Evaluating engagement to address undergraduate first year transition: A case study
- Authors: Holtham, Clive , Martin, Richard A. , Brown, Ann-Marie , Jawaheer, Gawesh , Dove, Angela
- Date: 2012
- Type: Text , Conference paper
- Relation: 4th International Conference on Computer Supported Education, CSEDU 2012 p. 223-228
- Full Text: false
- Reviewed:
- Description: Rapidly changing demands from employers of students of business meant substantial redesign of the first year undergraduate experience whose underlying pedagogy drew on the concept of "high-engagement" learning. This paper focuses on the question of how engagement can be evaluated. It is argued that a variety of "sensors" are needed for evaluation, both quantitative and qualitative. Of particular interest is the use of Moodle logs as an emerging powerful sensor.
Evaluation of safe explosive charge in surface mines using artificial neural network
- Authors: Khandelwal, Manoj
- Date: 2014
- Type: Text , Conference paper
- Relation: 6th International Conference on Agents and Artificial Intelligence, ICAART 2014 p. 366-371
- Full Text: false
- Reviewed:
- Description: The present paper mainly deals with the prediction of maximum explosive charge used per delay (QMAX) using artificial neural network (ANN) incorporating peak particle velocity (PPV) and distance between blast face to monitoring point (D). 150 blast vibration data sets were monitored at different vulnerable and strategic locations in and around major coal producing opencast coal mines in India. 124 blast vibrations records were used for the training of the ANN model vis-à-vis to determine site constants of various conventional vibration predictors. Rest 26 new randomly selected data sets were used to test, evaluate and compare the ANN prediction results with widely used conventional predictors. Results were compared based on coefficient of correlation (R) and mean absolute error (MAE) between calculated and predicted values of QMAX.
A lightweight integrity protection scheme for fast communications in smart grid
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 14th International Joint Conference on e-Business and Telecommunications, ICETE 2017; Madrid, Spain; 24th-26th July 2017 Vol. 4, p. 31-42
- Full Text: false
- Reviewed:
- Description: Due to the mission-critical nature of energy management, smart power grids are prime targets for cyber-attacks. A key security objective in the smart grid is to protect the integrity of synchronized real-time measurements taken by phasor measurement units (PMUs). The current communication protocol in substation automation allows the transmission of PMU data in absence of integrity protection for applications that strictly require low communication latency. This leaves the PMU data vulnerable to man-in-the-middle attacks. In this paper, a lightweight and secure integrity protection algorithm has been proposed to maintain the integrity of PMU data, which fills the missing integrity protection in the IEC 61850-90-5 standard, when the MAC identifier is declared 0. The rigorous security analysis proves the security of the proposed integrity protection method against ciphertext-only attacks and known/chosen plaintext attacks. A comparison with existing integrity protection methods shows that our method is much faster, and is also the only integrity protection scheme that meets the strict timing requirement. Not only the proposed method can be used in power protection applications, but it also can be used in emerging anomaly detection scenarios, where a fast integrity check coupled with low latency communications is used for multiple rounds of message exchanges.
Virtual world technology for developing social work counselling skills in mental health
- Authors: Martin, Jennifer
- Date: 2017
- Type: Text , Conference paper
- Relation: 2017 International Conference on Computer-Human Interaction Research and Applications, CHIRA 2017 p. 95-102
- Full Text: false
- Reviewed:
- Description: When virtual worlds were introduced into post-secondary education in the early twenty-first century this was seen to be a technological innovation that would see widespread uptake in post-secondary human services education. However, the uptake of this technology has been slower than originally predicted. There are a number of examples of virtual worlds used to enhance the student learning experience in nursing, medicine and social work. In this paper a case study is presented of a virtual health centre that was developed for skill development in communication, assessment and intervention for students enrolled in health and human services disciplines. The case study presents evaluation data from the social work students who used this clinic for counselling skill development in mental health settings. The study found that the students were not convinced that virtual world technology was the preferred means for learning in a face-to-face environment as the activity could be easily replicated in the classroom. The discussion and conclusion give rise to a number of considerations for the successful application of virtual reality technology in social work and human services education into the future. Copyright © by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved
Alignment-free cancellable template generation for fingerprint based authentication
- Authors: Nazmul, Rumana , Islam, Rafiqul , Chowdhury, Ahsan
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 4th International Conference on Information Systems Security and Privacy, ICISSP 2018; Madeira, Portugal; 22nd-24th January 2018 Vol. 2018-January, p. 361-366
- Full Text: false
- Reviewed:
- Description: With the emergence and extensive deployment of biometric based user authentication system, ensuring the security of biometric template is becoming a growing concern in research community. One approach of securing biometric data is cancellable biometric which transforms the original biometric features into a non-invertible form for enrolment and matching. However, most of the schemes for generating cancellable template are alignment-based requiring an accurate alignment of query and enrolled images, which is very difficult to achieve. In this paper, we propose an alignment-free technique for generating revocable fingerprint template that exploits the local features i.e., minutiae details in a fingerprint image. A rotation and translation invariant values are extracted from the neighbouring region of each minutia. The invariant values are then used as inputs in a transformation function and combined with a stored and a user-specific key based random vectors using the type and orientation information of the minutiae. Hence, by varying the stored and user-specific keys in the transformation, multiple application-specific templates can be generated to preserve users’ privacy. Besides, if the transformed template is compromised, a new template can be reissued by assigning different keys for transformation to achieve revocability. Furthermore, the proposed approach preserves the actual geometric relationships between the enrolled and query templates even after transformation and offers reasonable recognition rate. Experiments conducted on FVC2000 DB1 demonstrate that the proposed method exhibits promising performance in terms of recognition accuracy, computational complexity, security along with diversity, revocability and non-invertibility that are the key issues of cancellable template generation.
- Description: ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy