the proceedings contain 141 papers. the topics discussed include: Methodyca: a digital game to teach research methods;challenges and opportunities for designing with biodata as material;cultivating ethics a perspectiv...
ISBN:
(纸本)9781450375795
the proceedings contain 141 papers. the topics discussed include: Methodyca: a digital game to teach research methods;challenges and opportunities for designing with biodata as material;cultivating ethics a perspective from practice;unethically me: explaining artificial intelligence's results by being unethical;empowering the psychosocially vulnerable in a co-creation process with user need cards;building a scaffold for transdisciplinary design processes: helping art-science residencies explore the design space of new technologies;'anyone can print': supporting collaborations with 3d printing services to empower broader participation in personal fabrication;programming for moving bodies;sprinkling diversity: hurdles on the way to inclusiveness in makerspaces;tackling ethical implications of mobile banking product development through the value sensitive design approach;speculative energy futures: post-human design for the energy transition;and introduction to service design for UX designers.
Understanding the research landscape of any domain is of primary importance at all stages of a concept's evolution. Research in the domain of analytics has increased exponentially in the past decade, analytics is ...
详细信息
ISBN:
(纸本)9781665487351
Understanding the research landscape of any domain is of primary importance at all stages of a concept's evolution. Research in the domain of analytics has increased exponentially in the past decade, analytics is a tool being applied to increase effectiveness and efficiency within all domains. Similarly, there are numerous research studies that have applied analytics to the domain of higher education. Assessing research activity is important for planning future research and identifying the way forward to make meaningful contributions. the objective of this paper is to examine the current research in this domain and to identify emerging areas of research to make meaningful contributions. Bibliometric analysis was applied using Scopus. Documents on analytics and higher education keywords in business, accounting and management and published in journals were considered for the analysis. Vos Viewer was used for bibliometric analysis in the area, to identify emerging research themes and to understand the scope of applying analytics in higher education. the search query found 1635 documents when using the keywords of “analytics” and “higher education”. this was further narrowed down to research in Business Management and Accounting and using Journal articles and conference articles, finally yielding 103 articles. After a primary read to remove articles misplaced in the group the final number of articles include for the bibliometric analysis came down to 98. there has been an increase in publications since 2018 with interest increasing post pandemic in the area. the research categories are Student outcomes and perspective, academician outcomes and perspective, design of learning systems, etc. Based on this, it is recommended that research should focus on theoretical aspects of applying analytics to HEIs, ethical issues in data collection, etc..
Medical named entity recognition (NER) and normalization (NEN) are fundamental for constructing knowledge graphs and building QA systems. Existing implementations for medical NER and NEN are suffered from the error pr...
详细信息
Unmanned Aerial Vehicles (UAV), also known as drones, are receiving increasing attention as enablers for many emerging technologies and applications, a trend likely to continue in the next future. In this regard, usin...
详细信息
ISBN:
(纸本)9781728188270
Unmanned Aerial Vehicles (UAV), also known as drones, are receiving increasing attention as enablers for many emerging technologies and applications, a trend likely to continue in the next future. In this regard, using Unmanned Aerial Base Stations (UABSs), i.e. base stations carried by UAVs, is one of the most promising means to offer coverage and capacity in 5G applications to those users that are not being served by terrestrial base stations. In this paper, we propose a novel approach for trajectory design and Radio Resource Management (RRM) in UAV-aided networks using information retrieved from precise Radio Environmental Map (REM) based on Ray Launching (RL) simulations for RF propagation and narrow band estimations. Furthermore, we consider different possible models for antennas to be installed on multiple UABSs as well as proper RRM strategies which are able to take advantage of REM inputs. Simulation results will show the performance achieved by the system for the different approaches and it will compare them withthe previous use of statistical models.
the proceedings contain 30 papers. the special focus in this conference is on computer Supported Education. the topics include: Computational Pedagogy: Block Programming as a General Learning Tool;refacTutor: An Inter...
ISBN:
(纸本)9783030584580
the proceedings contain 30 papers. the special focus in this conference is on computer Supported Education. the topics include: Computational Pedagogy: Block Programming as a General Learning Tool;refacTutor: An Interactive Tutoring System for Software Refactoring;user-Centered design: An Effective Approach for Creating Online Educational Games for Seniors;population Growth Modelling Simulations: Do they Affect the Scientific Reasoning Abilities of Students?;novice Learner Experiences in Software Development: A Study of Freshman Undergraduates;promoting Active Participation in Large Programming Classes;agile Methods Make It to Non-vocational High Schools;testing the Testing Effect in Electrical Science with Learning Approach as a Factor;a Web Platform to Foster and Assess Tonal Harmony Awareness;exploring the Affordances of SimReal for Learning Mathematics in Teacher Education: A Socio-Cultural Perspective;MATE-BOOSTER: design of Tasks for Automatic Formative Assessment to Boost Mathematical Competence;educational Practices in Computational thinking: Assessment, Pedagogical Aspects, Limits, and Possibilities: A Systematic Mapping Study;virtual Reality and Virtual Lab-Based Technology-Enhanced Learning in Primary School Physics;increasing Parental Involvement in computer Science Education through the design and Development of Family Creative Computing Workshops;Retention of University Teachers and Doctoral Students in UNIPS Pedagogical Online Courses;designing Culturally Inclusive MOOCs;evaluation of an Interactive Personalised Virtual Lab in Secondary Schools;potential Benefits of Playing Location-Based Games: An Analysis of Game Mechanics;resolving Efficiency Bottleneck of the Bellman Equation in Adaptive Teaching;ontology-Based Analysis and design of Educational Games for Software Refactoring;in-Game Raw Data Collection and Visualization in the Context of the "thimelEdu" Educational Game.
Traffic flow at urban intersections fluctuates randomly throughout the day. It depends on several dynamic factors and requires adequate regulation and adaptable control strategies in particular for traffic signals reg...
详细信息
Traffic flow at urban intersections fluctuates randomly throughout the day. It depends on several dynamic factors and requires adequate regulation and adaptable control strategies in particular for traffic signals regulation. this paper deals withthis problem, and our proposal focuses on the adaptive management of traffic lights within urban intersections. To do so, Timed Synchronized Petri Nets (TSPNs) models are first developed to model and study the system behaviour. then a real-time adaptive control strategy is proposed for traffic regulation within urban signalized intersections. the control logic is shared between two communicating components of the system. the slaves (TSPNs sub-models) control the traffic signals displays, phases transitions, and traffic flow fluctuations. the master (controller) decides and selects the next phase that should be serviced and determines its green light duration. Due to the used modularity approach, the developed models decrease the modelling complexity, and more importantly, they can be adapted easily to a cluster of intersections. Furthermore, various traffic signal control strategies could be implemented using these models. Moreover, some simulations are performed, and the obtained results are analysed and discussed. Our control strategy is validated through these simulation results. (C) 2020 the Authors. Published by Elsevier B.V.
New low-pass filter (LPF) architectures based on differential difference operational amplifiers (DDOA) are studied in this paper. the feature of the proposed LPF is that when tuning the cut-off frequency, the LPF gain...
详细信息
A compact broadband dual-polarized antenna is proposed for 3G/4G/5G base station applications. the main radiator is composed of two crossed dipoles contoured by cubic Hermite spline interpolation method to obtain comp...
详细信息
the session management mechanism is a source of several threats to the security of web applications. While lots of web-based software vulnerabilities are due to weaknesses in session management design and implementati...
详细信息
ISBN:
(纸本)9781665402095
the session management mechanism is a source of several threats to the security of web applications. While lots of web-based software vulnerabilities are due to weaknesses in session management design and implementation, existing methods and tools still have considerable limitations to fully detect those vulnerabilities. In this paper, a black-box method is presented to detect session management vulnerabilities by analyzing browser-server traffic. We have identified some features in the traffic related to the security of session management. the features are either dependent on or independent of languages and programming frameworks. they are the leaves of our constructed attack tree upon which we assess the total risk of session vulnerabilities for a web application. Our simple yet effective idea results in more accurate detection of session vulnerabilities compared to well-known vulnerability scanners. Our experimental evaluations on several case studies confirm the effectiveness of our approach in terms of its vulnerability detection as well as in its risk assessment.
the proceedings contain 18 papers. the topics discussed include: hofstede and hobbitses: generational evolution of power distance and masculinity in UK in popular literature;a gesture elicitation study for selection o...
ISBN:
(纸本)9781450389440
the proceedings contain 18 papers. the topics discussed include: hofstede and hobbitses: generational evolution of power distance and masculinity in UK in popular literature;a gesture elicitation study for selection of nail size objects in a dense and occluded dense HMD-VR;towards the identification of dark patterns: an analysis based on end-user reactions;design opportunities for supporting elderly in India in managing their health and fitness post-COVID-19;sidekicks and society – a study of the generational evolution of values in UK?s society through minor characters in popular English literature;exploring bi-modal feedback in augmented reality;rethinking design of digital platforms for emergent users: findings from a study with rural Indian farmers;what do teachers seek? a study into understanding the needs of teachers who educate children with visual impairments;and Kyro: persuading students to be productive using a virtual companion.
暂无评论