This paper deals with the structure of a musical piece. The score is modeled as an Abstract Syntactic Tree (AST) to account for the hierarchy of its elements. Formal definitions of harmony, texture and instrumentation...
详细信息
ISBN:
(纸本)9783031606373;9783031606380
This paper deals with the structure of a musical piece. The score is modeled as an Abstract Syntactic Tree (AST) to account for the hierarchy of its elements. Formal definitions of harmony, texture and instrumentation are proposed and constitute the main components of the model. Concatenation and parallelization operators are then proposed to combine these components and organize them in a tree structure. This approach is illustrated on some examples.
Public sector AI adoption is rapidly increasing as AI-based solutions are implemented in various domains. These solutions typically address existing problems within the public sector organizations' core missions a...
详细信息
ISBN:
(纸本)9783031702730;9783031702747
Public sector AI adoption is rapidly increasing as AI-based solutions are implemented in various domains. These solutions typically address existing problems within the public sector organizations' core missions and are generally seen as offering opportunities to increase operational quality and efficiency. This is for instance done through augmentation of decision-making processes and case handling activities. However, despite these aspirations, nascent research indicates that the anticipated outcomes often fail to materialize. The development and implementation of public sector AI-based solutions is laden with complex technological and legal challenges that often divert attention away from realizing actual business value. Drawing from formal and informal project documentation from a high-profile AI augmentation initiative at the Swedish Social Insurance Agency (SIA), we identify five dimensions that illustrate how technological advancement may prosper at the cost of business value realization in public sector AI initiatives.
Information graphics, or infographics, combine elements of date visualization with design and have become an increasingly popular mean for disseminating information. In traditional media, the lack of interactivity in ...
详细信息
ISBN:
(纸本)9783031613500;9783031613517
Information graphics, or infographics, combine elements of date visualization with design and have become an increasingly popular mean for disseminating information. In traditional media, the lack of interactivity in static infographics imposes limitations on information capacity, display space and user perspectives. When dealing with a large or complex amount of information, readability and comprehension can become challenging. However, due to the vast amount of information embedded in traditional cultures, it is challenging to fully showcase on a limited screen space. Therefore, adopting interactive infographics proves to be an effective method for inheriting and promoting traditional cultures. By employing various interactive modes, it presents the diversity and essence of cultures, allowing audiences to intuitively grasp historical and cultural information. This study, based on indepth interactive design methods, delineates eight types of infographics and potential interactive modes. Through concrete design practices and test evaluations, it empirically supports the exploration of interactive modes. The research aims to enhance user engagement, optimize information communication, and adapt to user needs and habits, thereby fostering a broader application of information graphics in cultural heritage.
With the development of technology, online teaching systems are resorted to in the purpose of improving the teaching efficiency, which is closely related to students' participation in the aiding online systems. Wh...
详细信息
ISBN:
(纸本)9789819742424;9789819742431
With the development of technology, online teaching systems are resorted to in the purpose of improving the teaching efficiency, which is closely related to students' participation in the aiding online systems. What are the factors influencing students' using of the online systems? To answer this question, this study, in the light of Dornyei's theory, proposed four hypotheses concerning the influencing factors of second language learning motivation. It introduced the Fif online speaking training system in the speaking course Audio-Visual-Oral Business English, and designed four tasks according to the four hypotheses to see students' participation in the tasks. By carefully examining the data collected, this study found that the hypothesized motivational factors, including the students' desire, positive feedback from the teacher, relevancy with the in-class learning content and the requirement of the course did work in their post-class autonomous learning which is seen through their completion of the online speaking task. It is observed that the students made efforts to narrow the discrepancy between the real self and the possible self of future as competent second language users. Besides, negative self-suggestion would lead to the poor performance in completing the online exercise. Based on the results and findings, how to better engage the learners in their online training is further discussed.
The digitalization of the modern society has made many organizations susceptible to cybercrime through exploitations of software vulnerabilities. The popular web servers Apache HTTP and Nginx make up around 65% of the...
详细信息
ISBN:
(数字)9783031621390
ISBN:
(纸本)9783031621383;9783031621390
The digitalization of the modern society has made many organizations susceptible to cybercrime through exploitations of software vulnerabilities. The popular web servers Apache HTTP and Nginx make up around 65% of the market for web server software and power the majority of all websites on the internet. Vulnerabilities that occur in these two software programs therefore pose a significant risk to the millions of users. This paper maps the most common vulnerability types in these web servers by retrieving, filtering, and analyzing information related to around 195,000 reported vulnerabilities. The results not only show that 5 vulnerability types according to the NIST classification, namely CWE-20, CWE-200, CWE-22, CWE-79, and CWE-787, account for almost 25% of all reported vulnerabilities in Apache HTTP and Nginx, but also that these vulnerability types are commonly found in other web software as well. The outcomes of this study are useful for constructing proof-of-concept insecurity demonstrations and for applying in awareness exercises and cybersecurity education.
MedDbriefer is a web based ITS designed to enable healthcare students to do clinical scenarios anytime, anywhere. While one student "voice treats" a scenario's patient(s) as the leader of a mock Emergenc...
详细信息
ISBN:
(纸本)9783031630279;9783031630286
MedDbriefer is a web based ITS designed to enable healthcare students to do clinical scenarios anytime, anywhere. While one student "voice treats" a scenario's patient(s) as the leader of a mock Emergency Medical Services (EMS) team, a peer records the team's actions by using the system's checklists, on a tablet. When the scenario ends, MedDbriefer analyzes the event log and generates a debriefing. MedDbriefer also provides a platform for research on simulationbased training. This paper describes how the system's debriefing engine could be extended to deliver feedback during a scenario, as well as afterwards. MedDbriefer could then be used to compare the effectiveness of different ways of timing feedback delivery in computer-based simulation systems.
Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the attacks on Tor's anonymity occur when an adversary can intercept ...
详细信息
ISBN:
(纸本)9783031477539;9783031477546
Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the attacks on Tor's anonymity occur when an adversary can intercept a user's traffic;it is thus useful to limit how much of a user's traffic can enter potentially adversarial networks. Recent work has demonstrated that careful circuit creation can allow users to provably avoid geographic regions that a user expects to be adversarial. These prior systems leverage the fact that a user has complete control over the circuits they create. Unfortunately, that work does not apply to onion services (formerly known as "hidden services"), in which no one entity knows the full circuit between user and hidden service. In this work, we present the design, implementation, and evaluation of DeTorOS, the first provable geographic avoidance system for onion services. We demonstrate how recent work to build and deploy programmable middleboxes onto the Tor network allows us to take existing techniques like these and deploy them in scenarios that were not possible before. DeTorOS is immediately deployable as it is built using programmable middleboxes, meaning it does not require either the Tor protocol or its source code to be modified. This work also raises a number of interesting questions about extensions of provable geographical routing to other scenarios and threat models, as well as reinforces how the notion of programmable middleboxes can allow for the deployment of both existing and new techniques in novel ways in anonymity networks.
The worldwide spread of the COVID-19 since 2020 has led to a surge in demand for remote conference interpreting. This emerging trend poses a number of risks and challenges for interpreters, conference organisers, inte...
详细信息
ISBN:
(纸本)9789819742455;9789819742462
The worldwide spread of the COVID-19 since 2020 has led to a surge in demand for remote conference interpreting. This emerging trend poses a number of risks and challenges for interpreters, conference organisers, interpretation services, and equipment providers. Drawing upon the practical knowledge of conference interpreters who have engaged in remote simultaneous interpretation, the present article scrutinises seven types of potential risks and obstacles that remote interpreting poses to interpreters. From the interpreters' standpoint, the article also puts forth corresponding remedies and recommendations to facilitate their seamless transition to this novel working modality. The model can inspire interpreting practice and education of interpreter trainees in the post-pandemic world.
Measurement of teachers' digital maturity can be useful in diagnosing technology adoption in education and in supporting teachers' professional development. However, there is a lack of easily usable tools in t...
详细信息
ISBN:
(纸本)9783031723148;9783031723155
Measurement of teachers' digital maturity can be useful in diagnosing technology adoption in education and in supporting teachers' professional development. However, there is a lack of easily usable tools in the existing literature. By investigating the most effective ways to measure teachers' digital maturity, our research aims to fill this gap. The focus of this article is on a data-driven approach to the assessment of digital maturity in education. Following a process similar to teaching analytics (data collection, data modeling, data understanding and visualization, and contextual understanding), we draw on diary data collected from 12949 French primary school teachers using a virtual learning environment (VLE) during the 2022-2023 school year. Specifically, the paper presents results related to modeling and visualizing data. To this end, we propose a critical analysis of two automatic classification techniques, one supervised rule-based and the other unsupervised (hierarchical clustering). In addition to providing different scales to measure, we have proposed a new approach to diagnose and visualize digital maturity. In this way, the method provides insight into the diversity and intensity of technology use, contributing to a better understanding of digital maturity and providing a practical tool for assessing day-to-day teaching practices.
The confirmed interest of the scientific community, the conspicuous investments of the major stakeholders and the reflections that have matured as a result of the extensive use of distance learning seem to suggest tha...
详细信息
ISBN:
(数字)9783031574023
ISBN:
(纸本)9783031574016;9783031574023
The confirmed interest of the scientific community, the conspicuous investments of the major stakeholders and the reflections that have matured as a result of the extensive use of distance learning seem to suggest that the horizon of a metaverse for the educational context is becoming sharper and closer. Many of the peculiarities of distance education that a few years ago might have seemed ancillary or palliative are now necessary and decisive. One of the greatest efforts made by scientific research in recent years has been to untangle the potential and problems of Edu-Metaverse from the tangle resulting from a structural formulation that contemplates advanced and interconnected technologies. In the first part of the paper, the causes that require the development of a new educational-didactic model are taken up. Then, some possible technology-learning theory pairings are identified to support the Edu-Metaverse. Finally, an attempt will be made to verticalise by identifying possible challenges for Artificial Intelligence developments in Biometrics.
暂无评论