In this paper, we present a set of six activities using the Lego Spike Prime robotics kit. The primary learning objectives of these activities are to develop students' programming and algorithmic skills, computati...
详细信息
ISBN:
(纸本)9783031670589;9783031670596
In this paper, we present a set of six activities using the Lego Spike Prime robotics kit. The primary learning objectives of these activities are to develop students' programming and algorithmic skills, computational thinking, and soft skills. Our research introduces one of the possible appropriate command sequences combined with the specific sensors of the selected kit. This approach aims to respect the cognitive difficulty of the tasks based on the age of the students and, simultaneously, exploit the motivational potential of educational robotics. Unlike traditional programming, this allows teachers to incorporate hands-on activities as a modern element of teaching. The activities are designed with consideration for the framework and needs of the Slovak education system, specifically for a 90 min computerscience lesson in lower secondary school. We conducted qualitative research in three different schools with students aged 10 to 15. These students were not necessarily robotics enthusiasts. Each task in every activity is briefly described, along with the commands taught. These activities are the result of our iterative research and multiple implementations in the educational process, encompassing the design idea, used sensors, and commands.
Design science research (DSR) is an established approach to create innovative artifacts while considering relevance and rigor. Design principles (DPs) are the most common knowledge contribution. However, DPs are often...
详细信息
ISBN:
(纸本)9783031611742;9783031611759
Design science research (DSR) is an established approach to create innovative artifacts while considering relevance and rigor. Design principles (DPs) are the most common knowledge contribution. However, DPs are often not reused in the research and practice community. In this methodology paper, we propose an approach to conduct meta-studies for design knowledge to tackle the issue of low DP reusability. We developed a process model for meta-studies based on DSR-specific terms, evaluated it in an expert workshop with DSR scholars, and demonstrated its application to the example of virtual reality literature. Our metastudy model contributes to the research discussion on the reusability of DPs and is a new approach to gain more transparency about existing DPs in research and practice, enabling the community to better guide future research.
Nowadays, the World Wide Web gives access to most of the world's knowledge, nevertheless, people require competence to interpret and comprehend most of that knowledge. The Lifelong Learning approach introduces a n...
详细信息
ISBN:
(纸本)9783031330223;9783031330230
Nowadays, the World Wide Web gives access to most of the world's knowledge, nevertheless, people require competence to interpret and comprehend most of that knowledge. The Lifelong Learning approach introduces a new way of constantly pursuing knowledge consistently. Nevertheless, learners need to test and carry out projects to reinforce the study of theoretical concepts. Mostly in computerscience, where they often need to experiment with large amounts of sensitive data to generalize beyond small training samples. However, in the past years, the European government enacted several regulations concerning privacy after catching up with sectors such as AI and Data Mining. The study illustrates a theoretical framework that includes hardware and software characteristics to avoid privacy violations and comply with European privacy regulations. The resulting framework could be applied for learning purposes as well as IoT applications regarding computer vision technologies to ensure correct and compliant communications between different devices.
Deepfake technology generates highly realistic videos effortlessly, raising serious concerns about privacy violations, misinformation, and financial fraud. Detecting Deepfakes is the most effective solution to address...
详细信息
Theory is a pivotal component in Information Systems (IS) research and no less so in Design science Research (DSR) projects, which are typically expected to select and use kernel theories to develop theoretical contri...
详细信息
ISBN:
(纸本)9783031611742;9783031611759
Theory is a pivotal component in Information Systems (IS) research and no less so in Design science Research (DSR) projects, which are typically expected to select and use kernel theories to develop theoretical contributions. However, the actual application and utilization of kernel theories remain challenging and heterogeneous - from producing theoretical outcomes in each project to using theory for the justification of design activities. This is problematic since academic journals have high expectations for selecting, using, and contributing to (kernel) theory. As a consequence, DSR researchers, especially novice ones, face challenges in navigating the high expectations of journals with a blurry research component. In this paper, we explore a set of tensions prevalent in the selection, use, and development of kernel theory to then elaborate on possible pathways to respond to them.
Holant ∗(f) denotes a class of counting problems specified by a constraint function f. We prove complexity dichotomy theorems for Holant ∗(f) in two settings: (1) f is any symmetric arity-3 real-valued function on inp...
详细信息
Underwater Image Enhancement (UIE) is critical for marine research and exploration but hindered by complex color distortions and severe blurring. Recent deep learning-based methods have achieved remarkable results, ye...
详细信息
Density Peak Clustering (DPC) has attracted widespread attention in the recent decade. However, traditional DPC algorithms still have shortcomings such as difficulty in describing data distribution and sensitivity to ...
详细信息
Integrating the erratic production of renewable energy into the electricity grid poses numerous challenges. One approach to stabilising market prices and reducing energy losses due to curtailments is the deployment of...
详细信息
In this paper, we formalize the concept of relative change-reluctance in iterated belief revision. We use this concept to compare different belief revision operators and analyze how an operator’s behavior evolves ove...
详细信息
暂无评论