244 results on '"Soh, Leen-Kiat"'
Search Results
202. Commercializing a multiagent-supported collaborative system.
- Author
-
Soh, Leen-Kiat and Jiang, Hong
- Published
- 2006
- Full Text
- View/download PDF
203. Satisficing coalition formation among agents
- Author
-
Soh, Leen-Kiat, primary and Tsatsoulis, Costas, additional
- Published
- 2002
- Full Text
- View/download PDF
204. Balancing ontological and operational factors in refining multiagent neighborhoods.
- Author
-
Soh, Leen-Kiat and Chen, Chao
- Published
- 2005
- Full Text
- View/download PDF
205. Analyzing relationships between closed labs and course activities in CS1.
- Author
-
Soh, Leen-Kiat, Samal, Ashok, Person, Suzette, Nugent, Gwen, and Lang, Jeff
- Published
- 2005
- Full Text
- View/download PDF
206. Designing, implementing, and analyzing a placement test for introductory CS courses.
- Author
-
Soh, Leen-Kiat, Samal, Ashok, Person, Suzette, Nugent, Gwen, and Lang, Jeff
- Published
- 2005
- Full Text
- View/download PDF
207. Using Multiagent Intelligence to Support Synchronous and Asynchronous Learning.
- Author
-
Kacprzyk, Janusz, Ghaoui, Claude, Jain, Mitu, Bannore, Vivek, C. Jain, Lakhmi, Zhang, Xuesong, Soh, Leen-Kiat, Jiang, Hong, and Liu, Xuli
- Abstract
This chapter presents an innovative multiagent system to support synchronous and asynchronous cooperative learning both in the real classrooms and in distance education. The system, called I-MINDS, consists of a group of intelligent agents. A teacher agent monitors the student activities and helps the teacher manage and better adapt to the class. A student agent, on the other hand, interacts with the teacher agent and other student agents to support cooperative learning activities behind the scene for a student. Two I-MINDS innovations are (a) agent-federated real-time "buddy group" formation and refinement, and (b) automated ranking of questions and responses. These two functionalities are supported by a suite of knowledge bases, applied to data that are either collected and derived from the agent-mediated activities, or compiled directly from online student surveys. The knowledge bases include instructional keywords and rules for profiling student and scoring questions. We have tested our I-MINDS prototype within a pilot study. In this pilot study, we had two groups: control and I-MINDS. Each group was given two lectures by the same instructor on GIS topics. The result was very promising as were comments from the instructor and the subjects in the I-MINDS group related to their comfort level in using the tool. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
208. Intelligent Agents that Learn to Deliver Online Materials to Students Better: Agent Design, Simulation and Assumptions.
- Author
-
Kacprzyk, Janusz, Ghaoui, Claude, Jain, Mitu, Bannore, Vivek, C. Jain, Lakhmi, Soh, Leen-Kiat, Blank, Todd, and Dee Miler, Lee
- Abstract
In this chapter, we discuss an integrated framework of case-based learning (CBL) in an agent that intelligently delivers learning materials to students. The agent customizes its delivery strategy for each student based on the student's background profile and his or her interactions with the graphic user interface (GUI) in our system, and based on the usage history of the learning materials. The agent's decision-making process is powered by case-based reasoning (CBR). To improve its reasoning process, our agent learns the differences between good cases (cases with a good solution for its problem space) and bad cases (cases with a bad solution for its problem space). It also meta-learns adaptation heuristics and the significance of the cases' input features. We have also built a simulation to comprehensively test the learning behavior of our agent. Our design of agent learning, adaptation of a solution through CBR, and simulation is based on a set of domainspecific and independent assumptions. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
209. Collaborative Understanding of Distributed Ontologies in a Multiagent Framework: Experiments on Operational Issues.
- Author
-
Walliser, Marius, Brantschen, Stefan, Calisti, Monique, Hempfling, Thomas, Tamma, Valentina, Cranefield, Stephen, Finin, Timothy W., Willmott, Steven, and Soh, Leen-Kiat
- Abstract
This chapter describes a set of experiments that uses a multiagent framework for collaborative understanding of distributed ontologies (CUDO). Our current focus is on the operational issues of such collaboration among the agents, with each agent managing an information database in a distributed information retrieval simulation. To facilitate collaborative understanding, each agent maintains an ontology and a translation table with other neighboring agents to map between each own concepts and the neighbors'. Based on an infrastructure prototype, our experiments have focused on how neighborhood profiling, the translation tables, and query experience impact the collaborative activities among the agents. The specific objectives of our analyses are to investigate (a) the recognition of useful neighbors for sharing queries, (b) the efficiency of query handling in different real-time scenarios and with different resource constraints (such as the number of threads and available translations), and (c) the effects of different concepts and query demands on collaborative understanding. Our results show that the different resource constraints influence the collaborative activities significantly and thus also impact how the agents learn of each others ontologies. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
210. Adaptive, Confidence-Based Multiagent Negotiation Strategy.
- Author
-
Soh, Leen-Kiat and Li, Xin
- Published
- 2004
- Full Text
- View/download PDF
211. Agent-based cooperative learning.
- Author
-
Soh, Leen-Kiat, Jiang, Hong, and Ansorge, Charles
- Published
- 2004
- Full Text
- View/download PDF
212. Using game days to teach a multiagent system class.
- Author
-
Soh, Leen-Kiat
- Published
- 2004
- Full Text
- View/download PDF
213. Texture analysis of SAR sea ice imagery using gray level co-occurrence matrices
- Author
-
Soh, Leen-Kiat and Tsatsoulis, Costas
- Subjects
Remote sensing -- Research ,Sea ice -- Observations ,Matrices -- Analysis ,Synthetic aperture radar -- Image quality ,Business ,Earth sciences ,Electronics and electrical industries - Abstract
This paper presents a preliminary study for mapping sea ice patterns (texture) with 100-m ERS-1 synthetic aperture radar (SAR) imagery. We used gray-level co-occurrence matrices (GLCM) to quantitatively evaluate textural parameters and representations and to determine which parameter values and representations are best for mapping sea ice texture. We conducted experiments on the quantization levels of the image and the displacement and orientation values of the GLCM by examining the effects textural descriptors such as entropy have in the representation of different sea ice textures. We showed that a complete gray-level representation of the image is not necessary for texture mapping, an eight-level quantization representation is undesirable for textural representation, and the displacement factor in texture measurements is more important than orientation. In addition, we developed three GLCM implementations and evaluated them by a supervised Bayesian classifier on sea ice textural contexts. This experiment concludes that the best GLCM implementation in representing sea ice texture is one that utilizes a range of displacement values such that both microtextures and macrotextures of sea ice can be adequately captured. These findings define the quantization, displacement, and orientation values that are the best for SAR sea ice texture analysis using GLCM. Index Terms - Co-occurrence matrix, SAR, sea ice, texture.
- Published
- 1999
214. Segmentation of satellite imagery of natural scenes using data mining
- Author
-
Soh, Leen-Kiat and Tsatsoulis, Costas
- Subjects
Artificial satellites in remote sensing -- Research ,Synthetic aperture radar -- Image quality ,Business ,Earth sciences ,Electronics and electrical industries - Abstract
In this paper, we describe a segmentation technique that integrates traditional image processing algorithms with techniques adapted from knowledge discovery in databases (KDD) and data mining to analyze and segment unstructured satellite images of natural scenes. We have divided our segmentation task into three major steps. First, an initial segmentation is achieved using dynamic local thresholding, producing a set of regions. Then, spectral, spatial, and textural features for each region are generated from the thresholded image. Finally, given these features as attributes, an unsupervised machine learning methodology called conceptual clustering is used to cluster the regions found in the image into N classes - thus, determining the number of classes in the image automatically. We have applied the technique successfully to ERS-1 synthetic aperture radar (SAR), Landsat thematic mapper (TM), and NOAA advanced very high resolution radiometer (AVHRR) data of natural scenes. Index Terms - Clustering methods, image segmentation, natural scene analysis.
- Published
- 1999
215. Integrating Case-Based Reasoning and Meta-Learning for a Self-Improving Intelligent Tutoring System.
- Author
-
Soh, Leen-Kiat and Blank, Todd
- Subjects
INTELLIGENT tutoring systems ,CASE-based reasoning ,REINFORCEMENT learning ,EXPERT systems - Abstract
A framework integrating case-based reasoning (CBR) and meta-learning is proposed in this paper as the underlying methodology enabling self-improving intelligent tutoring systems (ITSs). Pedagogical strategies are stored in cases, each dictating, given a specific situation, which tutoring action to make next. Reinforcement learning is used to improve various aspects of the CBR module – cases are learned and retrieval and adaptation are improved, thus modifying the pedagogical strategies based on empirical feedback on each tutoring session. To minimize canceling out effects due to the multiple strategies used for meta-learning – for example, the learning result of one strategy undoes or reduces the impact of the learning result of another strategy, a principled design that is both cautious and prioritized is put in place. An ITS application, called Intelligent Learning Material Delivery Agent (ILMDA), has been implemented, powered by this framework, on introductory computer science topics, and deployed at the Computer Science and Engineering Department of the University of Nebraska. Studies show the feasibility of such a framework and impact analyses are reported on pedagogical strategies and outcomes. [ABSTRACT FROM AUTHOR]
- Published
- 2008
216. A Placement Test for Computer Science: Design, Implementation, and Analysis.
- Author
-
Nugent, Gwen, Soh, Leen-Kiat, Samal, Ashok, and Lang, Jeff
- Subjects
COMPUTER science education ,EXAMINATIONS ,COMPUTER programming ,COLLEGE students ,COMPUTER engineering education ,CURRICULUM ,LEARNING ,CYBERNETICS - Abstract
An introductory CS1 course presents problems for educators and students due to students' diverse background in programming knowledge and exposure. Students who enroll in CS1 also have different expectations and motivations. Prompted by the curricular guidelines for undergraduate programmes in computer science released in 2001 by the ACM/IEEE, and driven by a departmental project to reinvent the undergraduate computer science and computer engineering curricula at the University of Nebraska-Lincoln, we are currently implementing a series of changes which will improve our introductory courses. One key component of our project is an online placement examination tied to the cognitive domain that assesses student knowledge and intellectual skills. Our placement test is also integrated into a comprehensive educational research design containing a pre- and posttest framework for assessing student learning and providing valuable feedback for needed instructional revisions. In this paper, we focus on the design and implementation of our placement exam and present an analysis of the data collected to date. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
217. The Workshop Program at the Nineteenth National Conference on Artificial Intelligence.
- Author
-
Muslea, Ion, Dignum, Virginia, Corkill, Daniel, Jonker, Catholijn, Dignum, Frank, Coradeschi, Silvia, Saffiotti, Alessandro, Fit, Dan, Orkin, Jeff, Cheetham, William, Goebel, Kai, Bonissone, Piero, Soh, Leen-Kiat, Jones, Randolph M., Wray, Robert E., Scheutz, Matthias, De Farias, Daniela Pucci, Mannor, Shie, Theocharou, Georgios, and Precup, Doina
- Subjects
ADULT education workshops ,NEURAL computers ,ARTIFICIAL intelligence ,CONFERENCES & conventions ,MACHINE theory ,SELF-organizing systems - Abstract
AAAI presented the AAAI-04 workshop program on July 25-26, 2004 in San Jose, California. This program included twelve workshops covering a wide range of topics in artificial intelligence. The titles of the workshops were as follows: (1) Adaptive Text Extraction and Mining; (2) Agent Organizations: Theory and Practice; (3) Anchoring Symbols to Sensor Data; (4) Challenges in Game Al; (5) Fielding Applications of Artificial Intelligence; (6) Forming and Maintaining Coalitions in Adaptive Multiagent Systems; (7) Intelligent Agent Architectures: Combining the Strengths of Software Engineering and Cognitive Systems; (8) Learning and Planning in Markov Processes-Advances and Challenges; (9) Semantic Web Personalization; (10) Sensor Networks; (11) Spatial and Temporal Reasoning; and (12) Supervisory Control of Learning and Adaptive Systems. [ABSTRACT FROM AUTHOR]
- Published
- 2005
218. ARKTOS: An Intelligent System for SAR Sea Ice Image Classification.
- Author
-
Soh, Leen-Kiat, Tsatsoulis, Costas, Gineris, Denise, and Bertoia, Cheryl
- Subjects
- *
SYNTHETIC aperture radar , *SEA ice , *REMOTE-sensing images , *MULTISENSOR data fusion , *DEMPSTER-Shafer theory , *IMAGE analysis - Abstract
We present an intelligent system for satellite sea ice image analysis named Advanced Reasoning using Knowledge for Typing Of Sea ice (ARKTOS). ARKTOS performs fully automated analysis of synthetic aperture radar (SAR) sea ice images by mimicking the reasoning process of sea ice experts. ARKTOS automatically segments a SAR image of sea ice, generates descriptors for the segments of the image, and then uses expert system rules to classify these sea ice features. ARKTOS also utilizes multisource data fusion to improve classification and performs belief handling using Dempster-Shafer. As a software package, ARKTOS comprises components in image processing, rule-based classification, multisource data fusion, and graphical user interface-based knowledge engineering and modification. As a research project over the past ten years, ARKTOS has undergone phases such as knowledge acquisition, prototyping, refinement, evaluation, deployment, and operationalization at the U.S. National Ice Center. In this paper, we focus on the methodology, evaluations, and classification results of ARKTOS. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
219. ARKTOS: a knowledge engineering software tool for images
- Author
-
SOH, LEEN-KIAT and TSATSOULIS, COSTAS
- Subjects
- *
SEA ice , *REMOTE-sensing images , *REMOTE sensing - Abstract
The goal of our ARKTOS project is to build an intelligent knowledge-based system to classify satellite sea ice images. It involves acquiring knowledge from sea ice experts, quantifying such knowledge as computational entities and ultimately building an intelligent classifier. In this paper we describe a two-stage knowledge engineering approach that facilitates explicit knowledge transfer, converting implicit visual cues and cognition of the experts to explicit attributes and rules implemented by the engineers. First, there is a prototyping stage that involves interviewing sea ice experts, transcribing the sessions, identifying descriptors and rules, designing and implementing the knowledge and delivering the prototype. The objective of this stage is to obtain a modestly accurate classification system quickly. Second, there is a refinement stage that involves evaluating the prototype, refining the knowledge base, modifying the design and re-evaluating the improved system. Since the refinement is evaluation-driven, the experts and the engineers are motivated explicitly to improve the knowledge base and are able to communicate with each other using a common, consistent platform. Moreover, since the classification result is immediately available, both sides are able to efficiently assess the correctness of the system. To facilitate the knowledge engineering of the second stage, we have designed and built three Java-based graphical user interfaces: arktosGUI, arktosViewer and arktosEditor. arktosGUI concentrates on feature-based refinement of specific attributes and rules. arktosViewer deals with regional evaluation. arktosEditor has a rule indexing and search mechanism and knowledge base editing capabilities. [Copyright &y& Elsevier]
- Published
- 2002
- Full Text
- View/download PDF
220. Separating Touching Objects in Remote Sensing Imagery: The Restricted Growing Concept and Implementations.
- Author
-
Soh, Leen-Kiat and Tsatsoulis, Costas
- Subjects
- *
REMOTE sensing , *OBJECT-oriented methods (Computer science) , *SYNTHETIC aperture radar , *SEA ice - Abstract
Presents information on a study which defined the restricted growing concept (RGC) for object separation and an algorithmic analysis of its implementations. Application of morphological reconstruction h-domes in extracting cores; Comparison of the differences between the performance of the morphological operators in synthetic and remotely sensed images; Algorithms of RGC and advantages and disadvantages when applied to synthetic aperture radar sea ice images.
- Published
- 2000
- Full Text
- View/download PDF
221. Investigating coupling preprocessing with shallow and deep convolutional neural networks in document image classification.
- Author
-
Liu, Yi, Soh, Leen-Kiat, and Lorang, Elizabeth
- Subjects
- *
CONVOLUTIONAL neural networks , *IMAGE processing , *CLASSIFICATION , *COMPUTATIONAL complexity - Abstract
Convolutional neural networks (CNNs) are effective for image classification, and deeper CNNs are being used to improve classification performance. Indeed, as needs increase for searchability of vast printed document image collections, powerful CNNs have been used in place of conventional image processing. However, better performances of deep CNNs come at the expense of computational complexity. Are the additional training efforts required by deeper CNNs worth the improvement in performance? Or could a shallow CNN coupled with conventional image processing (e.g., binarization and consolidation) outperform deeper CNN-based solutions? We investigate performance gaps among shallow (LeNet-5, -7, and -9), deep (ResNet-18), and very deep (ResNet-152, MobileNetV2, and EfficientNet) CNNs for noisy printed document images, e.g., historical newspapers and document images in the RVL-CDIP repository. Our investigation considers two different classification tasks: (1) identifying poems in historical newspapers and (2) classifying 16 document types in document images. Empirical results show that a shallow CNN coupled with computationally inexpensive preprocessing can have a robust response with significantly reduced training samples; deep CNNs coupled with preprocessing can outperform very deep CNNs effectively and efficiently; and aggressive preprocessing is not helpful as it could remove potentially useful information in document images. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
222. At the Nexus of Data and Collections.
- Author
-
Downie, J. Stephen, Lorang, Elizabeth, Soh, Leen-Kiat, Bainbridge, David, McIntyre, Sandra, and Page, Kevin
- Published
- 2018
- Full Text
- View/download PDF
223. A Real-Time Negotiation Model and A Multi-Agent Sensor Network Implementation
- Author
-
Soh, Leen-Kiat and Tsatsoulis, Costas
- Abstract
Abstract This paper describes a negotiation model that incorporates real-time issues for autonomous agents. This model consists of two important ideas: a real-time logical negotiation protocol and a case-based negotiation model. The protocol integrates a real-time Belief-Desire-Intention (BDI) model, a temporal logic model, and communicative acts for negotiation. This protocol explicitly defines the logical and temporal relationships of different knowledge states, facilitating real-time designs such as multi-threaded processing, state profiling and updating, and a set of real-time enabling functional predicates in our implementation. To further support the protocol, we use a case-based reasoning model for negotiation strategy selection. An agent learns from its past experience by deriving a negotiation strategy from the most similar and useful case to its current situation. Guided by the strategy, the agent negotiates with its partners using an argumentation-based negotiation protocol. The model is time and situation aware such that each agent changes its negotiation behavior according to the progress and status of the ongoing negotiation and its current agent profile. We apply the negotiation model to a resource allocation problem and obtain promising results.
- Published
- 2005
- Full Text
- View/download PDF
224. Closed laboratories with embedded instructional research design for CS1.
- Author
-
Soh, Leen-Kiat, Samal, Ashok, Person, Suzette, Nugent, Gwen, and Lang, Jeff
- Published
- 2005
- Full Text
- View/download PDF
225. Guest Editorial Special Issue on Computing in Engineering.
- Author
-
Soh, Leen-Kiat and Cooper, Stephen
- Subjects
- *
CLOUD computing , *ACTIVE learning , *ENGINEERING education , *EDUCATIONAL technology , *ELECTRIC circuits - Abstract
With the increasing ubiquity of computing, more engineering programs now require their students to take one or more computing courses. At institutions where significant numbers of engineering students take computer courses, computing instructors and educators often assume roles that have them teaching their computing courses for non-majors as service courses, dealing with students with diverse backgrounds and varied motivations. Although teaching computing courses to non-majors is not new, the increasing importance of computing in future undergraduate engineering curricula poses new challenges. In this Special Issue, four of the papers offer insight into, and give evidence of, teaching computing to engineering students; the fifth paper investigates computational modeling abilities in conceptual understanding of electric circuits. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
226. A Comprehensive Professional Development Program for K-8 Teachers to Teach Computer Science
- Author
-
Soh, Leen-Kiat, primary, Nugent, Gwen, additional, Smith, Wendy, additional, Trainin, Guy, additional, Sutton, John, additional, and Steen, Kent, additional
- Full Text
- View/download PDF
227. IUSE Computational Creativity: Improving Learning, Achievement, and Retention in Computer Science for CS and non-CS Undergraduates
- Author
-
Peteranetz, Markeya, primary, Shell, Duane, additional, Soh, Leen-Kiat, additional, Ingraham, Elizabeth, additional, and Flanigan, Abraham, additional
- Full Text
- View/download PDF
228. An information fusion approach for conflating labeled point-based time-series data.
- Author
-
Schell, Zion, Samal, Ashok, and Soh, Leen-Kiat
- Subjects
- *
DEMPSTER-Shafer theory , *INFORMATION theory , *ATMOSPHERIC pressure , *MULTISENSOR data fusion , *TIME series analysis , *DATA fusion (Statistics) - Abstract
In geographic data analysis, it is often the case that multiple aspects of a single phenomenon are captured by different sources of data. For instance, a storm can be identified based on its precipitation, as well as windspeed, and changes in barometric pressure. It proves beneficial in specific domains to be able to use all available sources of data, and some method must be used to integrate all of these sources of data into a singular decision, often in the form of a classification. This paper proposes the general form of what has been termed the Class Label Conflation Problem – the problem of taking a number of distinct and possibly conflicting sources in the form of spatially-located time series, and using this historical dataset to determine a class label at a new location. In addition to this formalization, this paper details an algorithm (called ACCL) to solve the general case of the problem. This algorithm has its foundations in information theory (specifically Dempster-Shafer Theory), supervised classification, and data fusion. An analysis of the algorithm demonstrates its effectiveness using synthetic datasets as well as the US Drought Monitor as a case study. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
229. Satisficing coalition formation among agents.
- Author
-
Soh, Leen-Kiat and Tsatsoulis, Costas
- Published
- 2002
- Full Text
- View/download PDF
230. Design, development, and validation of a learning object for CS1.
- Author
-
Nugent, Gwen, Soh, Leen-Kiat, Samal, Ashok, Person, Suzette, and Lang, Jeff
- Published
- 2005
- Full Text
- View/download PDF
231. Lessons Learned from Comprehensive Deployments of Multiagent CSCL Applications I-MINDS and ClassroomWiki.
- Author
-
Khandaker, Nobel, Soh, Leen-Kiat, Miller, Lee Dee, Eck, Adam, and Jiang, Hong
- Abstract
Recent years have seen a surge in the use of intelligent computer-supported collaborative learning (CSCL) tools for improving student learning in traditional classrooms. However, adopting such a CSCL tool in a classroom still requires the teacher to develop (or decide on which to adopt) the CSCL tool and the CSCL script, design the relevant pedagogical aspects (i.e., the learning objectives, assessment method, etc.) to overcome the associated challenges (e.g., free riding, student assessment, forming student groups that improve student learning, etc). We have used a multiagent-based system to develop a CSCL application and multiagent-frameworks to form student groups that improve student collaborative learning. In this paper, we describe the contexts of our three generations of CSCL applications (i.e., I-MINDS and ClassroomWiki) and provide a set of lessons learned from our deployments in terms of the script, tool, and pedagogical aspects of using CSCL. We believe that our lessons would allow 1) the instructors and students to use intelligent CSCL applications more effectively and efficiently, and help to improve the design of such systems, and 2) the researchers to gain additional insights into the impact of collaborative learning theories when they are applied to real-world classrooms. [ABSTRACT FROM PUBLISHER]
- Published
- 2011
- Full Text
- View/download PDF
232. A framework for CS1 closed laboratories.
- Author
-
Soh, Leen-Kiat, Samal, Ashok, and Nugent, Gwen
- Published
- 2005
- Full Text
- View/download PDF
233. Multiagent study of smart grid customers with neighborhood electricity trading.
- Author
-
Kahrobaee, Salman, Rajabzadeh, Rasheed A., Soh, Leen-Kiat, and Asgarpoor, Sohrab
- Subjects
- *
MULTIAGENT systems , *SMART power grids , *CONSUMER attitudes , *ECONOMIC demand , *ELECTRIC industries , *ELECTRICAL load ,ELECTRICITY sales & prices - Abstract
Highlights: [•] We propose a multiagent model of Smart Grid where customers communicate with the neighbors and trade electricity to minimize electricity costs. [•] The Demand Side Management strategy proposed in this paper assist the customers make an effective use of their resources. [•] The impact of power transactions within neighboring customers, demand diversity, and load shifting are obtained on the customer and the utility. [•] Different case studies show that customers may save 5–10% with 5% shifting of their peak load. [•] The customers’ electricity costs can be reduced by up to 10% with neighborhood electricity trading and diversified load profiles. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
234. Spatio-temporal polygonal clustering with space and time as first-class citizens.
- Author
-
Joshi, Deepti, Samal, Ashok, and Soh, Leen-Kiat
- Subjects
- *
EPIDEMICS , *GEOSPATIAL data , *ROBUST control , *CLUSTER analysis (Statistics) , *TRAJECTORIES (Mechanics) , *BIOLOGICAL weapons , *DROUGHTS , *ALGORITHMS - Abstract
Detecting spatio-temporal clusters, i.e. clusters of objects similar to each other occurring together across space and time, has important real-world applications such as climate change, drought analysis, detection of outbreak of epidemics (e.g. bird flu), bioterrorist attacks (e.g. anthrax release), and detection of increased military activity. Research in spatio-temporal clustering has focused on grouping individual objects with similar trajectories, detecting moving clusters, or discovering convoys of objects. However, most of these solutions are based on using a piece-meal approach where snapshot clusters are formed at each time stamp and then the series of snapshot clusters are analyzed to discover moving clusters. This approach has two fundamental limitations. First, it is point-based and is not readily applicable to polygonal datasets. Second, its static analysis approach at each time slice is susceptible to inaccurate tracking of dynamic cluster especially when clusters change over both time and space. In this paper we present a spatio-temporal polygonal clustering algorithm known as the Spatio- Temporal Polygonal Clustering (STPC) algorithm. STPC clusters spatial polygons taking into account their spatial and topological properties, treating time as a first-class citizen, and integrating density-based clustering with moving cluster analysis. Our experiments on the drought analysis application, flu spread analysis and crime cluster detection show the validity and robustness of our algorithm in an important geospatial application. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
235. Effects of a Government-Academic Partnership: Has the NSF-CENSUS Bureau Research Network Helped Improve the US Statistical System?
- Author
-
Weinberg, Daniel H, Abowd, John M, Belli, Robert F, Cressie, Noel, Folch, David C, Holan, Scott H, Levenstein, Margaret C, Olson, Kristen M, Reiter, Jerome P, Shapiro, Matthew D, Smyth, Jolene D, Soh, Leen-Kiat, Spencer, Bruce D, Spielman, Seth E, Vilhuber, Lars, and Wikle, Christopher K
- Subjects
- *
SCIENTIFIC community , *INTERDISCIPLINARY research , *ACQUISITION of data , *STATISTICAL models , *CENSUS , *DATA privacy ,UNITED States census - Abstract
The National Science Foundation-Census Bureau Research Network (NCRN) was established in 2011 to create interdisciplinary research nodes on methodological questions of interest and significance to the broader research community and to the Federal Statistical System (FSS), particularly to the Census Bureau. The activities to date have covered both fundamental and applied statistical research and have focused at least in part on the training of current and future generations of researchers in skills of relevance to surveys and alternative measurement of economic units, households, and persons. This article focuses on some of the key research findings of the eight nodes, organized into six topics: (1) improving census and survey data-quality and data collection methods; (2) using alternative sources of data; (3) protecting privacy and confidentiality by improving disclosure avoidance; (4) using spatial and spatio-temporal statistical modeling to improve estimates; (5) assessing data cost and data-quality tradeoffs; and (6) combining information from multiple sources. The article concludes with an evaluation of the ability of the FSS to apply the NCRN's research outcomes, suggests some next steps, and discusses the implications of this research-network model for future federal government research initiatives. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
236. Helping Engineering Students Learn in Introductory Computer Science (CS1) Using Computational Creativity Exercises (CCEs).
- Author
-
Peteranetz, Markeya S., Flanigan, Abraham E., Shell, Duane F., and Soh, Leen-Kiat
- Subjects
- *
COMPUTER science , *STEM education , *ENGINEERING education , *ENGINEERING students , *PROBLEM solving - Abstract
Contribution: This paper provides evidence that computational creativity exercises (CCEs) can increase engineering students’ learning in introductory computer science (CS1) courses. Its main contribution is its more rigorous treatment/control group research design that allows testing for causal influences of CCEs on student learning and performance. Background: Computer science (CS) courses are critical foundational courses for engineering students. CCEs that merge computational and creative thinking have been shown to increase achievement and learning of engineering and nonengineering students in CS1 courses, but previous research has used quasi- and non-experimental designs. Intended Outcomes: CCEs are intended to improve students’ learning of CS1 content and problem-solving ability by fostering computational creativity. Application Design: CCEs can improve student learning and can be used to supplement other evidence-based instructional practices. Findings: Propensity score matching was used to create equivalent treatment and control groups; results show that students in the CCE implementation section had higher scores on a CS knowledge test than students in the control section, but not higher self-efficacy for their CS knowledge. Focus group and open-ended survey questions indicated that students had mixed reactions to the CCEs, with about half the students seeing them as improving their learning, understanding, and ability to apply CS in their engineering field. Responses also reinforced the importance of fully incorporating CCEs in courses and aligning them with course topics. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
237. Career aspirations, perceived instrumentality, and achievement in undergraduate computer science courses.
- Author
-
Peteranetz, Markeya S., Flanigan, Abraham E., Shell, Duane F., and Soh, Leen-Kiat
- Subjects
- *
COMPUTER science education , *ACADEMIC achievement , *OCCUPATIONAL achievement , *CURVILINEAR coordinates , *COLLEGE students - Abstract
This research investigated the relationships among undergraduate computer science students’ computer-science-related career aspirations, perceived instrumentality (PI) for computer science courses, and achievement in those courses. Specifically, the two studies examined (a) change in PI and career aspirations during a single semester, (b) the relationship between change in career aspirations and change in PI, and (c) the influence of career aspirations, PI, and change in career aspirations and PI on achievement in computer science courses. Findings from both studies revealed that students experienced a decrease in endogenous PI and career aspirations and an increase in exogenous PI during the semester. Study 1 showed that non-computer science majors experienced greater shifts in PI and career aspirations than computer science majors. Study 2 showed that the change in PI happened in parallel and was curvilinear, with more change happening in the first half of the semester than the second half. Both studies also showed that computer-science-related career aspirations were associated with PI, and that aspirations and PI had a stronger relationship with scores on a computer science knowledge test than with course grades. Implications and directions for future research are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
238. Computational Creativity Exercises: An Avenue for Promoting Learning in Computer Science.
- Author
-
Peteranetz, Markeya S., Flanigan, Abraham E., Shell, Duane F., and Soh, Leen-Kiat
- Subjects
- *
COMPUTER science education , *CREATIVE ability , *LEARNING , *STUDENTS , *TEACHING - Abstract
Computational thinking and creative thinking are valuable tools both within and outside of computer science (CS). The goal of the project discussed here is to increase students’ achievement in CS courses through a series of computational creativity exercises (CCEs). In this paper, the framework of CCEs is described, and the results of two separate studies on their impact on student achievement are presented. Students in introductory CS courses completed CCEs as part of those courses. Students in Study 1 came from a variety of programs, and students in Study 2 were engineering majors. A profiling approach was used to test whether the impact of the CCEs could be accounted for by differences in students’ motivated and self-regulated engagement. Overall, CCEs had positive impacts on students’ grades and knowledge test scores, and although there were differences in achievement across the profiles, the impact of the CCEs was generally consistent across profiles. The CCEs appear to be a promising way to increase student achievement in introductory CS courses. Implications and directions for future research are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
239. A preliminary study of peer assessment feedback within team software development projects
- Author
-
Tom Crick, Tom Prickett, Jill Bradnum, Merkle, Larry, Doyle, Maureen, Stephens-Martinez, Kristin, Sheard, Judithe, Soh, Leen-Kiat, and Dorn, Brian
- Subjects
G900 - Abstract
Team-based software development projects where teams of learners design and develop software artefacts are common in computing- related degree programmes in the UK and other jurisdictions. Peer assessment is a commonly used approach to ensure learners are fairly recognised and rewarded for their contributions to such projects. This poster presents a preliminary study analysing the relationship between peer marking using the Team-Q rubric and peer feedback from one cohort using open coding and sentiment analysis. The preliminary results from a UK institutional study (N=124) illustrate how learner behaviours within teams appear to impact upon peer scores and the sentiment and intensity of emotion expressed in peer feedback. Additionally, the results provide valuable insights into common behaviours within teams. Given the prominence of team projects in computing curricula, the insights offered from this UK institutional study can shape and inform future learning, teaching and assessment practice.
- Published
- 2022
240. Implicit intelligence beliefs of computer science students: Exploring change across the semester.
- Author
-
Flanigan, Abraham E., Peteranetz, Markeya S., Shell, Duane F., and Soh, Leen-Kiat
- Subjects
- *
INTELLECT , *COMPUTER science students , *SEMESTER system in education , *MOTIVATION (Psychology) , *ACADEMIC achievement , *PSYCHOLOGY - Abstract
This study investigated introductory computer science (CS1) students’ implicit beliefs of intelligence. Referencing Dweck and Leggett’s (1988) framework for implicit beliefs of intelligence, we examined how (1) students’ implicit beliefs changed over the course of a semester, (2) these changes differed as a function of course enrollment and students’ motivated self-regulated engagement profile, and (3) implicit beliefs predicted student learning based on standardized course grades and performance on a computational thinking knowledge test. For all students, there were significant increases in entity beliefs and significant decreases in incremental beliefs across the semester. However, examination of effect sizes suggests that significant findings for change across time were driven by changes in specific subpopulations of students. Moreover, results showed that students endorsed incremental belief more strongly than entity belief at both the beginning and end of the semester. Furthermore, the magnitude of changes differed based on students’ motivated self-regulated engagement profiles. Additionally, students’ achievement outcomes were weakly predicted by their implicit beliefs of intelligence. Finally, results showed that the relationship between changes in implicit intelligence beliefs and student achievement varied across different CS1 courses. Theoretical implications for implicit intelligence beliefs and recommendations for STEM educators are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
241. SSDTutor: A feedback-driven intelligent tutoring system for secure software development.
- Author
-
Newar, Dip Kiran Pradhan, Zhao, Rui, Siy, Harvey, Soh, Leen-Kiat, and Song, Myoungkyu
- Subjects
- *
INTELLIGENT tutoring systems , *COMPUTER software development , *SYSTEMS software , *COMPUTER software security - Abstract
Application Programming Interfaces (APIs) in cryptography typically impose concealed usage constraints. The violations of these usage constraints can lead to software crashes or security vulnerabilities. Several professional tools can detect these constraints (API misuses) in cryptography; however, in the educational programs, the focus has been less on helping students implement an application without cryptographic API misuses that are caused by either a lack of cryptographic knowledge or programming mistakes. To address the problem, we present an intelligent tutoring approach SSDTutor for educating S ecure S oftware D evelopment. Our tutoring approach helps students or developers repair cryptographic API misuse defects by leveraging an automated program repair technique based on the usage patterns of cryptographic APIs. We studied the best practices of cryptographic implementations and encoded eight cryptographic API usage patterns. For quality feedback, we leverage a clone detection technique to recommend related feedback for helping students understand why their programs are incorrect, rather than blindly accepting repairs. We evaluated SSDTutor on 456 open source subject projects implemented with cryptographic APIs. SSDTutor successfully detected 1,553 out of 1,573 misuse defects with 98.9% accuracy and repaired 1,551 out of 1,573 misuse defects with 99.3% accuracy. In a user study involving 22 students, the participants reported that interactive SSDTutor 's feedback recommendation could be valuable for novice students to learn about the correct usages of cryptography APIs. • An intelligent tutoring approach for educating secure software development. • An automated repair approach for cryptographic API misuse defects. • Eight cryptographic API usage patterns for the best practices of cryptographic implementations. • Quality feedback to understand why programs are incorrect, rather than blindly accepting repairs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
242. Using Data Mining to Predict the Occurrence of Respondent Retrieval Strategies in Calendar Interviewing: The Quality of Retrospective Reports.
- Author
-
Belli, Robert F., Miller, L. Dee, Baghal, Tarek Al, and Soh, Leen-Kiat
- Subjects
- *
PANEL analysis , *DATA mining , *CORRESPONDENCE analysis (Communications) , *RESPONDENTS , *RETROSPECTIVE studies - Abstract
Determining which verbal behaviors of interviewers and respondents are dependent on one another is a complex problem that can be facilitated via data-mining approaches. Data are derived from the interviews of 153 respondents of the Panel Study of Income Dynamics (PSID) who were interviewed about their life-course histories. Behavioral sequences of interviewer-respondent interactions that were most predictive of respondents spontaneously using parallel, timing, duration, and sequential retrieval strategies in their generation of answers were examined. We also examined which behavioral sequences were predictive of retrospective reporting data quality as shown by correspondence between calendar responses with responses collected in prior waves of the PSID. The verbal behaviors of immediately preceding interviewer and respondent turns of speech were assessed in terms of their co-occurrence with each respondent retrieval strategy. Interviewers' use of parallel probes is associated with poorer data quality, whereas interviewers' use of timing and duration probes, especially in tandem, is associated with better data quality. Respondents' use of timing and duration strategies is also associated with better data quality and both strategies are facilitated by interviewer timing probes. Data mining alongside regression techniques is valuable to examine which interviewer-respondent interactions will benefit data quality. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
243. Motivational and Self-Regulated Learning Profiles of Students Taking a Foundational Engineering Course.
- Author
-
Nelson, Katherine G., Shell, Duane F., Husman, Jenefer, Fishman, Evan J., and Soh, Leen‐Kiat
- Subjects
- *
ENGINEERING students , *LEARNING , *MOTIVATION research , *SELF regulation , *COLLEGE student attitudes , *PSYCHOLOGY - Abstract
Background Technical, nonengineering required courses taken at the onset of an engineering degree provide students a foundation for engineering coursework. Students who perform poorly in these foundational courses, even in those tailored to engineering, typically have limited success in engineering. A profile approach may explain why these courses are obstacles for engineering students. This approach examines the interaction among motivation and self-regulation constructs. Purpose (Hypothesis) This project sought to determine what motivational and self-regulated learning profiles engineering students adopt in foundational courses. We hypothesized that engineering students would adopt profiles associated with maladaptive motivational beliefs and self-regulated learning behaviors. The effects of profile adoption on learning and differences associated with student major, minor, and gender were analyzed. Design/Method Five hundred and thirty-eight students, 332 of them engineering majors, were surveyed on motivation and self-regulation variables. Data were analyzed from a learner-centered profile approach using cluster analysis. Results We obtained a five-cluster learning profile solution. Approximately 83% of engineering students enrolled in an engineering-tailored foundational computer science course adopted maladaptive profiles. These students learned less than those who adopted adaptive learning profiles. Profile adoption depended on whether a student was considering a major or minor in computer science or not. Conclusions Findings indicate the motivational and self-regulated learning profiles that engineering students adopt in foundational courses, why they do so, and what profile adoption means for learning. Our findings can guide instructors in providing motivational beliefs and self-regulated learning scaffolds in the classroom. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
244. Predicting similarity judgments in intertemporal choice with machine learning.
- Author
-
Stevens JR and Soh LK
- Subjects
- Adult, Aged, Decision Making, Female, Humans, Male, Middle Aged, Reaction Time, Reward, Time Factors, Young Adult, Algorithms, Choice Behavior, Judgment, Machine Learning
- Abstract
Similarity models of intertemporal choice are heuristics that choose based on similarity judgments of the reward amounts and time delays. Yet, we do not know how these judgments are made. Here, we use machine-learning algorithms to assess what factors predict similarity judgments and whether decision trees capture the judgment outcomes and process. We find that combining small and large values into numerical differences and ratios and arranging them in tree-like structures can predict both similarity judgments and response times. Our results suggest that we can use machine learning to not only model decision outcomes but also model how decisions are made. Revealing how people make these important judgments may be useful in developing interventions to help them make better decisions.
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.