This study investigates how different content modalities, like images and text, contribute to mobilizing support and driving engagement in collective action campaigns that thrive on multimedia representation propelled...
详细信息
ISBN:
(纸本)9783031722400;9783031722417
This study investigates how different content modalities, like images and text, contribute to mobilizing support and driving engagement in collective action campaigns that thrive on multimedia representation propelled by social media. Focusing on the 2022 Brazilian insurrection, it examines how escalating outrage and shifting sentiments manifested online during societal flashpoints. Grounding the analysis in Resource Mobilization Theory and Moral Foundations Theory, it explores how texts and images contributed to collective identity formation, understanding emotion and morality's role in mobilizing audiences. A socio-technical approach analyzed emotion and moral dimensions in Instagram posts by analyzing protest networks to identify influential agents. Findings demonstrated text and image captions playing crucial roles in collective identity formation and mobilization, with morally charged responses of rage and victimization driven by influential agents circulating reinforcing multimedia.
This study reviews the unresolved identifiable victim effect (IVE) issues. IVE indicates that people are more willing to help an identified victim than to an unidentified number of victims, such as statistical informa...
ISBN:
(纸本)9783031552441;9783031552458
This study reviews the unresolved identifiable victim effect (IVE) issues. IVE indicates that people are more willing to help an identified victim than to an unidentified number of victims, such as statistical information. Previous studies have demonstrated the robustness of this phenomenon. However, existing studies on IVE have been conducted primarily in Western cultures and their applicability to East Asian cultures has not been sufficiently examined. Recently, some studies have begun to explore cultural differences in IVE and have suggested that IVE may be less likely to occur in East Asian cultures which exhibit a predominantly interdependent construal of self, compared to Western cultures which exhibit a predominantly independent construal of self. This is the first study to confirm the mechanism of IVE and the methods used to suppress it. Furthermore, studies on meta-analyses and cultural differences in IVE are reviewed, and prospects are discussed.
Representations of early childhood children and their development of computational thinking skills while tangibly programming a robot are presented in this study. Data was taken from multiple case studies in preschool...
详细信息
ISBN:
(纸本)9783031552441;9783031552458
Representations of early childhood children and their development of computational thinking skills while tangibly programming a robot are presented in this study. Data was taken from multiple case studies in preschool settings. Research protocols recorded children's representations in individual basis semi-structured interviews in pre and post-sessions of an almost monthly educational intervention delivered by teachers in their classrooms. Some examples of depictions on children's drawings will also be presented, showing children's learning development in their computational thinking skills. The results show that while children attribute an animate identity to a robot, at the same time, they state and depict data for its properties and basic functional features.
Public procurement requires careful preparation of tender documents that must comply with regulatory requirements and the tendered items' specifications. Later, when the bids are received, they need to be diligent...
详细信息
ISBN:
(纸本)9783031682100;9783031682117
Public procurement requires careful preparation of tender documents that must comply with regulatory requirements and the tendered items' specifications. Later, when the bids are received, they need to be diligently evaluated for compliance. All these steps involve significant manual effort from the subject matter experts (SME). The bid evaluation alone takes several days to complete, often leading to delays and cost overruns. We present a system design that leverages LLMs to significantly reduce the bid analysis and evaluation effort. Traditional methods often struggle with extracting nuanced information and understanding complex relationships within bid documents. Our proposed system addresses these challenges by integrating LLMs for contextual understanding and retrieval-augmented generation for precise query answering. We present a comprehensive system design, highlighting its innovative features and potential for advancing information analysis tasks in tender bid evaluation. We have evaluated our system on diverse tenders data available through Indian e-procurement portals [2]. Our experiments show that our system is able to reduce the bid compliance check time from hours to seconds.
This paper investigates the application of Intelligent Tutoring Systems (ITS) in facilitating the acquisition of complex cognitive skills within the context of Riichi Mahjong. Riichi Mahjong, also known as Japanese Ma...
详细信息
ISBN:
(纸本)9783031723117;9783031723124
This paper investigates the application of Intelligent Tutoring Systems (ITS) in facilitating the acquisition of complex cognitive skills within the context of Riichi Mahjong. Riichi Mahjong, also known as Japanese Mahjong, is a domain where singular actions are the result of complex cognitive processes. Utilizing Cognitive Task Analysis (CTA), we have constructed an expert cognitive model and developed an ITS that breaks down these actions into subgoals and subsequently into Knowledge Components (KCs). A pilot observational study provided preliminary evidence of the ITS's effectiveness in improving skill acquisition. By analyzing learning curves with DataShop and applying the Multi-method Approach to Data-Driven Redesign (MADDRED), we present the proposed ITS redesign to address over-practice. Our future research agenda is to conduct a randomized controlled trial to assess the efficacy of the original versus the redesigned ITS. This study contributes to the broader discourse on the efficacy of ITS in teaching skills where complex cognition manifests in singular actions, paving the way for future advancements in intelligent tutoring across various domains.
This paper introduces an innovative analytical method for visualising research libraries, overcoming the limitations of the assumptions made by their classification systems. The approach combines user loan data with d...
详细信息
ISBN:
(纸本)9783031724367;9783031724374
This paper introduces an innovative analytical method for visualising research libraries, overcoming the limitations of the assumptions made by their classification systems. The approach combines user loan data with deep mapping techniques to graphically display usage patterns and thematic clusters. Dimensionality reduction is used to visualise the catalogue by book loans, and prompt engineering with large language models is used to describe loan clusters with detailed summaries and titles. This approach was applied to the library collection owned by Bibliotheca Hertziana, a renowned research institute for art history based in Rome. The final output was assessed by a group of experts through interviews supported by an atlas providing statistical information on clusters. This yielded promising results towards a more general framework for visually mapping textual collections and capturing their transformation and usage from an interdisciplinary perspective.
This study examined the validity of early math skills as predictors of literacy skills. Data was collected from students using a home-based kindergarten readiness program. Performance on math domain metrics within a k...
详细信息
ISBN:
(纸本)9783031630279;9783031630286
This study examined the validity of early math skills as predictors of literacy skills. Data was collected from students using a home-based kindergarten readiness program. Performance on math domain metrics within a kindergarten readiness programwas used to generate models predicting scores and grade equivalence on an end of year literacy assessment. Scores on math strands were highly correlated with later reading performance. Performance on math and science metrics were also valid predictors for students reaching literacy benchmarks. This study highlights the interdependence of learning domains while noting areas, such as language concepts, where math performance is a comparatively poor predictor.
This study examines the potential and effectiveness of multimodal interaction techniques to enhance the accessibility of digital products for older adults. By integrating information from multiple sensory channels suc...
详细信息
ISBN:
(纸本)9783031615450;9783031615467
This study examines the potential and effectiveness of multimodal interaction techniques to enhance the accessibility of digital products for older adults. By integrating information from multiple sensory channels such as visual, auditory, and tactile, multimodal interaction aims to reduce older adults' reliance on a single sense and provide a more intuitive and flexible interaction experience. The research methodology includes a literature review and an empirical study that evaluates the effectiveness of the technology in actually improving the use of smart devices by older adults. The results show that multimodal interaction significantly improves usage efficiency and reduces error rates. The study proposes optimization principles for multimodal interaction interfaces designed for the elderly, and it is expected that through in-depth research and application, the design of digital products will be more inclusive, meet the special needs of the elderly, and promote their social participation.
Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. In PCNs, a sender can route a multi-hop payment to a receiver via intermediaries. Yet, Lightning, the only prominent paym...
详细信息
ISBN:
(纸本)9783031477508;9783031477515
Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. In PCNs, a sender can route a multi-hop payment to a receiver via intermediaries. Yet, Lightning, the only prominent payment channel network, has two major issues when it comes to multi-hop payments. First, the sender decides on the path without being able to take local capacity restrictions into account. Second, due to the atomicity of payments, any failure in the path causes a failure of the complete payment. In this work, we propose Forward-Update-Finalize (FUFi): The sender adds redundancy to a locally routed payment by initially committing to sending a higher amount than the actual payment value. Intermediaries decide on how to forward a received payment, potentially splitting it between multiple paths. If they cannot forward the total payment value, they may reduce the amount they forward. If paths for sufficient funds are found, the receiver and sender jointly select the paths and amounts that will actually be paid. Payment commitments are updated accordingly and fulfilled. In order to guarantee atomicity and correctness of the payment value, we use a modified Hashed Time Lock Contract (HTLC) for paying that requires both the sender and the receiver to provide a secret preimage. FUFi furthermore is the first local routing protocol to include fees and specify a fee policy to intermediaries on how to determine their fair share of fees. We prove that the proposed protocol achieves all key security properties of multi-hop payments. Furthermore, our evaluation on both synthetic and real-world Lightning topologies shows FUFi outperforms existing algorithms in terms of fraction of successful payments by about 10%.
Generative Adversarial Networks (GANs) are increasingly adopted by the industry to synthesize realistic images using competing generator and discriminator neural networks. Due to data not being centrally available, Mu...
详细信息
ISBN:
(纸本)9783031477508;9783031477515
Generative Adversarial Networks (GANs) are increasingly adopted by the industry to synthesize realistic images using competing generator and discriminator neural networks. Due to data not being centrally available, Multi-Discriminator (MD)-GANs training frameworks employ multiple discriminators that have direct access to the real data. Distributedly training a joint GAN model entails the risk of free-riders, i.e., participants that aim to benefit from the common model while only pretending to participate in the training process. In this paper, we first define a free-rider as a participant without training data and then identify three possible actions: not training, training on synthetic data, or using pre-trained models for similar but not identical tasks that are publicly available. We conduct experiments to explore the impact of these three types of free-riders on the ability of MD-GANs to produce images that are indistinguishable from real data. We consequently design a defense against free-riders, termed DFG, which compares the performance of client discriminators to reference discriminators at the server. The defense allows the server to evict clients whose behavior does not match that of a benign client. The result shows that even when 67% of the clients are free-riders, the proposed DFG can improve synthetic image quality by up to 70.96%, compared to the case of no defense.
暂无评论