chi New Search experiences in EEA: Rich results, aggregator units, and refinement chips By developers.google.com Published On :: Thur, 15 February 2024 10:00:00 +0000 Following our latest update on our preparations for the DMA (Digital Markets Act), we're sharing more details about what publishers can expect to see in regards to new search results in European Economic Area (EEA) countries, and how they can express interest in these experiences. Full Article
chi New Search experiences in South Africa: Badges and refinement chips By developers.google.com Published On :: Mon, 16 Sep 2024 08:00:00 +0000 We're sharing more information about our new search experiences in South Africa, and how South African platforms can express interest and participate. Full Article
chi Congratulations Dr. Eran Chintaka! By sanjiva.weerawarana.org Published On :: Sun, 31 Jul 2011 02:33:00 +0000 It gives me great pleasure to congratulate Eran Chinthaka on his completing his Ph.D. in Computer Science from Indiana University on the topic User Inspired Management of Scientific Jobs in Grids and Clouds. His advisor was Prof. Beth Plale. Eran is of course one of the founding team members of Apache Axis2 in the Lanka Software Foundation. Of the original 6 person core team who created Axis2, he's the 3rd to finish his Ph.D. (joining Srinath (back in WSO2) and Jaliya (in Microsoft Research)) and the other three are getting close to finishing up their PhDs too. Eran worked in WSO2 for a couple of years before leaving for his Ph.D. and I hope that when he finishes his Wall Street stint he'll come back home and join us again :-). Congratulations Dr. Chinthaka! Full Article axis2 sri lanka wso2
chi Launching WorkInSriLanka.lk Initiative By sanjiva.weerawarana.org Published On :: Thu, 16 May 2013 18:28:00 +0000 Over the last many months, I've been privileged to be part of a fantastic team of volunteers working on a new effort: This is an effort to help people who are considering moving to Sri Lanka to work and live. Me? Move to Sri Lanka?? What?! Yes, Sri Lanka. No more war. No more bombs. No one trying to (systematically .. yeah we have our share of crazies) kill anyone. Great weather. Majorly improving infrastructure. A second airport (with no flights yet .. but that's ok everyone's gotta start at the bottom!). A real, honest-to-goodness highway (dinner in Galle tonite?) and many more coming. Apartments everywhere. Parks all over Colombo. Compare that to where you're living? Do you go thru a metal detector to your workplace? Not in Sri Lanka any more. We had a long period of that .. but no more .. war finished in 2009, nearly to the day today (May 18th is the anniversary). Anyway :-). Our objective is to first be a one-stop-site for anyone who's considering moving to Sri Lanka. Everything you need to know from what kind of jobs are available, how much does housing cost, how much do cars cost to kids schooling to visa stuff. All there, all in one place. All done in an objective, volunteer, independent kind of way. The site is still in its infancy of course .. more to come but its got a lot of stuff already! With regards to jobs- if you're a senior person returning we will even help you get into the "network" to get into the loop of things. We have a pretty connected set of friends who are helping to get that done. We're also partnering with pretty much every industry body so that we can reach into all of those networks. Going beyond the information portal we want to become an advocacy group to promote what's good about moving to Sri Lanka and also to work hard on breaking down more barriers. Even ex-Sri Lankans returning have some major barriers in the system now and we want to work towards removing them. This was a totally volunteer group of people from all over the place. Check us out at the site! We had a fantastic launch event on Tuesday (May 14th) evening. We had the Governor of the Central Bank of Sri Lanka come and give the keynote talk and then had a superb panel. More on that coming soon at the site itself. Check it out and give us your feedback - plenty of places in the site to do that. Enjoy surfing! http://workinsrilanka.lk/. Full Article sri lanka
chi Treat For Legal Interpreters and an Archive for Translators As Well By novicetranslators.blogspot.com Published On :: Tue, 17 Jan 2012 01:13:00 +0000 OpenCourt is an experimental project run by WBUR, Boston’s NPR news station, that uses digital technology to make Quincy District Court more accessible to the public. Full Article court interpreters law legal live chi Choice of Classifiers in Hierarchical Recognition of Online Handwritten Kannada and Tamil Aksharas By www.jucs.org Published On :: 2011-04-07T14:39:07+02:00 In this paper, we propose a novel dexterous technique for fast and accurate recognition of online handwritten Kannada and Tamil characters. Based on the primary classifier output and prior knowledge, the best classifier is chosen from set of three classifiers for second stage classification. Prior knowledge is obtained through analysis of the confusion matrix of primary classifier which helped in identifying the multiple sets of confused characters. Further, studies were carried out to check the performance of secondary classifiers in disambiguating among the confusion sets. Using this technique we have achieved an average accuracy of 92.6% for Kannada characters on the MILE lab dataset and 90.2% for Tamil characters on the HP Labs dataset. Full Article chi The Architectural Design of a System for Interpreting Multilingual Web Documents in E-speranto By www.jucs.org Published On :: 2011-04-24T11:14:58+02:00 E-speranto is a formal language for generating multilingual texts on the World Wide Web. It is currently still under development. The vocabulary and grammar rules of E-speranto are based on Esperanto; the syntax of E-speranto, however, is based on XML (eXtensible Markup Language). The latter enables the integration of documents generated in E-speranto into web pages. When a user accesses a web page generated in E-speranto, the interpreter interprets the document into a chosen natural language, which enables the user to read the document in any arbitrary language supported by the interpreter. The basic parts of the E-speranto interpreting system are the interpreters and information resources, which complies with the principle of separating the interpretation process from the data itself. The architecture of the E-speranto interpreter takes advantage of the resemblance between the languages belonging to the same linguistic group, which consequently results in a lower production cost of the interpreters for the same linguistic group. We designed a proof-of-concept implementation for interpreting E-speranto in three Slavic languages: Slovenian, Serbian and Russian. These languages share many common features in addition to having a similar syntax and vocabulary. The content of the information resources (vocabulary, lexicon) was limited to the extent that was needed to interpret the test documents. The testing confirmed the applicability of our concept and also indicated the guidelines for future development of both the interpreters and E-speranto itself. Full Article chi Modeling Quality Attributes with Aspect-Oriented Architectural Templates By www.jucs.org Published On :: 2011-05-06T16:03:16+02:00 The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over the years the software engineering community has studied the relationship between quality attributes and the use of particular architectural styles and patterns. In this paper we study the relationship between quality attributes and Aspect-Oriented Software Architectures - which apply the principles of Aspect-Oriented Software Development (AOSD) at the architectural level. AOSD focuses on identifying, modeling and composing crosscutting concerns - i.e. concerns that are tangled and/or scattered with other concerns of the application. In this paper we propose to use AO-ADL, an aspect-oriented architectural description language, to specify quality attributes by means of parameterizable, and thus reusable, architectural patterns. We particularly focus on quality attributes that: (1) have major implications on software functionality, requiring the incorporation of explicit functionality at the architectural level; (2) are complex enough as to be modeled by a set of related concerns and the compositions among them, and (3) crosscut domain specific functionality and are related to more than one component in the architecture. We illustrate our approach for usability, a critical quality attribute that satisfies the previous constraints and that requires special attention at the requirements and the architecture design stages. Full Article chi Software Components, Architectures and Reuse By www.jucs.org Published On :: 2011-05-06T16:03:55+02:00 Full Article chi Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification By www.jucs.org Published On :: 2011-07-04T16:04:47+02:00 One important subject associated with personal authentication capabilities is the analysis of handwritten signatures. Among the many known techniques, algorithms based on linguistic formalisms are also possible. However, such techniques require a number of algorithms for intelligent image analysis to be applied, allowing the development of new solutions in the field of personal authentication and building modern security systems based on the advanced recognition of such patterns. The article presents the approach based on the usage of syntactic methods for the static analysis of handwritten signatures. The graph linguistic formalisms applied, such as the IE graph and ETPL(k) grammar, are characterised by considerable descriptive strength and a polynomial membership problem of the syntactic analysis. For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined. The two-layer graph description makes it possible to take into consideration both local and global features of the signature. The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes. The verification and recognition of a signature consists in analysing the affiliation of its graph description to the language describing the specimen database. Initial assessments display a precision of the method at a average level of under 75%. Full Article chi Gilets Jaunes… des fachos-gauchistes et pis c’est tout ? By marc-vasseur.over-blog.com Published On :: Wed, 05 Dec 2018 18:08:00 +0100 Les images sont « belles », elles tournent en boucle sur les réseaux sociaux, elles tendent à vouloir accréditer la thèse d’un mouvement composé d’ultra des deux extrêmes. La chose devrait donc être entendue, pour les « bons » militants ; rassurons-nous... Full Article chi No Comment : les mariachis se réunissent à Mexico pour battre le record du monde de chant By fr.euronews.com Published On :: Mon, 11 Nov 2024 14:47:55 +0100 No Comment : les mariachis se réunissent à Mexico pour battre le record du monde de chant Full Article chi An architectural view of VANETs cloud: its models, services, applications and challenges By www.inderscience.com Published On :: 2024-07-05T23:20:50-05:00 This research explores vehicular ad hoc networks (VANETs) and their extensive applications, such as enhancing traffic efficiency, infotainment, and passenger safety. Despite significant study, widespread deployment of VANETs has been hindered by security and privacy concerns. Challenges in implementation, including scalability, flexibility, poor connection, and insufficient intelligence, have further complicated VANETs. This study proposes leveraging cloud computing to address these challenges, marking a paradigm shift. Cloud computing, recognised for its cost-efficiency and virtualisation, is integrated with VANETs. The paper details the nomenclature, architecture, models, services, applications, and challenges of VANET-based cloud computing. Three architectures for VANET clouds - vehicular clouds (VCs), vehicles utilising clouds (VuCs), and hybrid vehicular clouds (HVCs) - are discussed in detail. The research provides an overview, delves into related work, and explores VANET cloud computing's architectural frameworks, models, and cloud services. It concludes with insights into future work and a comprehensive conclusion. Full Article chi The Stanchies: Canucks stomp out Flames in 3-1 victory - Canucks Army By news.google.com Published On :: Wed, 13 Nov 2024 11:48:45 GMT The Stanchies: Canucks stomp out Flames in 3-1 victory Canucks ArmyPettersson, Canucks having fun again with bounce-back win over Flames Sportsnet.caThree takeaways as Flames cap gruelling stretch with loss to Canucks Calgary HeraldPettersson has goal, assist to lift Canucks past Flames NHL.comI Watched This Game: Brännström gets first goal as a Canuck in comfy win over Flames Vancouver Is Awesome Full Article chi Overwhelmed families surrendering custody of their children to CAS - CTV News Northern Ontario By news.google.com Published On :: Wed, 13 Nov 2024 00:54:00 GMT Overwhelmed families surrendering custody of their children to CAS CTV News Northern Ontario Full Article chi UN chief warns COP29 summit to pay up or face climate-led disaster for humanity - The Globe and Mail By news.google.com Published On :: Tue, 12 Nov 2024 11:51:31 GMT UN chief warns COP29 summit to pay up or face climate-led disaster for humanity The Globe and MailClimate Summit, in Early Days, Is Already on a ‘Knife Edge’ The New York TimesAt COP29 summit, nations big and small get chance to bear witness to climate change The Globe and MailTerence Corcoran: COP29 hit by political ‘dunkelflaute’ Financial PostCOP29: Albania PM goes off script to ask 'What on Earth are we doing?' Euronews Full Article chi Online Journal of Nursing Informatics Archive By ojni.org Published On :: Online journal dedicated to nursing informatics Full Article chi Big Brother is Watching But He Doesn’t Understand: Why Forced Filtering Technology on the Internet Isn’t the Solution to the Modern Copyright Dilemma By script-ed.org Published On :: Fri, 17 Aug 2018 13:48:38 +0000 by Mitchell Longan[1] Introduction The European Parliament is currently considering a proposal to address problems of piracy and other forms of copyright infringement associated with the digital world.[2] Article 13 of the proposed Directive on Copyright in the Digital Single Full Article Blog chi Research on multi-objective optimisation for shared bicycle dispatching By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The problem of dispatching is key to management of shared bicycles. Considering the number of borrowing and returning events during the dispatching period, optimisation plans of shared bicycles dispatching are studied in this paper. Firstly, the dispatching model of shared bicycles is built, which regards the dispatching cost and lost demand as optimised objectives. Secondly, the solution algorithm is designed based on non-dominated Genetic Algorithm. Finally, a case is given to illustrate the application of the method. The research results show that the method proposed in the paper can get optimised dispatching plans, and the model considering borrowing and returning during dispatching period has better effects with a 39.3% decrease in lost demand. Full Article chi Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article chi Emotion recognition method for multimedia teaching classroom based on convolutional neural network By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching. Full Article chi Natural language processing-based machine learning psychological emotion analysis method By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms. Full Article chi Digital architectural decoration design and production based on computer image By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 The application of computer image digitisation has realised the transformation of people's production and lifestyle, and also promoted the development of the construction industry. This article aims to realise the research on architectural decoration design and production under computer network environment and promote the ecological development of indoor and outdoor design in the construction industry. This article proposes to use virtual reality technology in image digitisation to guide architectural decoration design research. In the comparative analysis of the weight of architectural decoration elements, among the calculated weights of secondary elements, the spatial function has the largest weight, which is 0.2155, and the landscape has the smallest weight, which is 0.0113. Among the three-level unit weights, the service area has the largest weight, which is 0.0976, and the fence frame has the smallest weight, which is 0.0119. Full Article chi Researching together in academic engagement in engineering: a study of dual affiliated graduate students in Sweden By www.inderscience.com Published On :: 2024-09-02T23:20:50-05:00 This article explores dual affiliated graduate students that conduct research involving both universities and firms, which we conceptualise as a form of academic engagement, e.g., knowledge networks. We explore what they do during their studies, and their perceptions about their contributions to the firm's capacities for technology and innovation. So far, university-industry interactions in engineering are less researched than other fields, and this qualitative study focuses upon one department of Electrical Engineering in Sweden. First, we define and describe how the partner firms and universities organise this research collaboration as a form of academic engagement. Secondly, we propose a conceptual framework specifying how graduate students act as boundary-spanners between universities and firms. This framework is used for the empirical analysis, when exploring their perceptions of impact. Our results reveal that they primarily engage in problem-solving activities in technology, which augment particularly the early stages of absorptive capacities in firms. Full Article chi Enabling a Comprehensive Teaching Strategy: Video Lectures By Published On :: Full Article chi Teaching High School Students Applied Logical Reasoning By Published On :: Full Article chi Algorithm Visualization System for Teaching Spatial Data Algorithms By Published On :: Full Article chi Studios, Mini-lectures, Project Presentations, Class Blog and Wiki: A New Approach to Teaching Web Technologies By Published On :: Full Article chi Making Information Systems less Scrugged: Reflecting on the Processes of Change in Teaching and Learning By Published On :: Full Article chi A Tools-Based Approach to Teaching Data Mining Methods By Published On :: Full Article chi Open-Source ERP: Is It Ripe for Use in Teaching Supply Chain Management? By Published On :: Full Article chi Technology-based Participatory Learning for Indigenous Children in Chiapas Schools, Mexico By Published On :: Full Article chi Re-purposing Google Maps Visualisation for Teaching Logistics Systems By Published On :: Full Article chi Business Intelligence in College: A Teaching Case with Real Life Puzzles By Published On :: Full Article chi A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study By Published On :: Full Article chi ICT Teachers’ Professional Growth Viewed in terms of Perceptions about Teaching and Competencies By Published On :: Full Article chi A Database Practicum for Teaching Database Administration and Software Development at Regis University By Published On :: Full Article chi Using Student e-Portfolios to Facilitate Learning Objective Achievements in an Outcome-Based University By Published On :: Full Article chi Developing Cross-Cultural Awareness in IT: Reflections of Australian and Chinese Students By Published On :: Full Article chi Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming By Published On :: Full Article chi Implementing a Robotics Curriculum in an Early Childhood Montessori Classroom By Published On :: 2015-01-08 Full Article chi A Debate over the Teaching of a Legacy Programming Language in an Information Technology (IT) Program By Published On :: 2014-12-22 Full Article chi Teaching an Introductory Programming Language in a General Education Course By Published On :: Full Article chi Augmenting a Child’s Reality: Using Educational Tablet Technology By Published On :: Full Article chi A Quantitative Investigation into the Impacts of 1:1 iPads on Early Learner’s ELA and Math Achievement By Published On :: 2015-06-17 Many parents, educators, and policy makers see great potential for leveraging tools like laptop computers, tablets, and smartphones in the classrooms of the world. Although increasing students’ technology access may be associated with increased student achievement, there is little research directly investigating objective measures of student achievement. This study addresses the short-term and long-term quantitative impacts of one of the world’s first school efforts to provide Kindergarten through 3rd grade classrooms with 1:1 iPad access and a range of English Language Arts (ELA) and math Apps. This report summarizes two investigations conducted during this iPad implementation. First, a 9-week pre/post randomized control trial was conducted in which 8 Kindergarten classes used literacy and numeracy apps while another 8 Kindergarten classes used their traditional (non-iPad) resources. At the end of this short implementation period, slightly stronger literacy performance gains were observed in the iPad settings. In a second longitudinal study, three years of assessment data were explored before and after the 1:1 iPad implementation in grades K to 2. Results from the longitudinal study provide emerging evidence of potential increases in ELA achievement, but no consistent results in math achievement. This paper adds to the sparse literature in this area and provides a springboard for further research. Full Article chi Recognizing and Managing Complexity: Teaching Advanced Programming Concepts and Techniques Using the Zebra Puzzle By Published On :: 2015-06-13 Teaching advanced programming can be a challenge, especially when the students are pursuing different majors with diverse analytical and problem-solving capabilities. The purpose of this paper is to explore the efficacy of using a particular problem as a vehicle for imparting a broad set of programming concepts and problem-solving techniques. We present a classic brain teaser that is used to communicate and demonstrate advanced software development concepts and techniques. Our results show that students with varied academic experiences and goals, assuming at least one procedural/structured programming pre-requisite, can benefit from and also be challenged by such an exercise. Although this problem has been used by others in the classroom, we believe that our use of this problem in imparting such a broad range of topics to a diverse student population is unique. Full Article chi Learning Circles: A Collaborative Technology-Mediated Peer-Teaching Workshop By Published On :: 2015-04-14 This research study explores peer teaching and learning without a domain expert teacher, within the context of an activity where teams of second level students (~16 years old) are required to create a learning experience for their peers. The study looks at how participants would like to be taught and how they would teach their peers if given the opportunity and examines the support they require, their motivation levels, and if they actually learn curriculum content using this approach. An exploratory case study methodology was used, and the findings suggest that students want varied learning experiences that include many of the elements which would fall under the heading of 21st century learning, that with some support and encouragement they can create innovative learning experiences for their peers, and that they can learn curriculum content from the process. Full Article chi Teaching Social Media in Business By Published On :: 2015-03-27 The ways people connect, interact, share, and communicate have changed due to recent developments in information technology. These developments, categorized as social media, have captured the attention of business executives, technologists, and education professionals alike, and have altered many business models. Additionally, the concept of social media impacts numerous sub-disciplines within business and has become an important issue with operational, tactical, and strategic considerations. Despite this interest, many business schools do not have courses involving social media technologies and applications. In those that do, the placement and focus of the course varies considerably. This article provides motivation and insight into the process of developing an approach for effectively teaching social media use in business. Additionally, it offers implementation examples of courses taught at three major universities. The article concludes with lessons-learned that will give instructors practical guidance and ensure that social media courses taught in a business school provide students with a solid basis for integrating social media into business practice. Full Article chi Girls, Boys, and Bots: Gender Differences in Young Children’s Performance on Robotics and Programming Tasks By Published On :: 2016-08-29 Prior work demonstrates the importance of introducing young children to programming and engineering content before gender stereotypes are fully developed and ingrained in later years. However, very little research on gender and early childhood technology interventions exist. This pilot study looks at N=45 children in kindergarten through second grade who completed an eight-week robotics and programming curriculum using the KIWI robotics kit. KIWI is a developmentally appropriate robotics construction set specifically designed for use with children ages 4 to 7 years old. Qualitative pre-interviews were administered to determine whether participating children had any gender-biased attitudes toward robotics and other engineering tools prior to using KIWI in their classrooms. Post-tests were administered upon completion of the curriculum to determine if any gender differences in achievement were present. Results showed that young children were beginning to form opinions about which technologies and tools would be better suited for boys and girls. While there were no significant differences between boys and girls on the robotics and simple programming tasks, boys performed significantly better than girls on the advanced programming tasks such as, using repeat loops with sensor parameters. Implications for the design of new technological tools and curriculum that are appealing to boys and girls are discussed. Full Article chi Teaching Quality Evaluation: Online vs. Manually, Facts and Myths By Published On :: 2017-12-13 Aim/Purpose: This study aimed to examine whether there is a difference between manual feedback and online feedback with regard to feedback quality, respondents’ percentage, reliability and the amount of verbal comments written by students. Background: The quality of teaching is an important component of academic work. There are various methods for testing the quality of teaching; one of these methods is through students’ feedback. Methodology: This study used a quantitative approach, including the quantification of qualitative verbal data collected through an open question in the questionnaire. A sample of 180 courses was randomly chosen, 90 courses were evaluated manually and 90 were evaluated online. The number of students ranges from 7 to 60 students per course. In total 4678 students participated in the study. Contribution: The findings show that there is almost an identical pattern of feedback of manual and online course teaching evaluation. These findings encourage a continued use of this evaluation method. Findings: No significant differences were found between manual feedback and online feedback in the students’ evaluation of the lecturer/course. The percentage of respondents was significantly higher in the manual feedback than in the online feedback. The number of qualitative comments was significantly greater in the online feedback than in the manual feedback. Impact on Society: The findings of this study refute the claims with regard to the unreliability of an online teaching evaluation. These findings reflect the advantages of using online feedback, such as cost savings, granting more time to students in order to provide feedback, and reducing disturbance during lectures. Future Research: The gender aspect was not taken into account in the study. Therefore, we recommend conducting a follow-up study that will examine gender differences in directions of- difference between male and female lecturers, and differences between male and female students in teaching evaluation. Full Article «1..256 57 58..110..164..218..272..326..380..434..488540» Recent Trending American Industrial Partners to Acquire PPG’s Architectural Coatings Business China Picks Deputy UN Representative as Ambassador to S. Korea DP Chief Says Will Appeal Court Decision to Fine His Wife Islet-on-a-chip technology streamlines diabetes research Chicken contamination at Foster Farms sheds light on food regulation Patt's Hats: Flowy fabrics, chunky jewelry and mismatching shoes AMD to cut 4% of global workforce as it focuses on AI chip development Bharat Panchal takes charge as Chief Risk, Security, and Stakeholder Management Officer, Bima Sugam India Federation DynaClean Food Processing Conveyors on Display for First Time at Process Expo in Chicago Batch-Pro™ KETTLE CHIP COOKING SYSTEM Great Plains Holdings to acquire 51% interest in Bonjoe Gourmet Chips Angie’s BOOMCHICKAPUFF popchips Maya Kaimal Naan Chips Perfecting purple chip production Subscribe To Our Newsletter
chi Choice of Classifiers in Hierarchical Recognition of Online Handwritten Kannada and Tamil Aksharas By www.jucs.org Published On :: 2011-04-07T14:39:07+02:00 In this paper, we propose a novel dexterous technique for fast and accurate recognition of online handwritten Kannada and Tamil characters. Based on the primary classifier output and prior knowledge, the best classifier is chosen from set of three classifiers for second stage classification. Prior knowledge is obtained through analysis of the confusion matrix of primary classifier which helped in identifying the multiple sets of confused characters. Further, studies were carried out to check the performance of secondary classifiers in disambiguating among the confusion sets. Using this technique we have achieved an average accuracy of 92.6% for Kannada characters on the MILE lab dataset and 90.2% for Tamil characters on the HP Labs dataset. Full Article
chi The Architectural Design of a System for Interpreting Multilingual Web Documents in E-speranto By www.jucs.org Published On :: 2011-04-24T11:14:58+02:00 E-speranto is a formal language for generating multilingual texts on the World Wide Web. It is currently still under development. The vocabulary and grammar rules of E-speranto are based on Esperanto; the syntax of E-speranto, however, is based on XML (eXtensible Markup Language). The latter enables the integration of documents generated in E-speranto into web pages. When a user accesses a web page generated in E-speranto, the interpreter interprets the document into a chosen natural language, which enables the user to read the document in any arbitrary language supported by the interpreter. The basic parts of the E-speranto interpreting system are the interpreters and information resources, which complies with the principle of separating the interpretation process from the data itself. The architecture of the E-speranto interpreter takes advantage of the resemblance between the languages belonging to the same linguistic group, which consequently results in a lower production cost of the interpreters for the same linguistic group. We designed a proof-of-concept implementation for interpreting E-speranto in three Slavic languages: Slovenian, Serbian and Russian. These languages share many common features in addition to having a similar syntax and vocabulary. The content of the information resources (vocabulary, lexicon) was limited to the extent that was needed to interpret the test documents. The testing confirmed the applicability of our concept and also indicated the guidelines for future development of both the interpreters and E-speranto itself. Full Article
chi Modeling Quality Attributes with Aspect-Oriented Architectural Templates By www.jucs.org Published On :: 2011-05-06T16:03:16+02:00 The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over the years the software engineering community has studied the relationship between quality attributes and the use of particular architectural styles and patterns. In this paper we study the relationship between quality attributes and Aspect-Oriented Software Architectures - which apply the principles of Aspect-Oriented Software Development (AOSD) at the architectural level. AOSD focuses on identifying, modeling and composing crosscutting concerns - i.e. concerns that are tangled and/or scattered with other concerns of the application. In this paper we propose to use AO-ADL, an aspect-oriented architectural description language, to specify quality attributes by means of parameterizable, and thus reusable, architectural patterns. We particularly focus on quality attributes that: (1) have major implications on software functionality, requiring the incorporation of explicit functionality at the architectural level; (2) are complex enough as to be modeled by a set of related concerns and the compositions among them, and (3) crosscut domain specific functionality and are related to more than one component in the architecture. We illustrate our approach for usability, a critical quality attribute that satisfies the previous constraints and that requires special attention at the requirements and the architecture design stages. Full Article
chi Software Components, Architectures and Reuse By www.jucs.org Published On :: 2011-05-06T16:03:55+02:00 Full Article
chi Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification By www.jucs.org Published On :: 2011-07-04T16:04:47+02:00 One important subject associated with personal authentication capabilities is the analysis of handwritten signatures. Among the many known techniques, algorithms based on linguistic formalisms are also possible. However, such techniques require a number of algorithms for intelligent image analysis to be applied, allowing the development of new solutions in the field of personal authentication and building modern security systems based on the advanced recognition of such patterns. The article presents the approach based on the usage of syntactic methods for the static analysis of handwritten signatures. The graph linguistic formalisms applied, such as the IE graph and ETPL(k) grammar, are characterised by considerable descriptive strength and a polynomial membership problem of the syntactic analysis. For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined. The two-layer graph description makes it possible to take into consideration both local and global features of the signature. The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes. The verification and recognition of a signature consists in analysing the affiliation of its graph description to the language describing the specimen database. Initial assessments display a precision of the method at a average level of under 75%. Full Article
chi Gilets Jaunes… des fachos-gauchistes et pis c’est tout ? By marc-vasseur.over-blog.com Published On :: Wed, 05 Dec 2018 18:08:00 +0100 Les images sont « belles », elles tournent en boucle sur les réseaux sociaux, elles tendent à vouloir accréditer la thèse d’un mouvement composé d’ultra des deux extrêmes. La chose devrait donc être entendue, pour les « bons » militants ; rassurons-nous... Full Article
chi No Comment : les mariachis se réunissent à Mexico pour battre le record du monde de chant By fr.euronews.com Published On :: Mon, 11 Nov 2024 14:47:55 +0100 No Comment : les mariachis se réunissent à Mexico pour battre le record du monde de chant Full Article
chi An architectural view of VANETs cloud: its models, services, applications and challenges By www.inderscience.com Published On :: 2024-07-05T23:20:50-05:00 This research explores vehicular ad hoc networks (VANETs) and their extensive applications, such as enhancing traffic efficiency, infotainment, and passenger safety. Despite significant study, widespread deployment of VANETs has been hindered by security and privacy concerns. Challenges in implementation, including scalability, flexibility, poor connection, and insufficient intelligence, have further complicated VANETs. This study proposes leveraging cloud computing to address these challenges, marking a paradigm shift. Cloud computing, recognised for its cost-efficiency and virtualisation, is integrated with VANETs. The paper details the nomenclature, architecture, models, services, applications, and challenges of VANET-based cloud computing. Three architectures for VANET clouds - vehicular clouds (VCs), vehicles utilising clouds (VuCs), and hybrid vehicular clouds (HVCs) - are discussed in detail. The research provides an overview, delves into related work, and explores VANET cloud computing's architectural frameworks, models, and cloud services. It concludes with insights into future work and a comprehensive conclusion. Full Article
chi The Stanchies: Canucks stomp out Flames in 3-1 victory - Canucks Army By news.google.com Published On :: Wed, 13 Nov 2024 11:48:45 GMT The Stanchies: Canucks stomp out Flames in 3-1 victory Canucks ArmyPettersson, Canucks having fun again with bounce-back win over Flames Sportsnet.caThree takeaways as Flames cap gruelling stretch with loss to Canucks Calgary HeraldPettersson has goal, assist to lift Canucks past Flames NHL.comI Watched This Game: Brännström gets first goal as a Canuck in comfy win over Flames Vancouver Is Awesome Full Article
chi Overwhelmed families surrendering custody of their children to CAS - CTV News Northern Ontario By news.google.com Published On :: Wed, 13 Nov 2024 00:54:00 GMT Overwhelmed families surrendering custody of their children to CAS CTV News Northern Ontario Full Article
chi UN chief warns COP29 summit to pay up or face climate-led disaster for humanity - The Globe and Mail By news.google.com Published On :: Tue, 12 Nov 2024 11:51:31 GMT UN chief warns COP29 summit to pay up or face climate-led disaster for humanity The Globe and MailClimate Summit, in Early Days, Is Already on a ‘Knife Edge’ The New York TimesAt COP29 summit, nations big and small get chance to bear witness to climate change The Globe and MailTerence Corcoran: COP29 hit by political ‘dunkelflaute’ Financial PostCOP29: Albania PM goes off script to ask 'What on Earth are we doing?' Euronews Full Article
chi Online Journal of Nursing Informatics Archive By ojni.org Published On :: Online journal dedicated to nursing informatics Full Article
chi Big Brother is Watching But He Doesn’t Understand: Why Forced Filtering Technology on the Internet Isn’t the Solution to the Modern Copyright Dilemma By script-ed.org Published On :: Fri, 17 Aug 2018 13:48:38 +0000 by Mitchell Longan[1] Introduction The European Parliament is currently considering a proposal to address problems of piracy and other forms of copyright infringement associated with the digital world.[2] Article 13 of the proposed Directive on Copyright in the Digital Single Full Article Blog
chi Research on multi-objective optimisation for shared bicycle dispatching By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The problem of dispatching is key to management of shared bicycles. Considering the number of borrowing and returning events during the dispatching period, optimisation plans of shared bicycles dispatching are studied in this paper. Firstly, the dispatching model of shared bicycles is built, which regards the dispatching cost and lost demand as optimised objectives. Secondly, the solution algorithm is designed based on non-dominated Genetic Algorithm. Finally, a case is given to illustrate the application of the method. The research results show that the method proposed in the paper can get optimised dispatching plans, and the model considering borrowing and returning during dispatching period has better effects with a 39.3% decrease in lost demand. Full Article
chi Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article
chi Emotion recognition method for multimedia teaching classroom based on convolutional neural network By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching. Full Article
chi Natural language processing-based machine learning psychological emotion analysis method By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms. Full Article
chi Digital architectural decoration design and production based on computer image By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 The application of computer image digitisation has realised the transformation of people's production and lifestyle, and also promoted the development of the construction industry. This article aims to realise the research on architectural decoration design and production under computer network environment and promote the ecological development of indoor and outdoor design in the construction industry. This article proposes to use virtual reality technology in image digitisation to guide architectural decoration design research. In the comparative analysis of the weight of architectural decoration elements, among the calculated weights of secondary elements, the spatial function has the largest weight, which is 0.2155, and the landscape has the smallest weight, which is 0.0113. Among the three-level unit weights, the service area has the largest weight, which is 0.0976, and the fence frame has the smallest weight, which is 0.0119. Full Article
chi Researching together in academic engagement in engineering: a study of dual affiliated graduate students in Sweden By www.inderscience.com Published On :: 2024-09-02T23:20:50-05:00 This article explores dual affiliated graduate students that conduct research involving both universities and firms, which we conceptualise as a form of academic engagement, e.g., knowledge networks. We explore what they do during their studies, and their perceptions about their contributions to the firm's capacities for technology and innovation. So far, university-industry interactions in engineering are less researched than other fields, and this qualitative study focuses upon one department of Electrical Engineering in Sweden. First, we define and describe how the partner firms and universities organise this research collaboration as a form of academic engagement. Secondly, we propose a conceptual framework specifying how graduate students act as boundary-spanners between universities and firms. This framework is used for the empirical analysis, when exploring their perceptions of impact. Our results reveal that they primarily engage in problem-solving activities in technology, which augment particularly the early stages of absorptive capacities in firms. Full Article
chi Algorithm Visualization System for Teaching Spatial Data Algorithms By Published On :: Full Article
chi Studios, Mini-lectures, Project Presentations, Class Blog and Wiki: A New Approach to Teaching Web Technologies By Published On :: Full Article
chi Making Information Systems less Scrugged: Reflecting on the Processes of Change in Teaching and Learning By Published On :: Full Article
chi Open-Source ERP: Is It Ripe for Use in Teaching Supply Chain Management? By Published On :: Full Article
chi Technology-based Participatory Learning for Indigenous Children in Chiapas Schools, Mexico By Published On :: Full Article
chi Re-purposing Google Maps Visualisation for Teaching Logistics Systems By Published On :: Full Article
chi Business Intelligence in College: A Teaching Case with Real Life Puzzles By Published On :: Full Article
chi A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study By Published On :: Full Article
chi ICT Teachers’ Professional Growth Viewed in terms of Perceptions about Teaching and Competencies By Published On :: Full Article
chi A Database Practicum for Teaching Database Administration and Software Development at Regis University By Published On :: Full Article
chi Using Student e-Portfolios to Facilitate Learning Objective Achievements in an Outcome-Based University By Published On :: Full Article
chi Developing Cross-Cultural Awareness in IT: Reflections of Australian and Chinese Students By Published On :: Full Article
chi Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming By Published On :: Full Article
chi Implementing a Robotics Curriculum in an Early Childhood Montessori Classroom By Published On :: 2015-01-08 Full Article
chi A Debate over the Teaching of a Legacy Programming Language in an Information Technology (IT) Program By Published On :: 2014-12-22 Full Article
chi Teaching an Introductory Programming Language in a General Education Course By Published On :: Full Article
chi Augmenting a Child’s Reality: Using Educational Tablet Technology By Published On :: Full Article
chi A Quantitative Investigation into the Impacts of 1:1 iPads on Early Learner’s ELA and Math Achievement By Published On :: 2015-06-17 Many parents, educators, and policy makers see great potential for leveraging tools like laptop computers, tablets, and smartphones in the classrooms of the world. Although increasing students’ technology access may be associated with increased student achievement, there is little research directly investigating objective measures of student achievement. This study addresses the short-term and long-term quantitative impacts of one of the world’s first school efforts to provide Kindergarten through 3rd grade classrooms with 1:1 iPad access and a range of English Language Arts (ELA) and math Apps. This report summarizes two investigations conducted during this iPad implementation. First, a 9-week pre/post randomized control trial was conducted in which 8 Kindergarten classes used literacy and numeracy apps while another 8 Kindergarten classes used their traditional (non-iPad) resources. At the end of this short implementation period, slightly stronger literacy performance gains were observed in the iPad settings. In a second longitudinal study, three years of assessment data were explored before and after the 1:1 iPad implementation in grades K to 2. Results from the longitudinal study provide emerging evidence of potential increases in ELA achievement, but no consistent results in math achievement. This paper adds to the sparse literature in this area and provides a springboard for further research. Full Article
chi Recognizing and Managing Complexity: Teaching Advanced Programming Concepts and Techniques Using the Zebra Puzzle By Published On :: 2015-06-13 Teaching advanced programming can be a challenge, especially when the students are pursuing different majors with diverse analytical and problem-solving capabilities. The purpose of this paper is to explore the efficacy of using a particular problem as a vehicle for imparting a broad set of programming concepts and problem-solving techniques. We present a classic brain teaser that is used to communicate and demonstrate advanced software development concepts and techniques. Our results show that students with varied academic experiences and goals, assuming at least one procedural/structured programming pre-requisite, can benefit from and also be challenged by such an exercise. Although this problem has been used by others in the classroom, we believe that our use of this problem in imparting such a broad range of topics to a diverse student population is unique. Full Article
chi Learning Circles: A Collaborative Technology-Mediated Peer-Teaching Workshop By Published On :: 2015-04-14 This research study explores peer teaching and learning without a domain expert teacher, within the context of an activity where teams of second level students (~16 years old) are required to create a learning experience for their peers. The study looks at how participants would like to be taught and how they would teach their peers if given the opportunity and examines the support they require, their motivation levels, and if they actually learn curriculum content using this approach. An exploratory case study methodology was used, and the findings suggest that students want varied learning experiences that include many of the elements which would fall under the heading of 21st century learning, that with some support and encouragement they can create innovative learning experiences for their peers, and that they can learn curriculum content from the process. Full Article
chi Teaching Social Media in Business By Published On :: 2015-03-27 The ways people connect, interact, share, and communicate have changed due to recent developments in information technology. These developments, categorized as social media, have captured the attention of business executives, technologists, and education professionals alike, and have altered many business models. Additionally, the concept of social media impacts numerous sub-disciplines within business and has become an important issue with operational, tactical, and strategic considerations. Despite this interest, many business schools do not have courses involving social media technologies and applications. In those that do, the placement and focus of the course varies considerably. This article provides motivation and insight into the process of developing an approach for effectively teaching social media use in business. Additionally, it offers implementation examples of courses taught at three major universities. The article concludes with lessons-learned that will give instructors practical guidance and ensure that social media courses taught in a business school provide students with a solid basis for integrating social media into business practice. Full Article
chi Girls, Boys, and Bots: Gender Differences in Young Children’s Performance on Robotics and Programming Tasks By Published On :: 2016-08-29 Prior work demonstrates the importance of introducing young children to programming and engineering content before gender stereotypes are fully developed and ingrained in later years. However, very little research on gender and early childhood technology interventions exist. This pilot study looks at N=45 children in kindergarten through second grade who completed an eight-week robotics and programming curriculum using the KIWI robotics kit. KIWI is a developmentally appropriate robotics construction set specifically designed for use with children ages 4 to 7 years old. Qualitative pre-interviews were administered to determine whether participating children had any gender-biased attitudes toward robotics and other engineering tools prior to using KIWI in their classrooms. Post-tests were administered upon completion of the curriculum to determine if any gender differences in achievement were present. Results showed that young children were beginning to form opinions about which technologies and tools would be better suited for boys and girls. While there were no significant differences between boys and girls on the robotics and simple programming tasks, boys performed significantly better than girls on the advanced programming tasks such as, using repeat loops with sensor parameters. Implications for the design of new technological tools and curriculum that are appealing to boys and girls are discussed. Full Article
chi Teaching Quality Evaluation: Online vs. Manually, Facts and Myths By Published On :: 2017-12-13 Aim/Purpose: This study aimed to examine whether there is a difference between manual feedback and online feedback with regard to feedback quality, respondents’ percentage, reliability and the amount of verbal comments written by students. Background: The quality of teaching is an important component of academic work. There are various methods for testing the quality of teaching; one of these methods is through students’ feedback. Methodology: This study used a quantitative approach, including the quantification of qualitative verbal data collected through an open question in the questionnaire. A sample of 180 courses was randomly chosen, 90 courses were evaluated manually and 90 were evaluated online. The number of students ranges from 7 to 60 students per course. In total 4678 students participated in the study. Contribution: The findings show that there is almost an identical pattern of feedback of manual and online course teaching evaluation. These findings encourage a continued use of this evaluation method. Findings: No significant differences were found between manual feedback and online feedback in the students’ evaluation of the lecturer/course. The percentage of respondents was significantly higher in the manual feedback than in the online feedback. The number of qualitative comments was significantly greater in the online feedback than in the manual feedback. Impact on Society: The findings of this study refute the claims with regard to the unreliability of an online teaching evaluation. These findings reflect the advantages of using online feedback, such as cost savings, granting more time to students in order to provide feedback, and reducing disturbance during lectures. Future Research: The gender aspect was not taken into account in the study. Therefore, we recommend conducting a follow-up study that will examine gender differences in directions of- difference between male and female lecturers, and differences between male and female students in teaching evaluation. Full Article