The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An unusual career trajectory led to the intersection of computer science and social science—and a new perspective on gender diversity in computing. This is one of five articles providing personal perspectives on gender diversity in computing. The Web extra at http://youtu.be/S8OFA0J7iR4 is a video interview in which Kate Starbird, an assistant professor in the Department of Human Centered...
Virtual reality and simulation are becoming increasingly important in modern society and it is essential to improve our understanding of system usability and efficacy from the users' perspective. This paper introduces a novel evaluation method designed to assess human user capability when undertaking technical and procedural training using virtual training systems. The evaluation method falls under...
With the rapid advancement of hardware efficiency in recent years, computation power has significantly improved, increasing the speed and depths of the game tree search in computer chess programs. However, to satisfy the need of increasing search depth, the investment in hardware is no longer personally affordable. Thus, another method must be found in addition to improving the efficiency of hardware...
In many decision problems, there are two levels of choice: The first one is strategic and the second is tactical. We formalize the difference between both and discuss the relevance of the bandit literature for strategic decisions and test the quality of different bandit algorithms in real world examples such as board games and card games. For exploration-exploitation algorithm, we evaluate the Upper...
This paper presents a unified action recognition framework combining harris3D descriptor with 3D SIFT detector. We perform action recognition experiments on the KTH dataset using Support Vector Machines. Experiments apply the leave-one-out and compare our proposed approach with state-of-the-art methods. The result shows that our proposed approach is effective. Compared with other approaches our approach...
A main challenge facing the law-enforcement and intelligence-gathering environment is accurately and efficiently analyzing the huge volumes of data. Analyzing crime data can be difficult because of recognizing key features and transactions among the large amounts of data, of which only a small section is relevant to illegal process. An intelligent forensic system (IFS) is a powerful medium that enables...
In the ever growing literature on countering the cyber threat, the so-called JDL model of data fusion, well established in the information fusion community, has been applied to characterize the inner structure of problems within cyber defence and their mutual relationship. The overarching goal is to provide contributions to comprehensive cyber situational awareness by producing timely situation pictures...
Web-based language learning (WBLL) environment has provided English education a new arena where learning and teaching activities are vivified by the feats of computer and internet technology. A full development of learner autonomy can conduce to success in web-based English learning. This paper aims to find out ways to improve learner autonomy to achieve Chinese students' success in web-based English...
This paper describes an architecture for controlling non-player characters (NPC) in the First Person Shooter (FPS) game Unreal Tournament 2004. Specifically, the DRE-Bot architecture is made up of three reinforcement learners, Danger, Replenish and Explore, which use the tabular Sarsa(λ) algorithm. This algorithm enables the NPC to learn through trial and error building up experience over time in...
Confronting conflicts and coping with them is part of social life, since conflicts seem to arise in almost every context and developmental stage of human life. The personal and collective gains that follow conflict resolution have motivated scholars across many research fields to advocate the use of pro-social mechanisms for resolution. The Siren serious game aims to support teachers' role to educate...
An algorithm is a consequence of logical instructions that, once executed, reduce to a result and it is not always evident to good understand its functioning. The progression of the technologies of information and communication and its availability in the teaching and in the learning offer the possibility to put at the disposal of the learners the tools that facilitate their learning. The algorithmic...
Office advanced application curriculum is a strong operational and practical course. It is hard to master the knowledge of office using traditional teaching mode. To solve this issue, a teaching model based on activity theory is proposed. In order to further understand the application of activity theory in office teaching, the teaching design of PowerPoint was discussed in this paper. The teaching...
Computers are not merely data-processing devices. They are an unlimited vast world that enables virtual life. This paper maintains that humans are paradoxical beings who want private and secret life on one hand, and make their thoughts and actions public and open on the other hand. Coining the notion of the Privacy-Openness (PO) game that humans play, this paper reveals that such paradoxical desire...
This study investigated students' experiences in two types of instructional strategies (i.e., fully-guided and partially guided) and their learning experience patterns from the beginning towards the end of the computer-based interactions. An empirical study was performed on 41 students from a public university in Malaysia using two types of computer-based systems for learning Basic Computer Networks...
There are many arguments for and against the use of autonomous-agents in intelligent environments. Some researchers maintain that it is of utmost importance to give complete control to users, and hence greatly restrict autonomy of agents, whereas, others believe that is it preferable to increase user convenience by allowing agents to operate autonomously on the user's behalf. While both of these approaches...
This paper explores the ethical issues in information communication technology (ICT) in Malaysian primary schools. Among ethical issues that have been identified are cyber crime, cyber bullying, internet fraud, hacking and others. However, cyber bullying are the major ethical issues in Malaysian primary schools. In this study, quantitative methodology has been chosen by distributing questionnaire...
Information technology currently supports the development of human interaction with virtual environment, this development will continue in developing in the form of Human Computer Interaction (HCI). In this study, how the environment 3D virtual computer should be able to recognize human hand as part as virtual object, so it can interact with virtual environment. HCI is a study in which the relationship...
The education of natural disaster response preparedness is getting more and more attention internationally. Nowadays, the relevant researches and development of the instructional games with the instructional theme based on a natural disaster situation are still limited. Therefore, this paper combines a design of situated learning strategy and develops an adventure game with a simulated situation of...
Web rapid development has provided new learning environments, bringing online education as a necessity in many sectors of the society. In such an environment, selecting supervisor is a critical decision that graduate students as well as professors are involved with which could benefit from e-learning tools. In this paper we have proposed ADAM, an ADvisor Agent Modeling system, which is a solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.