OpenGadda is an ambitious project that aims to handle the oftentimes discussed problematic of copyright, in the textual scholarship field, through the employment of all the - freely accessible - data and metadata rela...
详细信息
ISBN:
(纸本)9783031724398;9783031724404
OpenGadda is an ambitious project that aims to handle the oftentimes discussed problematic of copyright, in the textual scholarship field, through the employment of all the - freely accessible - data and metadata related to a specific author. Furthermore, this project will involve the creation of a future paradigm and model that will further showcase the shift from a media-oriented perspective to a data-oriented one and explore the concepts ofwork and document in the digital era and what they entail in this specific case, the one of Carlo Emilio Gadda, as none of the Gadda's works are currently available freely to the public due to copyright laws. To obviate this problem, it was chosen to proceed by creating a collection of digital reproductions of different publicly available documents of this author, enhanced through the tools of data visualization and storytelling;specifically, the project focused on the author's archives and library.
Designing serious games or serious game activities requires mapping the educational elements and the game elements. This mapping is mainly addressed from a high-level game design perspective. Moreover, low-level mappi...
详细信息
ISBN:
(纸本)9783031490644;9783031490651
Designing serious games or serious game activities requires mapping the educational elements and the game elements. This mapping is mainly addressed from a high-level game design perspective. Moreover, low-level mapping methods are generally domain-specific. Our aim is to address this problem, at an algorithmic level, in the context of activity generation (i.e., automatic creation of activities) for declarative knowledge training. This paper presents a generic modelling approach of questioned facts and gameplays, and an algorithm for the automatic and domain-independent generation of various gameplays for training purposes. The approach has been applied to multiplication tables training.
The rapid growth of the aging population and the increasing digitization of processes and services have underscored the necessity for the digital inclusion of older adults. This challenge has evolved into a human righ...
详细信息
ISBN:
(纸本)9783031615429;9783031615436
The rapid growth of the aging population and the increasing digitization of processes and services have underscored the necessity for the digital inclusion of older adults. This challenge has evolved into a human rights issue, as it empowers older adults to access opportunities provided by technological advancements and, in turn, exercise their rights. While the disciplines of gerontology and human-computer interaction (HCI) individually address the digital inclusion of older people, they often fail to engage in dialogue. In this context, we propose the concept of educational gerontechnology intending to foster interdisciplinary collaboration between gerontology, HCI, and the human rights approach. We first address each of the threemain topics for educational gerontology. Then, we present a comprehensive model for the digital inclusion of older adults, emphasizing that educational gerontechnology encompasses the study and practice of educational initiatives focused on the relationship between technology, old age, and aging. Finally, we discuss future directions in this area.
Assessing teams and providing feedback on scenario-based training typically requires human observers or scenario-specific metrics crafted by experts, due to the complexity of general-purpose automated tools to assess ...
详细信息
ISBN:
(纸本)9783031606083;9783031606090
Assessing teams and providing feedback on scenario-based training typically requires human observers or scenario-specific metrics crafted by experts, due to the complexity of general-purpose automated tools to assess team performance. Machine learning can help infer team performance patterns, but labeled data for a specific training scenario is often sparse. To address this issue, the Semi-Supervised Learning for Assessing Team Simulations (SLATS) project investigated the feasibility of semi-supervised learning and transfer learning which leverages training data from related scenarios to classify performance on a target scenario with the same metrics but a different terrain context. To this approach, we analyzed performance of teams in the first-person shooter Team Fortress 2 (TF2). TF2 teams for the "Capture Point" mode were classified into archetypes based on the performance of the team and the performance of individual members of the team across the corpus: novice, weak link, team of experts, and expert team. To investigate the feasibility of transfer learning, we isolated matches from two of the most frequent maps/terrains. Results found that leveraging data from the source map always improved classification F1-scores compared to relying solely upon target (test) map training data. The greatest benefits were observed when target data was limited (0 to 42 target examples). While further research is required to explore the effectiveness of transfer learning across training scenarios that are more dissimilar (e.g., different simulations, rather than just different maps), these results offer a promising direction to help bootstrap team assessments on new training scenarios by leveraging data from earlier, comparable scenarios. However, efficiently calculating reusable metrics for model features based on low-level scenario events and logs remains a challenge that requires further research.
Law enforcement agencies continue to deploy new surveillance, identification and tracking technologies that tend to intrude on privacy. These include Wi-Fi-based location tracking methods that take advantage of the fa...
详细信息
ISBN:
(纸本)9783031610882;9783031610899
Law enforcement agencies continue to deploy new surveillance, identification and tracking technologies that tend to intrude on privacy. These include Wi-Fi-based location tracking methods that take advantage of the fact that Wi-Fi enabled devices exchange data with each other even when they are not connected. At very short intervals, probe requests are sent to all surrounding devices. The contents of the data packets include the MAC addresses and preferred SSID lists, which can provide information about the daily behaviour of the users. The scenario to be considered is initially limited and, due to technical and legal complexity, narrowed down to the domestic domain and the privacy issues are discussed using the example of intrusion detection. In view of the difficulty of defining the perimeter, the spatial and temporal limitations depending on the personal data and, above all, the information obligations and opt-out solutions will be discussed.
Online video learning platforms have broadened access to learning but often struggle to offer personalized, context-sensitive support when learners encounter complex, tightly-knit concepts, particularly from the STEM ...
详细信息
ISBN:
(纸本)9783031723148;9783031723155
Online video learning platforms have broadened access to learning but often struggle to offer personalized, context-sensitive support when learners encounter complex, tightly-knit concepts, particularly from the STEM fields. This paper presents Curio, a novel help-seeking system capable of being integrated into existing video learning environments. Utilizing a platform-agnostic approach, Curio leverages Tesseract OCR and GPT-4 to provide real-time, personalized video recommendations and concept explanations. When confronted with complex content, learners can "capture" any on-screen text-based elements to instantly receive targeted assistance and continue their educational journey without diverting their focus to external resources. A controlled user study, comprising both quantitative measurements and qualitative interviews, was conducted with twenty-two participants to assess Curio's efficacy in enhancing help-seeking experiences. The study revealed that Curio reduced the friction and decreased mental workload involved in the help-seeking process while maintaining effectiveness. A post-hoc analysis further revealed a correlation between learners' prior knowledge and their performance with Curio.
Designers or consumers cannot easily identify their preferred designs from such a large searching space of designs. Thus, the problem of this research is how designers or consumers generate designs based on their touc...
详细信息
ISBN:
(纸本)9783031601064;9783031601071
Designers or consumers cannot easily identify their preferred designs from such a large searching space of designs. Thus, the problem of this research is how designers or consumers generate designs based on their touch-feeling Kansei vocabularies. This research features a Kansei vocabulary experiment in which critical form-related parameters of bottles are imported into the Grasshopper platform for the creation of experimental samples that respond to user touch-feelings in product forms. The generative design system outcomes reflect consumers' tactile perceptual needs, and the associated Kansei vocabulary can be deployed as vectors for executing bottle modifications. Thus, designers and users can benefit from a faster, more straightforward, and more intuitive process to create product designs tailored to consumers' touch-feeling preferences.
Emerging digital technologies, such as algorithms and machine learning, offer transformative opportunities to public sector organizations but also pose ethical risks and dilemmas. Public sector organizations adopting ...
详细信息
ISBN:
(数字)9783031708046
ISBN:
(纸本)9783031708039;9783031708046
Emerging digital technologies, such as algorithms and machine learning, offer transformative opportunities to public sector organizations but also pose ethical risks and dilemmas. Public sector organizations adopting these technologies need to govern their ethical implications. This research provides insights into the emerging phenomena of digital ethics commissions within Dutch public sector organizations. Composed of external experts on ethics, technology, and governance, these commissions are meant to reflect, advise, and, in some cases, assess the ethical design and use of emerging digital technology and the governance thereof. Through interviews and document analysis, this research explores the motivations, intentions, and perceptions guiding these commissions. Our preliminary findings suggest that, while digital ethics commissions are meant to convey legitimacy, they can also provide external knowledge, open the organizations for reflection from and with society, and contribute to different types of control. In establishing these commissions, government organizations need to balance the formalization of digital ethics governance with the need for a collaborative and reflective ethical practice conducive to (organizational) learning and ethics as contextual practice. This research contributes empirical insights into how public sector organizations address ethical challenges from emerging digital technologies, offering valuable implications for both practitioners and scholars in the field of public administration.
In the context of digital transformation (DX) worldwide, the digitization of factory systems is advancing and digital connections between supply chains are increasing. For example, sharing order and delivery informati...
详细信息
ISBN:
(数字)9783031621390
ISBN:
(纸本)9783031621383;9783031621390
In the context of digital transformation (DX) worldwide, the digitization of factory systems is advancing and digital connections between supply chains are increasing. For example, sharing order and delivery information and sharing CO2 emissions from factories as a decarbonization effort increases for achieving SDGs. With the increase in digital connections, the cybersecurity risks of factory systems are also increasing, and there have been many incidents of factories being shut down due to ransomware attacks. Large enterprises such as critical infrastructure (CI) can allocate budgets for cybersecurity and hire personnel, including outsourcing, but small and medium-sized enterprises(SMEs) making up the supply chain find it difficult to secure budgets and personnel. This paper presents a simplified and easy risk assessment method for factory systems using the checklist which has only 32 items from Japanese government. It provides support to SMES to improve their cybersecurity readiness of factory assets with lower cost. For the purpose, we newly developed the web based diagnostic tool of the checklist showing the risk score. We confirmed the tool provides the rough grasping of cybersecurity readiness from interviews. We also observed that 80% of the respondents indicate insufficient readiness. The easy risk visualization will help SMEs to allocate the appropriate budget and resources.
In this study, we developed a robot that encourages multi-party human conversations and helps participants to deal with silences. We consider three types of robot behavior, i.e., (1) encouraging talk by specific indiv...
详细信息
ISBN:
(纸本)9783031613524;9783031613531
In this study, we developed a robot that encourages multi-party human conversations and helps participants to deal with silences. We consider three types of robot behavior, i.e., (1) encouraging talk by specific individuals (the you condition), (2) encouraging talk by all participants (the all-of-you condition), and (3) promoting talk among us (the we condition). We evaluated whether the robot elicits participant's attitudes of working together toward one purpose by both conversational analysis and a five-point scale question. In this paper, we revealed that the robot elicits participant's playful, cooperative, and pondering behaviors appropriate to different circumstance in silence and will contribute to design conversation enhance robot's behaviors that enable participants to break silence and keep conversations going.
暂无评论