Studies indicate that making learners feel good is important only minor to clear knowledge transformation. Many studies have tried to use virtual humans as a part of interface in learning systems to increase the effec...
详细信息
ISBN:
(纸本)9781605587578
Studies indicate that making learners feel good is important only minor to clear knowledge transformation. Many studies have tried to use virtual humans as a part of interface in learning systems to increase the effect of instructions. Based on social interaction and pedagogical theories, many e-learning systems use animated films or virtual reality to boost human-computer engagement and ease their negative emotions. However, affective learning systems still need much research to improve their functionalities and usability. This study proposed a convenient approach to develop an emotionally interactive learning system;learners can express their emotions by mouse-clicking while learning. A virtual human was created to empathically react to learners in proactive and reactive ways to encourage and persuade them into persistent learning and help achieve their goals. Experimental results show that, averagely, subjects can tell virtual human's emotions and agree to its empathic reactions. Persuasion conducted by virtual human could not increase subjects' learning time, but could significantly increase their completion rate of exercises. Copyright 2009 ACM.
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distributio...
详细信息
ISBN:
(纸本)9780889868021
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services require secure multicast to protect integrity and confidentiality of the group traffic, and validate group member's authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose an anonymous group key management with ID-based Signature and secret sharing technologies to distribute a new group key securely to each participant of a group with only one rekey message whenever the group membership changes. The key management guarantees that a legal user, without revealing his/her real identity, can join a group after finishing the mutual authentication with the group initiator, and enforces the forward secrecy and backward secrecy.
Sensor networks are being used in several emerging applications not even imagined some years ago due to advances in sensing, computing, and communication techniques. However, these advances also pose various challenge...
详细信息
In this paper, we propose a new approach for the Joint Replenishment Problem (JRP) where items are procured from multisupplier. In solution algorithms, Genetic Algorithm (GA) and Simulated Annealing (SA) are cooperati...
详细信息
A data mining framework has been proposed to estimate intracranial pressure (ICP) non-invasively in our previous work. In the corresponding approach, the feature vector extracted from arterial blood pressure (ABP) and...
详细信息
With the development of the global business and logistics under the internet environment a Container Terminal (CT) system becomes more and more busy. Therefore, the available resources in the seaport get scarcer than ...
详细信息
Auditory perception is one of the most important functions for robotics applications. Microphone arrays are widely used for auditory perception in which the spatial structure of microphones is usually known. In practi...
详细信息
High computational cost for solving large engineering optimization problems point out the design of parallel optimization algorithms. Population based optimization algorithms provide parallel capabilities that can be ...
详细信息
High computational cost for solving large engineering optimization problems point out the design of parallel optimization algorithms. Population based optimization algorithms provide parallel capabilities that can be explored by their implementations done directly in hardware. This paper presents a hardware implementation of particle swarm optimization algorithms using an efficient floating-point arithmetic which performs the computations with high precision. All the architectures are parameterizable by bit-width, allowing the designer to choose the suitable format according to the requirements of the optimization problem. Synthesis and simulation results demonstrate that the proposed architecture achieves satisfactory results obtaining a better performance in therms of elapsed time than conventional software implementations.
A data mining framework has been proposed to estimate intracranial pressure (ICP) non-invasively in our previous work. In the corresponding approach, the feature vector extracted from arterial blood pressure (ABP) and...
详细信息
A data mining framework has been proposed to estimate intracranial pressure (ICP) non-invasively in our previous work. In the corresponding approach, the feature vector extracted from arterial blood pressure (ABP) and flow velocity (FV) is translated to the estimated errors by the mapping function for each entry in the database. In this paper, three different mapping function solutions, linear least squares (LLS), truncated singular value decomposition (TSVD) and standard Tikhonov regularization (STR) are systemically tested to compare the possible effects of different solutions on the non-invasive ICP estimation. The conducted comparison demonstrated that the selection of mapping function solution actually influences the estimation. Among the tested three solutions for mapping function, TSVD and STR show better ICP estimation performance with smaller ICP errors than LLS.
This paper presents a semiautomatic method for the identification of immunohistochemical (IHC) staining in digitized samples. The user trains the system by selecting on a sample image some typical positive stained reg...
暂无评论