian, Giribaldi, Matias, Suarez, Christopher, Taffernaberry, Carlos, Barbosa, Simone Diniz Junqueira, Series editor, Chen, Phoebe, Series editor, Filipe, Joaquim, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Yuan, Junsong, Series editor, Zhou, Lizhu, Series editor, and De Giusti, Armando Eduardo, editor
- Published
- 2018
- Full Text
- View/download PDF
12. Autonomous Agents and Multiagent Systems. Best and Visionary Papers : AAMAS 2022 Workshops, Virtual Event, May 9–13, 2022, Revised Selected Papers
- Author
-
Francisco S. Melo, Fei Fang, Francisco S. Melo, and Fei Fang
- Subjects
- Artificial intelligence, Computer engineering, Computer networks, Software engineering, Social sciences—Data processing, Numerical analysis
- Abstract
This book constitutes thoroughly refereed and revised selected best and visionary papers from the Workshops held at the International Conference on Autonomous Agents and Multiagent Systems AAMAS 2022, which took place online, during May 9–13, 2022.The 5 best papers and 4 visionary papers included in this book stem from the following workshops: - 13th Workshop on Optimization and Learning in Multi-agent Systems (OptLearnMAS);- 23rd Workshop on Multi-Agent Based Simulation (MABS);- 6th Workshop on Agent-Based Modelling of Urban Systems (ABMUS);- 10th Workshop on Engineering Multi-Agent Systems (EMAS);- 1st Workshop on Rebellion and Disobedience in AI (RaD-AI).There was a total of 59 submissions to these workshops.
- Published
- 2022
13. IAC-21-E-9 (Paper ID: 67116) Information sharing for the mitigation of outer space–related cybersecurity threats.
- Author
-
Housen-Couriel, Deborah
- Subjects
- *
HAZARD mitigation , *COMPUTER networks , *INFORMATION sharing , *SPACE law , *OUTER space , *INTERNET security , *CYBERSPACE - Abstract
There is a growing realization on the part of lawmakers, policy experts and practitioners that cyber risks and threat vectors constitute a critical and strategic challenge for all outer space operations. Stakeholders' professional attention and resources are beginning to focus on measures for mitigating these risks and threats. Space-based activities depend on the reliable functionality of computer systems and the wireless communications connecting them through use of the electromagnetic spectrum resource – all of which constitute parts of the infrastructure of cyberspace both on Earth and in space. Thus, cyber risks and vulnerabilities arise in all aspects of outer space operations: satellite launches and their orbital telemetry, tracking, and control (TTC); operational communications (space-to-space, earth-to-space and space-to-earth); and other spectrum-dependent space transmissions. Additional cyber vulnerabilities are present in the terrestrial systems supporting space operations, including launch systems and supply chains for dedicated equipment and services. The mitigation of such cyber threats and vulnerabilities in the more traditional terrestrial context is a rapidly developing area of law and policy aiming to counter the activities of malicious cyber actors whether they are criminals, States or hostile ideological groups. On the one hand, the threat mitigation aspects of cybersecurity have by no means been resolved, as hostile actors use increasingly sophisticated means to achieve their ends. On the other, progress has been made with respect to measures and best practices recognized as critical to boosting cybersecurity for space activities. This article focuses on one of these: information sharing (IS) among trusted participants in a secure platform designed for sharing actionable cybersecurity data. The primary goal of such sharing is to reduce the informational asymmetry between the attacker and the target, whether the latter is a State, private company, or other entity. Cyber attackers leverage their knowledge of the target's vulnerabilities, and only need to be right on one occasion to cause operational, financial, and/or reputational damage that may impair the long-term functionality of the targeted entity. Yet when a group of potential targets can reliably share data on cyber risks and measures to counter them, the informational asymmetry is reduced, and cybersecurity improved. Several conditions exist for optimizing IS which provides actionable information, and for ensuring that trust is developed and maintained among IS participants. Finally, in the context of outer space-related cybersecurity threats, the paper argues that IS proves critical because of two elements: the aggravated asymmetry of cyber threat vectors in outer space, and their distinctive space-related characteristics. • There is a growing realization that cyber risks and threat vectors constitute a critical and strategic challenge for all outer space operations. • Stakeholders' professional attention and resources are focusing on measures for mitigating these risks and threats. • Space-based activities depend on the reliability of computer systems and their wireless connection, – which constitute the infrastructure of cyberspaceon Earth and in space. • Cyber risks and vulnerabilities arise in all aspects of outer space operations, andadditional. • Cyber vulnerabilities are present in the terrestrial systems supporting them. • Several conditions exist for optimizing IS which is actionable, and for ensuring that trust is maintained among IS participants. • Several conditions exist for optimizing IS which is actionable, and for ensuring that trust is maintained among IS participants. • Information sharing for outer space cybersecurity is critical because of the aggravated asymmetry of cyber threat vectors in space and their distinctive space-related characteristics. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. HCI International 2022 – Late Breaking Papers: Ergonomics and Product Design : 24th International Conference on Human-Computer Interaction, HCII 2022, Virtual Event, June 26–July 1, 2022, Proceedings
- Author
-
Vincent G. Duffy, Pei-Luen Patrick Rau, Vincent G. Duffy, and Pei-Luen Patrick Rau
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Computer engineering, Computer networks, Information storage and retrieval systems, Artificial intelligence
- Abstract
Volume LNCS 13522 is part of the refereed proceedings of the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually during June 26 to July 1, 2022.A total of 5583 individuals from academia, research institutes, industry, and governmental agencies from 88 countries submitted contributions, and 1276 papers and 275 posters were included in the proceedings that were published just before the start of the conference. Additionally, 296 papers and 181 posters are included in the volumes of the proceedings published after the conference, as “Late Breaking Work” (papers and posters). The contributions thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
- Published
- 2022
15. HCI International 2022 – Late Breaking Papers: HCI for Today's Community and Economy : 24th International Conference on Human-Computer Interaction, HCII 2022, Virtual Event, June 26–July 1, 2022, Proceedings
- Author
-
Matthias Rauterberg, Fiona Fui-Hoon Nah, Keng Siau, Heidi Krömker, June Wei, Gavriel Salvendy, Matthias Rauterberg, Fiona Fui-Hoon Nah, Keng Siau, Heidi Krömker, June Wei, and Gavriel Salvendy
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Software engineering, Artificial intelligence, Computer networks
- Abstract
This proceedings LNCS 13516 constitutes the refereed proceedings of the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually as part of the 24th International Conference, HCII 2022, during June 26 to July 1, 2022. HCII 2022 received a total of 5583 submissions from academia, research institutes, industry, and governmental agencies from 88 countries submitted contributions, and 1276 papers and 275 posters were included in the proceedings that were published just before the start of the conference. Additionally, 296 papers and 181 posters are included in the volumes of the proceedings published after the conference, as “Late Breaking Work” (papers and posters). The contributions thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
- Published
- 2022
16. HCI International 2022 – Late Breaking Papers: HCI for Health, Well-being, Universal Access and Healthy Aging : 24th International Conference on Human-Computer Interaction, HCII 2022, Virtual Event, June 26 – July 1, 2022, Proceedings
- Author
-
Vincent G. Duffy, Qin Gao, Jia Zhou, Margherita Antona, Constantine Stephanidis, Vincent G. Duffy, Qin Gao, Jia Zhou, Margherita Antona, and Constantine Stephanidis
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Artificial intelligence, Application software, Computers, Special purpose, Computer networks, Electronic commerce
- Abstract
This proceedings LNCS 13521 constitutes the refereed proceedings of the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually as part of the 24th International Conference, HCII 2022, in June 26 to July 1, 2022. HCII 2022 received a total of 5583 submissions from academia, research institutes, industry, and governmental agencies from 88 countries submitted contributions, and 1276 papers and 275 posters were included in the proceedings that were published just before the start of the conference. Additionally, 296 papers and 181 posters are included in the volumes of the proceedings published after the conference, as “Late Breaking Work” (papers and posters). The contributions thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
- Published
- 2022
17. BP Neural Network-Enhanced System for Employment and Mental Health Support for College Students
- Author
-
Zhengrong Deng, Hong Xiang, Weijun Tang, Hanlie Cheng, and Qiang Qin
- Abstract
This paper employs BP Neural Network (BPNN) theory to evaluate innovation and entrepreneurship education in universities. It utilizes students' evaluation indexes as input vectors and determines the number of hidden layer neurons. Experimental results serve as output vectors. The BPNN method proves reasonable and feasible for vocational education course evaluation, exhibiting a 14.96% higher accuracy than traditional genetic algorithms. The paper discusses the model, configuration, characteristics, training process, algorithm enhancement, and limitations of neural networks, followed by an introduction to genetic algorithms. Through analysis of principles, basic operations, and common operators, it establishes a theoretical foundation for subsequent discussions.
- Published
- 2024
- Full Text
- View/download PDF
18. Augmented Reality for Inclusive Growth in Education: The Challenges
- Author
-
Kezia Herman Mkwizu and Ritimoni Bordoloi
- Abstract
Purpose: Inclusive growth in the education sector is still a major challenge in some countries because of limited access to technologies and internet connectivity, among other reasons. However, as a technology, augmented reality (AR) is expected to be widely used in the field of education in the future. The main purpose of this paper is to explore the use of AR for inclusive growth in education as well as identify the challenges, particularly in countries like India and Tanzania. Design/methodology/approach: This paper applies a systematic literature review by analysing and synthesising relevant documents, mainly journal articles, books and conference papers. Descriptive statistics and cross-tabulation were used for the analysis. Content analysis was used to evaluate the contents of the reviewed literature. Findings: For the use of AR, it is important to have adequate digital infrastructure, access to universal internet or broadband facilities and the digital empowerment of citizens. Major challenges to inclusive growth in education include the lack of trained teacher educators and students' preference for practical or project-based curriculum. Practical implications: Practitioners in both countries may consider the use of AR for inclusive growth in education. Originality/value: This paper specifically examines the use of AR in higher education and the related challenges based on a review of two countries, namely India and Tanzania.
- Published
- 2024
- Full Text
- View/download PDF
19. Evaluating the Effectiveness of Blended Learning in Learning Business Courses in Low-Income Economies
- Author
-
Musa Nyathi
- Abstract
Purpose: This paper evaluated the effectiveness of blended learning of business courses in higher learning institutions (HEIs) in developing economies. Design/methodology/approach: A survey, involving 215 learners, was used to collect data. A stratified sampling technique was used in this study. The data were analyzed using the PROCESS macro in SPSS. Findings: In the blended learning approach, student attitudes, social presence, IT infrastructure and flexible learning are all favorable predictors of learner satisfaction. The impact of blended learning on learner satisfaction is further mediated by IT infrastructure, social presence and learner attitude. Practical implications: HEIs need to invest in planning and resource mobilization in order to realize several benefits derived from the use of blended learning. For optimal learning outcomes, this should be combined with training on IT infrastructure usage for both facilitators and learners. In order to assist learners in developing competencies through consistent use, institutions should also invest in tailored blended learning technologies. In addition, emphasis should be placed on training all actors in order to better manage change. Originality/value: This paper presents and ranks several dimensions for blended learning success in low-budget universities. In addition, the study contributes to the understanding of intervening variables necessary for enhancing the potential of pedagogy in maximizing learner satisfaction.
- Published
- 2024
- Full Text
- View/download PDF
20. On Hyper-local Web Pages
- Author
-
Namiot, D., Sneps-Sneppe, M., Filipe, Joaquim, Editorial Board Member, Barbosa, Simone Diniz Junqueira, Editorial Board Member, Chen, Phoebe, Editorial Board Member, Du, Xiaoyong, Editorial Board Member, Kara, Orhun, Editorial Board Member, Liu, Ting, Editorial Board Member, Sivalingam, Krishna M., Editorial Board Member, Washio, Takashi, Editorial Board Member, Vishnevsky, Vladimir, editor, and Kozyrev, Dmitry, editor
- Published
- 2016
- Full Text
- View/download PDF
21. HCI International 2021 - Late Breaking Papers: Design and User Experience : 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings
- Author
-
Constantine Stephanidis, Marcelo M. Soares, Elizabeth Rosenzweig, Aaron Marcus, Sakae Yamamoto, Hirohiko Mori, Pei-Luen Patrick Rau, Gabriele Meiselwitz, Xiaowen Fang, Abbas Moallem, Constantine Stephanidis, Marcelo M. Soares, Elizabeth Rosenzweig, Aaron Marcus, Sakae Yamamoto, Hirohiko Mori, Pei-Luen Patrick Rau, Gabriele Meiselwitz, Xiaowen Fang, and Abbas Moallem
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Electronic commerce, Software engineering, Image processing—Digital techniques, Computer vision, Data mining, Computer engineering, Computer networks
- Abstract
This book constitutes late breaking papers from the 23rd International Conference on Human-Computer Interaction, HCII 2021, which was held in July 2021. The conference was planned to take place in Washington DC, USA but had to change to a virtual conference mode due to the COVID-19 pandemic. A total of 5222 individuals from academia, research institutes, industry, and governmental agencies from 81 countries submitted contributions, and 1276 papers and 241 posters were included in the volumes of the proceedings that were published before the start of the conference. Additionally, 174 papers and 146 posters are included in the volumes of the proceedings published after the conference, as “Late Breaking Work” (papers and posters). The contributions thoroughly cover the entire field of HCI, addressing major advances in knowledge and effective use of computers in a variety of application areas.
- Published
- 2021
22. Cloud-Supported Preservation of Digital Papers: A Solution for Special Collections?
- Author
-
Weisbrod, Dirk
- Subjects
- *
PRESERVATION of paper , *DIGITAL preservation , *CLOUD storage , *DIGITAL communications , *COMPUTER networks , *CLOUD computing , *PERSONAL archives - Abstract
Computers and other digital communication media have replaced paper and pencil from the writer's desk. This development has confronted special collections with a problem, as digital papers are difficult to process using established digital preservation strategies, because of their individual and unique nature. According to the proposal suggested in this paper, the creators should instead be involved in the preservation process, and special collections should integrate pre-custodial forms of curation within their range of tasks. The article outlines the use of a cloud architecture as a suitable instrument for accomplishing this task. The benefits and the prospects for such a collection cloud are exposed and discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
23. An Assessment of the Integration of ICTs into Teaching Processes by Science Teachers: The Case of Albania
- Author
-
Eliana Ibrahimi, Fundime Miri, and Inva Koçiaj
- Abstract
Many studies have recently focused on the importance of the effective integration of Information and Communication Technology (ICT) tools in science education and the need for science teachers to receive adequate training and support to use them effectively. This paper aims to explore the Albanian science teachers' perceptions and use of ICTs in teaching processes. The study provides an interpretative analysis of the opinions of science teachers teaching in the middle and high schools of several Albanian regions expressed in an online survey. Overall, the results suggest that the use of ICT by science teachers in Albania is limited by a lack of proper infrastructure, limited access to technology, and training of teachers on integrating technology. However, there are indications that the adoption of ICT in science education may increase in the future, particularly after the boost from the COVID-19 pandemic emergency.
- Published
- 2024
24. Determination of Operating Parameters and Performance Analysis of Computer Networks with Paraconsistent Annotated Evidential Logic Eτ
- Author
-
Pimenta Junior, Avelino Palma, Abe, Jair Minoro, Silva, Genivaldo Carlos, Rannenberg, Kai, Editor-in-chief, Sakarovitch, Jacques, Series editor, Goedicke, Michael, Series editor, Tatnall, Arthur, Series editor, Neuhold, Erich J., Series editor, Pras, Aiko, Series editor, Tröltzsch, Fredi, Series editor, Pries-Heje, Jan, Series editor, Whitehouse, Diane, Series editor, Reis, Ricardo, Series editor, Furnell, Steven, Series editor, Furbach, Ulrich, Series editor, Winckler, Marco, Series editor, Rauterberg, Matthias, Series editor, Nääs, Irenilza, editor, Vendrametto, Oduvaldo, editor, Mendes Reis, João, editor, Gonçalves, Rodrigo Franco, editor, Silva, Márcia Terra, editor, von Cieminski, Gregor, editor, and Kiritsis, Dimitris, editor
- Published
- 2016
- Full Text
- View/download PDF
25. HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies : 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings
- Author
-
Constantine Stephanidis, Aaron Marcus, Elizabeth Rosenzweig, Pei-Luen Patrick Rau, Abbas Moallem, Matthias Rauterberg, Constantine Stephanidis, Aaron Marcus, Elizabeth Rosenzweig, Pei-Luen Patrick Rau, Abbas Moallem, and Matthias Rauterberg
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Computer engineering, Computer networks, Social sciences—Data processing, Education—Data processing, Data protection, Artificial intelligence
- Abstract
This book constitutes late breaking papers from the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020. The conference was planned to take place in Copenhagen, Denmark, but had to change to a virtual conference mode due to the COVID-19 pandemic.From a total of 6326 submissions, a total of 1439 papers and 238 posters have been accepted for publication in the HCII 2020 proceedings before the conference took place. In addition, a total of 333 papers and 144 posters are included in the volumes of the proceedings published after the conference as “Late Breaking Work” (papers and posters). These contributions address the latest research and development efforts in the field and highlight the human aspects of design and use of computing systems. The 54 late breaking papers presented in this volume were organized in two topical sections named: User Experience Design and Evaluation Methods and Tools; Design Case Studies; User Experience Case Studies.
- Published
- 2020
26. HCI International 2020 – Late Breaking Papers: Virtual and Augmented Reality : 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings
- Author
-
Constantine Stephanidis, Jessie Y. C. Chen, Gino Fragomeni, Constantine Stephanidis, Jessie Y. C. Chen, and Gino Fragomeni
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Computer vision, Robotics, Computer networks, Computers, Special purpose
- Abstract
This book constitutes late breaking papers from the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020. The conference was planned to take place in Copenhagen, Denmark, but had to change to a virtual conference mode due to the COVID-19 pandemic.From a total of 6326 submissions, a total of 1439 papers and 238 posters have been accepted for publication in the HCII 2020 proceedings before the conference took place. In addition, a total of 333 papers and 144 posters are included in the volumes of the proceedings published after the conference as “Late Breaking Work” (papers and posters). These contributions address the latest research and development efforts in the field and highlight the human aspects of design and use of computing systems. The 34 late breaking papers presented in this volume were organized in two topical sections named: Virtual, Augmented and Mixed Reality Design and Implementation; and User Experience in Virtual, Augmented and Mixed Reality.
- Published
- 2020
27. HCI International 2020 - Late Breaking Papers: Multimodality and Intelligence : 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings
- Author
-
Constantine Stephanidis, Masaaki Kurosu, Helmut Degen, Lauren Reinerman-Jones, Constantine Stephanidis, Masaaki Kurosu, Helmut Degen, and Lauren Reinerman-Jones
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Computer networks, Application software, Computer vision, Computers, Special purpose
- Abstract
This book constitutes late breaking papers from the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020. The conference was planned to take place in Copenhagen, Denmark, but had to change to a virtual conference mode due to the COVID-19 pandemic.From a total of 6326 submissions, a total of 1439 papers and 238 posters have been accepted for publication in the HCII 2020 proceedings before the conference took place. In addition, a total of 333 papers and 144 posters are included in the volumes of the proceedings published after the conference as “Late Breaking Work” (papers and posters). These contributions address the latest research and development efforts in the field and highlight the human aspects of design and use of computing systems.
- Published
- 2020
28. MONET – Monash University’s Campus LAN in the 1980s – A Bridge to Better Networking
- Author
-
Ainsworth, Barbara, Clarke, Neil, Avram, Chris, Sheard, Judy, Rannenberg, Kai, Editor-in-chief, Sakarovitch, Jacques, Series editor, Goedicke, Michael, Series editor, Tatnall, Arthur, Series editor, Neuhold, Erich J., Series editor, Pras, Aiko, Series editor, Tröltzsch, Fredi, Series editor, Pries-Heje, Jan, Series editor, Whitehouse, Diane, Series editor, Reis, Ricardo, Series editor, Furnell, Steven, Series editor, Furbach, Ulrich, Series editor, Gulliksen, Jan, Series editor, Rauterberg, Matthias, Series editor, and Leslie, Christopher, editor
- Published
- 2016
- Full Text
- View/download PDF
29. Exploring Homophily in Demographics and Academic Performance Using Spatial-Temporal Student Networks
- Author
-
Nguyen, Quan, Poquet, Oleksandra, Brooks, Christopher, and Li, Warren
- Abstract
Network analysis in educational research has primarily relied on self-reported relationships or connections inferred from online learning environments, such as discussion forums. However, a large part of students' social connections through day-to-day on-campus encounters has remained underexplored. The paper examines spatial-temporal student networks using campus WiFi log data throughout a semester, and their relations to the student demographics and academic performance. A tie in the spatial-temporal network was inferred when two individuals connected to the same WiFi access point at the same time intervals at the 'beyond chance' frequency. Our findings revealed that students were more likely to co-locate with the individuals of similar gender, ethnic group identity, family income, and grades. Analysis of homophily over the semester showed that students of the same gender were more likely to co-locate as the semester progressed. However, co-location of the students similar on ethnic minority identity, family income, and grades remained consistent throughout the semester. Mixed-effect regression models demonstrated that features derived from spatial-temporal networks, such as degree, the grade of the most frequently co-located peer, and average grade of five most frequently co-located peers were positively associated with academic performance. This study offers a unique exploration of the potential use of WiFi log data in understanding of student relationships integral to the quality of college experience. [For the full proceedings, see ED607784.]
- Published
- 2020
30. HCI International 2019 – Late Breaking Papers : 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings
- Author
-
Constantine Stephanidis and Constantine Stephanidis
- Subjects
- User interfaces (Computer systems), Human-computer interaction, Computer vision, Artificial intelligence, Computer engineering, Computer networks, Education—Data processing, Social sciences—Data processing
- Abstract
This year the 21st International Conference on Human-Computer Interaction, HCII 2019, which was held in Orlando, Florida, USA, in July 2019, introduced the additional option of'late-breaking work', which applied both for papers and posters with the corresponding volumes of the proceedings. The 47 late-breaking papers included in this volume were published after the conference has taken place. They were organized in the following topical sections: user experience design and evaluation; information, visualization, and decision making; virtual and augmented reality; learning and games; human and task models in HCI; and design and user experience case studies.
- Published
- 2019
31. Supporting Learning Communities via Web Service Technologies: Navigating Knowledge Transfer between Infrastructural Services and User Needs
- Author
-
International Association for Development of the Information Society (IADIS), Wilmers, Annika, and Fahrer, Sigrid
- Abstract
Drawing on research syntheses from the meta project Digi-EBF as well as the German Education Server, this contribution discusses how web products and services offered by the Information Center for Education at DIPF | Leibniz Institute for Research and Information in Education address and support educational communities. In the area of research syntheses, important factors for success are a methodologically systematic and transparent procedure and an easy open access as well as a monitoring of formats by science communication. The German Education Server meets its transfer task by orientation towards dimensions of information quality, adhering to user's needs and evaluating its effectivity via different assessment and measurement methods.
- Published
- 2022
32. Exploring Patron Behavior in an Academic Library: A Wi-Fi-Connection Data Analysis
- Author
-
Meng Qu
- Abstract
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze visitor patterns in academic libraries. The PCA system offers real-time crowding information to the public and a comprehensive visitor analysis dashboard for library administrators. The system's development was driven by the need for occupancy restrictions during the pandemic, ensuring a spacious environment for library visitors as well as balancing between efficient utilization and adhering to social distancing regulations. Traditional methods of patron behavior performance and library spatial analysis, such as manual head counting or card-swiping systems, often incur additional costs for labor, hardware installation, or software subscription. The PCA system, however, utilizes existing Wi-Fi-connection data, providing a cost-effective solution to represent patron demographics and spatial usage. Limitations may arise when patrons do not carry Wi-Fi-enabled devices or during periods of low Wi-Fi service functionality. Implemented in Node.js and integrated with Python Flask framework and related libraries, the PCA system was piloted at the King Library in Miami University, successfully demonstrating a high validity compared to manually collected data. It filters out noise and redundancy, visualizes the occupancy index meter in real time, and generates statistical reports by linking user IDs with demographic information. The PCA system's reliability was validated through manually head counting data collected at the King Library in Miami University, establishing it as a reliable tool for library space management and patron analysis.
- Published
- 2024
- Full Text
- View/download PDF
33. Experience Teaching Emerging Information Technologies
- Author
-
Tappert, Charles C. and Agerwala, Tilak
- Abstract
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence, Blockchain, Quantum Computing, Cybersecurity, Biometrics, and Internet Platform Businesses -- are described and the distinctions among them explained. We conclude that teaching emerging information technologies is an area rich with opportunity for growth. [For the full proceedings, see ED596991.]
- Published
- 2019
34. Implementation of ACME-based automated centralized certificate management system.
- Author
-
Petrosyan, Arthur, Petrosyan, Gurgen, and Tadevosyan, Robert
- Subjects
INTERNET servers ,DIGITAL certificates ,COMPUTER networks ,NETWORK PC (Computer) ,CONFERENCE papers ,UNIVERSITY research - Abstract
This paper describes the implementation of Automated Centralized Certificate Management System based on Automatic Certificate Management Environment (ACME) protocol within the Academic Scientific Research Computer Network of Armenia (ASNET-AM). Digital certificates are one of the major instruments, used for most network services today. The work done in ASNET-AM is based the recent availability of free wildcard SSL/TLS certificates from some certificate authorities (CA) like LetsEncrypt. The concept of implementing automated centralized certificate system was presented at CSIT 2019 Conference and this paper summarizes its implementation done during past years. The system described is now actively used in production and provides centralized secure and automated digital certificates service for different types of ASNET-AM network services such as web servers, mail servers, etc. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Hands-On Learning of Hardware and Systems Security
- Author
-
Yang, Shuo, Paul, Shubhra Deb, and Bhunia, Swarup
- Abstract
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our everyday life has also escalated the risks of experiencing security threats on these technologies. Students today are exposed to these devices and thus require a hands-on learning experience to be aware of the threats, solutions, and future research challenges in hardware security. Currently, there are limited opportunities for students to learn and understand hardware security. A significant factor limiting exposure to these topics is the lack of an accessible, low-cost, flexible, and ready-made platform for training students on the innards of a computing system and the spectrum of security issues/solutions at the hardware-level. In this paper, we introduce the motivation and efforts behind a course named "Hands-on Hardware Security." The Department of Electrical and Computer Engineering at the University of Florida has been offering this course for the past three years in providing experiential learning of hardware security through a set of well-designed experiments performed on a custom hardware module. We also present, in detail, the idea of a custom-designed, easy-to-understand, flexible hardware module with fundamental building blocks that can emulate a computer system and create a network of connected devices. We refer to the module as "HaHa SEP" (Hardware Hacking Security Education Platform), and it encourages students to learn and exercise "ethical hacking," a critical concept in the hardware security field. It is the first and only known lab course offered online, where students can perform ethical hacking of a computing system using a dedicated hardware module. This paper also provides a brief introduction to the experiments performed using this module, highlighting their significance in the field of Hardware Security. Finally, it concludes with a compilation of course evaluation survey results discussing the success of this course in engaging students' interest in the subject matter and determining the accomplishment of maintaining a balance between their expectation and the effort required towards the course.
- Published
- 2021
36. On Assessment and Evaluation of Teaching Computer Networks to Electrical Engineering Students by the Aid of a Lab Course
- Author
-
Abdrabou, Atef and Shakhatreh, Walid
- Abstract
In the era of the Internet-of-everything, learning the principles of data communications and networking is inevitable for many electrical engineering disciplines. The paper addresses the effectiveness of teaching the fundamentals of data communications and networking using a dedicated lab course as a co-requisite to a classic lecture-based course. In the introduced lab course, the students are asked to do a variety of tasks using real hardware and a network simulator. The paper introduces quantitative measures of an outcome-based learning approach applied to both courses. Based on students' achievements, the role of the lab course in the attainment of both the course learning outcomes and the electrical engineering program learning outcomes is measured in comparison with the case where the lab course is not taken. Our findings reveal a general enhancement trend in attaining the course and program learning outcomes with a significant increase in the program outcome related to solving engineering problems. Also, a slight increase is noticed in meeting the lab course outcomes for the students who attended the lab with the course in the same semester, which indicates an improvement in gaining practical knowledge.
- Published
- 2021
37. What Can We Learn from College Students' Network Transactions? Constructing Useful Features for Student Success Prediction
- Author
-
Pytlarz, Ian, Pu, Shi, Patel, Monal, and Prabhu, Rajini
- Abstract
Identifying at-risk students at an early stage is a challenging task for colleges and universities. In this paper, we use students' oncampus network traffic volume to construct several useful features in predicting their first semester GPA. In particular, we build proxies for their attendance, class engagement, and out-of-class study hours based on their network traffic volume. We then test how much these network-based features can increase the performance of a model with only conventional features (e.g., demographics, high school GPA, standardized test scores, etc.). We labeled students as "above median" and "below median" students based on their first term GPA. Several machine learning models were then applied, ranging from logistic regression, SVM, and random forests, to AdaBoost. The result shows that the model with network-based features consistently outperforms the ones without, in terms of accuracy, f1 score, and AUC. Given that network activity data is readily available data in most colleges and universities, this study provides practical insights on how to build more powerful models to predict student success. [For the full proceedings, see ED593090.]
- Published
- 2018
38. Practice of PE Teaching Reform in Colleges and Universities under the Background of Multimedia Internet
- Author
-
Jiaheng Chen and Shicheng Chen
- Abstract
Multimedia network technology refers to multimedia network teaching based on text data communication, which can make better use of sports resources in college physical education teaching. Multimedia technology combines computer and video technology. It refers to the combination of two or more sounds and images to form a system that can transmit information. When the initial key changes slightly, the hash bit change rate of the scheme is greater than the threshold value of 0.451, which shows that the hash algorithm in this paper has good key sensitivity. The more sensitive the perceived hash is to the change of the key, the more difficult it is for the attacker to estimate the key, and the better the security of the hash key. Therefore, the above experiments can prove that the hash algorithm in this paper is safe. The appearance of sports network distance education in this paper provides a broader stage for schools and makes greater contributions to the improvement of the overall physical quality of citizens in the whole society.
- Published
- 2023
- Full Text
- View/download PDF
39. How to Use Academic and Digital Fingerprints to Catch and Eliminate Contract Cheating during Online Multiple-Choice Examinations: A Case Study
- Author
-
Emery-Wetherell, Meaghan and Wang, Ruoyao
- Abstract
Over four semesters of a large introductory statistics course the authors found students were engaging in contract cheating on Chegg.com during multiple choice examinations. In this paper we describe our methodology for identifying, addressing and eventually eliminating cheating. We successfully identified 23 out of 25 students using a combination of unique academic and digital fingerprints, and identified students who used virtual private networks (VPNs) to protect their online identity. There were two forms of cheating - posting questions and waiting for responses from tutors, and looking for questions that had already been solved. We found that 165 questions from these examinations were posted by 10 different students, but that the most common form of cheating was searching for answers that had already been posted. This paper discusses these patterns of Chegg usage, the consequences of not catching cheating early on, and how students reacted to being caught. Also provided are R and Python code that readers may use to identify cheating students in their own courses.
- Published
- 2023
- Full Text
- View/download PDF
40. Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
- Author
-
Yates, David J., Frydenberg, Mark, Waguespack, Leslie J., McDermott, Isabelle, OConnell, Jake, Chen, Frankie, and Babb, Jeffry S.
- Abstract
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile of "T-shaped" skills, which is known to be desirable in many consulting and design professions, is being reflected in the latest manifestations of cybersecurity curriculum design and accreditation. A model of learning that yields "T-shaped" professionals combines the ability to apply knowledge across domains (breadth) with the ability to apply functional and disciplinary skills (depth). We present the design of a junior- or senior-level cybersecurity course in which the horizontal stroke of the "T" (representing breadth) spans knowledge areas that cut across the people, process and technology triad. The vertical stroke of the "T" (representing depth) is provided by two aspects of the course design: first, learning the foundational principles of cybersecurity, including practical examples from cryptography and network security; and second, applying the principles of cybersecurity to a semester project, allowing students to expand the core "T" of the course to satisfy their own passions and interests. Our paper concludes with student and instructor reflections on the implementation of this cybersecurity course, as well as broader implications of the lessons learned after the initial offering of this course.
- Published
- 2019
41. Social and content aware One-Class recommendation of papers in scientific social networks.
- Author
-
Wang, Gang, He, XiRan, and Ishuga, Carolyne Isigi
- Subjects
INFORMATION technology ,SOCIAL networks ,SPARSE graphs ,HYBRID computers (Computer architecture) ,HYBRID power systems - Abstract
With the rapid development of information technology, scientific social networks (SSNs) have become the fastest and most convenient way for researchers to communicate with each other. Many published papers are shared via SSNs every day, resulting in the problem of information overload. How to appropriately recommend personalized and highly valuable papers for researchers is becoming more urgent. However, when recommending papers in SSNs, only a small amount of positive instances are available, leaving a vast amount of unlabelled data, in which negative instances and potential unseen positive instances are mixed together, which naturally belongs to One-Class Collaborative Filtering (OCCF) problem. Therefore, considering the extreme data imbalance and data sparsity of this OCCF problem, a hybrid approach of Social and Content aware One-class Recommendation of Papers in SSNs, termed SCORP, is proposed in this study. Unlike previous approaches recommended to address the OCCF problem, social information, which has been proved playing a significant role in performing recommendations in many domains, is applied in both the profiling of content-based filtering and the collaborative filtering to achieve superior recommendations. To verify the effectiveness of the proposed SCORP approach, a real-life dataset from CiteULike was employed. The experimental results demonstrate that the proposed approach is superior to all of the compared approaches, thus providing a more effective method for recommending papers in SSNs. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
42. Practice of Organisational Strategies of Improving Computer Rooms for Promoting Smart Education Using ICT Equipment
- Author
-
Ogawa, Nobuyuki and Shimizu, Akira
- Abstract
This paper describes our concrete efforts to improve the functions of the computer rooms in the Information Processing Center from among several organisational strategies which can assume a large role in the next-generation education, while examining the practice of active learning by the faculty in all classes using ICT equipment. We implemented the strategies to rapidly introduce smart education including e-Learning into all subjects of our college by improving the functions of the computer rooms, increasing the number of the computer rooms, and linking with the "Acceleration Program for University Education Rebuilding (AP)" which is being promoted as a collegewide project. Also, based on the circumstances leading to the increase in the number of the computer rooms, we conducted an aggregate analysis of use of the increased computer rooms and utilized the results for promoting smart education. [For the complete proceedings, see ED579335.]
- Published
- 2017
43. Room Escape at Class: Escape Games Activities to Facilitate the Motivation and Learning in Computer Science
- Author
-
Borrego, Carlos, Fernández, Cristina, Blanes, Ian, and Robles, Sergi
- Abstract
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to improve their learning on two courses of the second year in the "Computer Engineering degree: Computer Networks and Information and Security". [Paper presented at the International Conference on University Teaching and Innovation (CIDUI): Learning and Teaching Innovation Impacts (9th, Bellaterra, Barcelona, Spain, Jul 5-7 2016.)]
- Published
- 2017
44. Application of Digital Cybersecurity Approaches to University Management--VFU SMART STUDENT
- Author
-
Nedyalkova, Anna, Bakardjieva, Teodora, and Nedyalkov, Krasimir
- Abstract
This paper suggests digital approaches in university management. Digital transformation requires leadership that can maintain and balance competing interests from faculty, administrators, students and others. The team of Varna Free University designed a flexible proper solution VFU SMART STUDENT aiming at lower operating costs and better performance is application of cloud technologies. It is a web-based information system for provision of e-services to VFU students, which provides comprehensive information about the student from their enrolment until their graduation. Network monitoring system is used to make the transition easier, and to improve network effectiveness. Security policy, procedures and guidelines are adopted to guarantee seamless operating of networks and systems. [For full proceedings, see ED571459.]
- Published
- 2016
45. Inheritance of Intangible Culture Based on Wireless Communication Network in College Dance Teaching
- Author
-
Hui Meng, Li Ma, Lei Su, Bei Lu, Di Hou, and Xiaowei Du
- Abstract
Intangible cultural heritage is an important part of Chinese excellent traditional culture, and college dance teaching is paid more attention by researchers of physical education and computer technology. In order to help the inheritance and development of non-legacy culture in college dance teaching, this paper analyzes the influencing factors of wireless communication network in college dance teaching, constructs an interactive platform for non-legacy digital dance teaching based on wireless communication network technology, and applies it in the dance teaching process of a university in Henan province to highlight the role of wireless communication technology in dance teaching. The results show that the interactive platform can effectively reduce teachers' physical energy consumption and has certain reliability and practicality. Through artificial intelligence algorithm, the traditional dance teaching method has been changed, and a new exploration of non-legacy dance teaching has been realized.
- Published
- 2024
- Full Text
- View/download PDF
46. Study on the Effectiveness of English Teaching in Universities Based on 5G Mobile Internet
- Author
-
Nan Wu
- Abstract
Higher education is becoming increasingly competitive and all educational institutions are concentrating on improving quality and changing traditional higher education teaching methods. New-type classroom instruction has embraced a unique advancement opportunity with the arrival of the fifth generation (5G) era. It is critical to develop a teaching assistance system that makes use of high-speed network methodology and new-type display methodology. For the innovation and reform of higher education, this article combines soft computing techniques, artificial intelligence (AI), and 5G networks. This paper outlines the exact processes and measures for incorporating "5G" technology into higher education. Finally, conduct a comparative experiment to see how good the system is at learning AI knowledge when compared to standard learning methods. The outcomes of the experiments are examined to show that employing this approach to gain AI knowledge is successful and improves students' enthusiasm in learning as well as their hands-on abilities.
- Published
- 2024
- Full Text
- View/download PDF
47. Socio-Technically Just Pedagogies: A Framework for Curriculum-Making in Higher Education
- Author
-
Teresa Swist, Thilakshi Mallawa Arachchi, Jenna Condie, and Benjamin Hanckel
- Abstract
The COVID-19 pandemic sparked an unprecedented expansion of educational technologies and digitisation of the university sector, and also amplified existing inequalities and crises. In this paper, we introduce the 'socio-technically just pedagogies framework' to systemically explore curriculum-making, student-staff partnerships, knowledge production, and networked capabilities in higher education. This conceptual innovation seeks to (re)articulate pedagogy across four aspects: (i) a commitment to curriculum-making as a form of everyday activism; (ii) a nurturing of student-staff coalitions to expand student-staff partnerships; (iii) development of generative spaces for transdisciplinary co-creation; and (iv) the deliberation of networked capabilities. This framework emerged from a partnership with students at an Australian university that sought to experiment with pedagogical practices and possibilities. Our coalition then responded to the framework to illicit collective insights about the curriculum-making phenomenon. The framework seeks to articulate curriculum-making initiatives that collectively enact socio-technically just pedagogies.
- Published
- 2024
- Full Text
- View/download PDF
48. Conducting Qualitative Interviews via VoIP Technologies: Reflections on Rapport, Technology, Digital Exclusion, and Ethics
- Author
-
Livia Tomás and Ophélie Bidet
- Abstract
Qualitative research has been strongly affected by the COVID-19 pandemic, highlighting the possibilities that Voice over Internet Protocol (VoIP) technologies such as Skype, WhatsApp, and Zoom offer to qualitative scholars. Based on the experience of using such technologies to collect qualitative data for our PhD studies, we present how we dealt with the challenges of this interview mode. Precisely, we discuss problems related to rapport, technology, digital exclusion, and ethics frequently pointed out in the methodological literature on online interviews. Thereby we put forward strategies and techniques that helped us to 1) build a rapport, 2) manage technical difficulties, 3) reflect on risks of digital exclusion, and 4) comply with the ethical standards of our institution. In doing so, we draw on our qualitative data to support the arguments. The aim of this paper is, thus, to deepen the methodological debate on online interviews in social sciences.
- Published
- 2024
- Full Text
- View/download PDF
49. Metaverse Miracles: Enhancing Healthcare Experiences through Virtual Reality
- Author
-
Sarthak Punj, Poorvi Kejriwal, and S. P. Raja
- Abstract
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality, augmented reality, and the internet, all rolled into one immersive environment. Virtual reality (VR) immerses users in entirely computer-generated environments through headsets, while augmented reality (AR) overlays digital information onto the real world, enhancing the user's perception. This paper introduces new strategies to bring healthcare into the metaverse by providing solutions to the hurdles that have kept us from exploring this idea. These include reducing data transfer delays in the metaverse, making VR headsets more affordable, accurately predicting diseases by studying symptoms, and creating a platform for medical professionals to practice procedures on avatars before performing them on real patients. Metaverse has immense scope of revolutionising the healthcare and we are yet to unfold its complete usefulness.
- Published
- 2024
- Full Text
- View/download PDF
50. Mobile, Secure, and Programmable Networking: 6th international conference, MSPN 2020: Paris, France, October 28–29, 2020, revised selected papers
- Author
-
Bouzefrane, Samia, Laurent, Maryline, Boumerdassi, Selma, Renault, Eric, CEDRIC. Réseaux et Objets Connectés (CEDRIC - ROC), Centre d'études et de recherche en informatique et communications (CEDRIC), Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)-Conservatoire National des Arts et Métiers [CNAM] (CNAM)-Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)-Conservatoire National des Arts et Métiers [CNAM] (CNAM), Institut Polytechnique de Paris (IP Paris), Department of Radiation Science and Technology [Delft] (RST), Delft University of Technology (TU Delft), Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), and ESIEE Paris
- Subjects
distributed systems ,artificial intelligence ,communication systems ,network architectures ,telecommunication networks ,GeneralLiterature_MISCELLANEOUS ,data communication systems ,distributed computer systems ,telecommunication systems ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,network protocols ,network services ,computer networks ,internet ,data security ,network performance evaluation ,signal processing ,computer security ,wireless telecommunication systems - Abstract
International audience; This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020. The 16 full papers presented in this volume were carefully reviewed and selected from 31 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.
- Published
- 2021
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.