the COVID-19 pandemic and the consequent introduction of virtual collaboration have introduced educators to unexpected situations and challenges. One of these challenges is social distance, which minimizes knowledge o...
详细信息
ISBN:
(纸本)9798350322590
the COVID-19 pandemic and the consequent introduction of virtual collaboration have introduced educators to unexpected situations and challenges. One of these challenges is social distance, which minimizes knowledge of another person's character, and leaves room for misconceptions. Perceptions of a person's personality are also referred to as dispositional attributions and, when misplaced, impact the educator-student dynamics. this paper studies dispositional attributions exhibited by softwareengineering educators in higher education and aims to raise awareness of potential misconceptions affecting the educator-student relationship caused by the virtual setting. We performed an exploratory case study in a practical university course with twelve distributed softwareengineering teams, each led by one or two educators. the course was conducted entirely virtually during the COVID-19 pandemic. the research process included discovering, categorizing, and modeling attribution-based personas, followed by qualitative and quantitative research methods of semi-structured interviews and survey questionnaires. these personas represent the subjects of potential misconceptions and encapsulate typical behaviors and attributions. Our research created seven personas: the Unprofessional, Ego is the Enemy, the Detached, the Loner, the Underperformer, Hiding but not Seeking, and Distraction Monster. these personas differ primarily in terms of character traits and motivation attributed to them. the results provide evidence that the virtual setting of the course can lead to several dispositional attributions. Educators in virtual softwareengineering settings should be aware of these attributions and their potential impact on the educator-student relationship.
OpenEHR archetypes are standardized frameworks designed to model clinical information in healthcare systems, enabling a consistent and integrated representation of complex data. these models encompass common clinical ...
详细信息
Amid the transformative advancements of Generative Adversarial Networks (GANs) in machine learning, a pertinent challenge arises: discerning real instances from synthetic ones. this research introduces a novel neural ...
详细信息
the term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. the provision of computing services, including sto...
详细信息
Exponential AI development requires an adaptation to new technology by traditionally reluctant architects and allied practitioners. this paper examines the potential of the software design pattern (SDP) model, used in...
详细信息
ISBN:
(纸本)9789887891819
Exponential AI development requires an adaptation to new technology by traditionally reluctant architects and allied practitioners. this paper examines the potential of the software design pattern (SDP) model, used in softwareengineering to capture and reapply designs, as one underpinning. Patterns have creativity and pedagogical benefits in parametric modelling, yet consideration of AI and broader design computing as well as the derivation and versatility implied by an SDP model are underexamined. this research questions how, in an AI context, new patterns may evolve for varied AI levels and non-geometrical features. It is undertaken in the Unity game engine with critical application of two prominent extant patterns as a computational workflow design response to a real-world citizen engagement scenario. A novel, feature-agnostic pattern is derived with a simple AI model and is verified for other AI models. the work concludes design computing patterns can abstract existing pattern knowledge to flexibly evolve and apply across rapidly changing AI-enabled design computing contexts and thereby assist practitioners to positively respond to AI advances.
this study investigates the efficacy of Latent Dirichlet Allocation (LDA) and PyLDAvis in analyzing feedback from final-year engineering students. By dissecting responses to strategically selected questions, we identi...
详细信息
ISBN:
(纸本)9783031734762;9783031734779
this study investigates the efficacy of Latent Dirichlet Allocation (LDA) and PyLDAvis in analyzing feedback from final-year engineering students. By dissecting responses to strategically selected questions, we identify key themes that include collaboration, innovation, and technical skills development. this research provides actionable insights for educators to refine teaching strategies and curriculum design to align with industry trends and student experiences. Our findings underscore the unique capabilities of LDA and PyLDAvis in capturing and visualizing students' nuanced perspectives, thereby offering a valuable tool for enhancing responsive engineering education.
Construction waste is becoming a problem day by day, with ever changing human needs, architecture styles;wear 'n tear and many other reasons. Rapid industrial development and disregard towards the environmental he...
详细信息
In order to effectively solve the problem of model cold start, the recommendation system was introduced into the knowledge graph., but it is difficult to obtain accurately user's preference because of strong noise...
详细信息
作者:
Shang, JunZhang, HanwenRao, WeixiongHong, YiguangTongji Univ
Frontiers Sci Ctr Intelligent Autonomous Syst Shanghai Inst Intelligent Sci & Technol Natl Key Lab Autonomous Intelligent Unmanned Syst Shanghai 200092 Peoples R China Tongji Univ
Dept Control Sci & Engn Shanghai 200092 Peoples R China Univ Sci & Technol Beijing
Sch Automat & Elect Engn Key Lab Knowledge Automat Ind Proc Minist Educ Beijing 100083 Peoples R China Tongji Univ
Sch Software Engn Shanghai 200070 Peoples R China
this study explores linear encryption techniques to protect against information-based stealthy attacks on remote state estimation. Utilizing smart sensors equipped with local Kalman filters, the system transmits innov...
详细信息
ISBN:
(纸本)9798331518509;9798331518493
this study explores linear encryption techniques to protect against information-based stealthy attacks on remote state estimation. Utilizing smart sensors equipped with local Kalman filters, the system transmits innovations rather than raw measurements via wireless networks. However, this transmission is susceptible to malicious data interception and manipulation by attackers. To safeguard against these stealthy threats, encryption and decryption modules are integrated into the system. this research aims to assess the effectiveness of the encryption strategy when faced with information-based stealthy attacks. A key contribution of this paper is the adoption of the most comprehensive attack models, moving away from the conventional reliance on innovation-based linear attack models. Our results demonstrate that the proposed linear encryption approach effectively mitigates stealthy attacks under certain mild conditions. the efficacy of the encryption is further validated through numerical examples, corroborating the theoretical advancements presented in this paper.
Zero-knowledge proof systems are becoming powerful tools in domains like blockchain networks. In this work, we improve abstract interpretation methods to sanity check PLONKish arithmetizations of computation, such as ...
详细信息
暂无评论