Real-world regular expressions (regexes) are widely used in practice. Since regexes are difficult to comprehend and write, automatically synthesizing regexes has been an important research problem. However, current te...
详细信息
Dairy farms consume a significant amount of electricity for their operations, and this research focuses on enhancing energy efficiency and minimizing the impact on the environment in the sector by maximizing the utili...
详细信息
Learning Using Privileged Information is a particular type of knowledge distillation where the teacher model benefits from an additional data representation during training, called privileged information, improving th...
详细信息
The rapid development of artificial intelligence has led to an explosion of literature in the biomedical field, and Biomedical Named Entity Recognition (BioNER) can quickly and accurately identify key information from...
详细信息
Game-based learning environments (GBLEs) incorporate game mechanics, i.e., learning and assessment mechanics, to increase domain knowledge while maintaining learner engagement. Although GBLEs have been developed to im...
详细信息
ISBN:
(纸本)9783031490644;9783031490651
Game-based learning environments (GBLEs) incorporate game mechanics, i.e., learning and assessment mechanics, to increase domain knowledge while maintaining learner engagement. Although GBLEs have been developed to improve science learning, learners have attained lower science achievement scores over the past decade as they progress through school. As such, there is a need to better understand how learners use game mechanics as they learn about science content. This study aimed to understand how learners generally use and transition between learning and assessment mechanics while learning about science with a GBLE and how those transitions were related to learning outcomes (i.e., learning gains, game success). High-school students (N = 137) were recruited to play Crystal Island, a GBLE about microbiology. Results found that participants used static learning mechanics (e.g., virtual books about microbiology) most often, followed by game and content assessment mechanics, and lastly followed by aid and dynamic learning mechanics. Further results found that several sequential transition probabilities were related to lower learning outcomes with a few transitions positively relating to game completion success. Findings from this study also show that the type of game mechanic, as well as the direction of transitions across game mechanics significantly relate to learning outcomes. These findings provide insights into how to develop scaffolding techniques for improving science learning outcomes.
Machine learning models are increasingly employed in the classification of digitized medical tissue images, including for identifying cancer types and subtypes. Most models focus on a target tumor type, using datasets...
详细信息
The aim of surface defect detection is to identify and localise abnormal regions on the surfaces of captured objects, a task that’s increasingly demanded across various industries. Current approaches frequently fail ...
详细信息
Medical image segmentation poses challenges due to domain gaps, data modality variations, and dependency on domain knowledge or experts, especially for low- and middle-income countries (LMICs). Whereas for humans, giv...
详细信息
Knowledge graphs (KGs) serve as powerful tools for organizing and representing structured knowledge. While their utility is widely recognized, challenges persist in their automation and completeness. Despite...
详细信息
Acoustic Side-Channel Attacks (ASCAs) extract sensitive information by using audio emitted from a computing devices and their peripherals. Attacks targeting keyboards are popular and have been explored in the literatu...
详细信息
ISBN:
(纸本)9783031641701;9783031641718
Acoustic Side-Channel Attacks (ASCAs) extract sensitive information by using audio emitted from a computing devices and their peripherals. Attacks targeting keyboards are popular and have been explored in the literature. However, similar attacks targeting other human-interface peripherals, such as computer mice, are under-explored. To this end, this paper considers security leakage via acoustic signals emanating from normal mouse usage. We first confirm feasibility of such attacks by showing a proof-of-concept attack that classifies four mouse movements with 97% accuracy in a controlled environment. We then evolve the attack towards discerning twelve unique mouse movements using a smartphone to record the experiment. Using Machine Learning (ML) techniques, the model is trained on an experiment with six participants to be generalizable and discern among twelve movements with 94% accuracy. In addition, we experiment with an attack that detects a user action of closing a fullscreen window on a laptop. Achieving an accuracy of 91%, this experiment highlights exploiting audio leakage from computer mouse movements in a realistic scenario.
暂无评论