During the past years and due to coronavirus pandemics, the online business of the companies has been increased, and people are working from the home through high-speed Internet connectivity. Daily, large amount of da...
详细信息
Today, various types of extended reality (XR) environments are becoming increasingly used in industrial engineering contexts for design, analysis as well as for training activities. User's perception plays a key r...
详细信息
ISBN:
(纸本)9783031610431;9783031610448
Today, various types of extended reality (XR) environments are becoming increasingly used in industrial engineering contexts for design, analysis as well as for training activities. User's perception plays a key role especially in such XR based learning and training contexts. Perception refers to the process by which individuals become aware and process the stimuli around them. Interdisciplinary researchers have studied the vital relationship between perception and cognition. In this groundbreaking study, the role of perception and its impact on cognition and learning in fully immersive Virtual Reality (VR) based digital twins is discussed. Schemas have been proposed to help lay the foundation to study the role of perception on cognition and learning. The primary outcomes of this research study underscored the relationships between perception and cognitionwhile also emphasizing the impact of a participant's background in influencing their perception of the target robotics assembly environments.
In generative zero-shot learning, the visual distribution mismatch between synthetic and real samples is a challenge due to the lack of effective constraints for unseen class visual features. To address this, we propo...
详细信息
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computerscience degree. As a cons...
详细信息
ISBN:
(纸本)9783031713781;9783031713798
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computerscience degree. As a consequence, we neither can rely on strong theoretical or mathematical foundations of the students, nor can we focus the whole term on applying formal methods in security. We address these challenges by integrating formal methods into a three-week-long section on security protocols. In these three weeks, we use a holistic approach for teaching the security objectives of security protocols, their analysis of actual implementations using a network sniffer, their formal verification using a model checker (and comparing it to an approach based on interactive theorem proving). Our approach has been proven successful in teaching (both, in-person and remotely) the benefits of formal methods to numerous students. The students do perform well in the corresponding assessments, and each year we are able to attract students for final year projects (i.e., their ***. thesis) in the area of formal methods.
Building information modeling is becoming the preferred tool-assisted methodology in civil and construction engineering for the design, management, and creation of digital replicas of buildings. However, current tool ...
详细信息
Training an agent based solely on observational data in a single environment, which then performs well in a zero-shot manner in unseen contexts, presents a significant challenge in the field of Reinforcement Learning....
详细信息
The rise in the demand for new performance portability frameworks for heterogeneous computing systems has brought with it a number of proposals of workable metrics for evaluating the performance portability of applica...
详细信息
We present a simple yet effective technique to boost the performance of 3D point cloud registration. Conventional methods input a distance matrix to a differentiable matching algorithm deterministically, ignoring any ...
详细信息
Biomedical Event Causal Relation Extraction (BECRE) is an important task in biomedical information extraction. Existing methods usually use pre-trained language models to learn semantic representations and then predic...
详细信息
Currently, social networks have emerged as significant platforms for individuals to share personal information and social content. However, it is important to recognize that social networks have both positive and nega...
详细信息
暂无评论