Constructing effective algorithms to converge to Nash Equilibrium (NE) is a important problem in algorithmic game theory. Prior research generally posits that the upper bound on the convergence rate for games is OT-1/...
详细信息
This study explores data science and machine learning techniques to predict suicidal ideation in young individuals, aiming to identify the most effective subset of questions from a comprehensive questionnaire. We benc...
详细信息
Student dropout as a decision-making process is complex and conditioned by various factors. Despite the existence of regulatory frameworks and the efforts made by universities to implement programs to retain students,...
详细信息
ISBN:
(数字)9783031456459
ISBN:
(纸本)9783031456442;9783031456459
Student dropout as a decision-making process is complex and conditioned by various factors. Despite the existence of regulatory frameworks and the efforts made by universities to implement programs to retain students, the objectives do not always achieve. The computerscience, Systems Engineering and Software Engineering careers are no strangers to this problem. This article presents the results of a bibliometric analysis to determine the aspects related to student dropout in these careers. The analysis of keywords co-occurrence shows that, out of a total of 282 keywords corresponding to 48 articles, 41 met the condition. Five clusters were formed relating to the prediction of student desertion, teaching systems, retention models, careers and desertion in higher education. The factors conditioning student desertion highlighted in the studies include communication among teachers, usefulness of the degree, cognitive gain, university entrance exam score, gender, place of residence, number of siblings, family income, English qualification, mathematics qualification and administration, among others. Understanding the factors involved in student dropout will allow these to be considered in the strategies for student dropout prevention and student retention.
Today, various types of extended reality (XR) environments are becoming increasingly used in industrial engineering contexts for design, analysis as well as for training activities. User's perception plays a key r...
详细信息
ISBN:
(纸本)9783031610431;9783031610448
Today, various types of extended reality (XR) environments are becoming increasingly used in industrial engineering contexts for design, analysis as well as for training activities. User's perception plays a key role especially in such XR based learning and training contexts. Perception refers to the process by which individuals become aware and process the stimuli around them. Interdisciplinary researchers have studied the vital relationship between perception and cognition. In this groundbreaking study, the role of perception and its impact on cognition and learning in fully immersive Virtual Reality (VR) based digital twins is discussed. Schemas have been proposed to help lay the foundation to study the role of perception on cognition and learning. The primary outcomes of this research study underscored the relationships between perception and cognitionwhile also emphasizing the impact of a participant's background in influencing their perception of the target robotics assembly environments.
During the past years and due to coronavirus pandemics, the online business of the companies has been increased, and people are working from the home through high-speed Internet connectivity. Daily, large amount of da...
详细信息
We introduce a new history-based proof-theory for reasoning about behavioral subtyping in class and interface hierarchies. Our approach is based on a semantic definition of types in terms of sets of sequences of metho...
详细信息
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computerscience degree. As a cons...
详细信息
ISBN:
(纸本)9783031713781;9783031713798
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computerscience degree. As a consequence, we neither can rely on strong theoretical or mathematical foundations of the students, nor can we focus the whole term on applying formal methods in security. We address these challenges by integrating formal methods into a three-week-long section on security protocols. In these three weeks, we use a holistic approach for teaching the security objectives of security protocols, their analysis of actual implementations using a network sniffer, their formal verification using a model checker (and comparing it to an approach based on interactive theorem proving). Our approach has been proven successful in teaching (both, in-person and remotely) the benefits of formal methods to numerous students. The students do perform well in the corresponding assessments, and each year we are able to attract students for final year projects (i.e., their ***. thesis) in the area of formal methods.
Building information modeling is becoming the preferred tool-assisted methodology in civil and construction engineering for the design, management, and creation of digital replicas of buildings. However, current tool ...
详细信息
Training an agent based solely on observational data in a single environment, which then performs well in a zero-shot manner in unseen contexts, presents a significant challenge in the field of Reinforcement Learning....
详细信息
In generative zero-shot learning, the visual distribution mismatch between synthetic and real samples is a challenge due to the lack of effective constraints for unseen class visual features. To address this, we propo...
详细信息
暂无评论