892 resultados para Lifelong learning: one focus, different systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper aims at development of procedures and algorithms for application of artificial intelligence tools to acquire process and analyze various types of knowledge. The proposed environment integrates techniques of knowledge and decision process modeling such as neural networks and fuzzy logic-based reasoning methods. The problem of an identification of complex processes with the use of neuro-fuzzy systems is solved. The proposed classifier has been successfully applied for building one decision support systems for solving managerial problem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There are a great deal of approaches in artificial intelligence, some of them also coming from biology and neirophysiology. In this paper we are making a review, discussing many of them, and arranging our discussion around the autonomous agent research. We highlight three aspect in our classification: type of abstraction applied for representing agent knowledge, the implementation of hypothesis processing mechanism, allowed degree of freedom in behaviour and self-organizing. Using this classification many approaches in artificial intelligence are evaluated. Then we summarize all discussed ideas and propose a series of general principles for building an autonomous adaptive agent.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper presents a short review of some systems for program transformations performed on the basis of the internal intermediate representations of these programs. Many systems try to support several languages of representation of the source texts of programs and solve the task of their translation into the internal representation. This task is still a challenge as it is effort-consuming. To reduce the effort, different systems of translator construction, ready compilers with ready grammars of outside designers are used. Though this approach saves the effort, it has its drawbacks and constraints. The paper presents the general idea of using the mapping approach to solve the task within the framework of program transformations and overcome the disadvantages of the existing systems. The paper demonstrates a fragment of the ontology model of high-level languages mappings onto the single representation and gives the example of how the description of (a fragment) a particular mapping is represented in accordance with the ontology model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper presents a different vision for personalization of the user’s stay in a cultural heritage digital library that models services for personalized content marking, commenting and analyzing that doesn’t require strict user profile, but aims at adjusting the user’s individual needs. The solution is borrowed from real work and studying of traditional written content sources (incl. books, manuals), where the user mainly performs activities such as underlining the important parts of the content, writing notes and inferences, selecting and marking zones of their interest in pictures, etc. In the paper a special attention is paid to the ability to execute learning analysis allowing different ways for the user to experience the digital library content with more creative settings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A multipurpose open architecture motion control system was developed with three platforms for control and monitoring. The Visual Basic user interface communicated with the operator and gave instructions to the electronic components. The first platform had a BASIC Stamp based controller and three stepping motors. The second platform had a controller, amplifiers and two DC servomotors. The third platform had a DSP module. In this study, each platform was used on machine tools either to move the table or to evaluate the incoming signal. The study indicated that by using advanced microcontrollers, which use high-level languages, motor controllers, DSPs (Digital Signal Processor) and microcomputers, the motion control of different systems could be realized in a short time. Although, the proposed systems had some limitations, their jobs were performed effectively. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While the robots gradually become a part of our daily lives, they already play vital roles in many critical operations. Some of these critical tasks include surgeries, battlefield operations, and tasks that take place in hazardous environments or distant locations such as space missions. ^ In most of these tasks, remotely controlled robots are used instead of autonomous robots. This special area of robotics is called teleoperation. Teleoperation systems must be reliable when used in critical tasks; hence, all of the subsystems must be dependable even under a subsystem or communication line failure. ^ These systems are categorized as unilateral or bilateral teleoperation. A special type of bilateral teleoperation is described as force-reflecting teleoperation, which is further investigated as limited- and unlimited-workspace teleoperation. ^ Teleoperation systems configured in this study are tested both in numerical simulations and experiments. A new method, Virtual Rapid Robot Prototyping, is introduced to create system models rapidly and accurately. This method is then extended to configure experimental setups with actual master systems working with system models of the slave robots accompanied with virtual reality screens as well as the actual slaves. Fault-tolerant design and modeling of the master and slave systems are also addressed at different levels to prevent subsystem failure. ^ Teleoperation controllers are designed to compensate for instabilities due to communication time delays. Modifications to the existing controllers are proposed to configure a controller that is reliable in communication line failures. Position/force controllers are also introduced for master and/or slave robots. Later, controller architecture changes are discussed in order to make these controllers dependable even in systems experiencing communication problems. ^ The customary and proposed controllers for teleoperation systems are tested in numerical simulations on single- and multi-DOF teleoperation systems. Experimental studies are then conducted on seven different systems that included limited- and unlimited-workspace teleoperation to verify and improve simulation studies. ^ Experiments of the proposed controllers were successful relative to the customary controllers. Overall, by employing the fault-tolerance features and the proposed controllers, a more reliable teleoperation system is possible to design and configure which allows these systems to be used in a wider range of critical missions. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

What qualities, skills, and knowledge produce quality teachers? Many stake-holders in education argue that teacher quality should be measured by student achievement. This qualitative study shows that good teachers are multi-dimensional; their effectiveness cannot be represented by students' test scores alone. The purpose of this phenomenological study was to gain a deeper understanding of quality in teaching by examining the lived experiences of 10 winners or finalists of the Teacher of the Year (ToY) Award. Phenomenology describes individuals' daily experiences of phenomena, examines how these experiences are structured, and focuses analysis on the perspectives of the persons having the experience (Moustakas, 1994). This inquiry asked two questions: (a) How is teaching experienced by recognized as outstanding Teachers of the Year? and (b) How do ToYs feelings and perceptions about being good teachers provide insight, if any, about concepts such as pedagogical tact, teacher selfhood, and professional dispositions? Ten participants formed the purposive sample; the major data collection tool was semi-structured interviews (Patton, 1990; Seidman, 2006). Sixty to 90-minute interviews were conducted with each participant. Data also included the participants' ToY application essays. Data analysis included a three-phase process: description, reduction, interpretation. Findings revealed that the ToYs are dedicated, hard-working individuals. They exhibit behaviors, such as working beyond the school day, engaging in lifelong learning, and assisting colleagues to improve their practice. Working as teachers is their life's compass, guiding and wrapping them into meaningful and purposeful lives. Pedagogical tact, teacher selfhood, and professional dispositions were shown to be relevant, offering important insights into good teaching. Results indicate that for these ToYs, good teaching is experienced by getting through to students using effective and moral means; they are emotionally open, have a sense of the sacred, and they operate from a sense of intentionality. The essence of the ToYs teaching experience was their being properly engaged in their craft, embodying logical, psychological, and moral realms. Findings challenge current teacher effectiveness process-product orthodoxy which makes a causal connection between effective teaching and student test scores, and which assumes that effective teaching arises solely from and because of the actions of the teacher.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Paper Higher education, student affairs and lifelong learning

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While the robots gradually become a part of our daily lives, they already play vital roles in many critical operations. Some of these critical tasks include surgeries, battlefield operations, and tasks that take place in hazardous environments or distant locations such as space missions. In most of these tasks, remotely controlled robots are used instead of autonomous robots. This special area of robotics is called teleoperation. Teleoperation systems must be reliable when used in critical tasks; hence, all of the subsystems must be dependable even under a subsystem or communication line failure. These systems are categorized as unilateral or bilateral teleoperation. A special type of bilateral teleoperation is described as force-reflecting teleoperation, which is further investigated as limited- and unlimited-workspace teleoperation. Teleoperation systems configured in this study are tested both in numerical simulations and experiments. A new method, Virtual Rapid Robot Prototyping, is introduced to create system models rapidly and accurately. This method is then extended to configure experimental setups with actual master systems working with system models of the slave robots accompanied with virtual reality screens as well as the actual slaves. Fault-tolerant design and modeling of the master and slave systems are also addressed at different levels to prevent subsystem failure. Teleoperation controllers are designed to compensate for instabilities due to communication time delays. Modifications to the existing controllers are proposed to configure a controller that is reliable in communication line failures. Position/force controllers are also introduced for master and/or slave robots. Later, controller architecture changes are discussed in order to make these controllers dependable even in systems experiencing communication problems. The customary and proposed controllers for teleoperation systems are tested in numerical simulations on single- and multi-DOF teleoperation systems. Experimental studies are then conducted on seven different systems that included limited- and unlimited-workspace teleoperation to verify and improve simulation studies. Experiments of the proposed controllers were successful relative to the customary controllers. Overall, by employing the fault-tolerance features and the proposed controllers, a more reliable teleoperation system is possible to design and configure which allows these systems to be used in a wider range of critical missions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Among the potentially polluting economic activities that compromise the quality of soil and groundwater stations are fuel dealers. Leakage of oil derived fuels in underground tanks or activities improperly with these pollutants can contaminate large areas, causing serious environmental and toxicological problems. The number of gas stations grew haphazardly, without any kind of control, thus the environmental impacts generated by these enterprises grew causing pollution of soil and groundwater. Surfactants using various techniques have been proposed to remedy this kind of contamination. This study presents innovation as the application of different systems containing surfactant in the vapor phase and compares their diesel removal efficiencies of soil containing this contaminant. For this, a system that contains seven injection wells the following vaporized solutions: water, surfactant solution, microemulsion and nanoemulsion, The surfactants used were saponified coconut oil (OCS), in aqueous solution and an ethoxylated alcohol UNTL-90: aqueous solution , and nanoemulsion and microemulsion systems. Among the systems investigated, the nanoemulsion showed the highest efficiency, achieving 88% removal of residual phase diesel, the most ecologically and technically feasible by a system with lower content of active matter

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The presence of students with Autism Spectrum Disorder (ASD) in regular schools has increased and with it, the need to develop interventional strategies that enhance their learning. One of the tools that can facilitate this process is Mediated Learning, defined as an interaction style where the teacher selects, modifies, enhances, and interprets environmental stimuli in order to promote student learning. In recent years several studies have used the Mediated Learning Experience Scale (MLE; Lidz, 1991) as a tool to assess the mediator behavior. These studies have suggested that the EAM Scale can provide important guidelines for planning educational interventions, particularly those involving students with special needs. In order to extend these findings, this study aimed to evaluate the effects of an intervention based on the Mediated Learning Experience on social / academic skills of a child with ASD, enrolled in the 4th grade of a regular elementary school. This collaborative study was held in the city of Parnamirim, state of Rio Grande do Norte, in 2014. A 9-year old boy with ASD and his teacher participated in the study. The research used a quasi-experimental A-B design (baseline and treatment) to evaluate the teacher's behavior. Qualitative procedures were also used to analyze the dyad´s responses. Teacher and student behaviors were observed in three school routines during baseline. Based on the results of this phase, a training program was designed for the teacher. Dyad behavior was analyzed again after training in the same routines. The results of this phase showed qualitative and quantitative changes in levels of teacher mediation. Additionally, data indicated that the child enhanced his social and academic skills during the intervention.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The electronic journals correspond publishing channels and dissemination of scientific information. Through them, users can spread their studies as well as developing new researches. One of the systems used for creation and e-journals management is the Electronic System for Journal Publishing (SEER), used in the construction of periodic portals, as well as the creation of magazines in isolation. In this purport, it is believed that the management systems and creation of e-journals should be developed (internally and externally) according to the needs of its users. In the case of internal development, some of these processes refer to the copyright registration and submission of articles, which, in turn, are relevant tasks in the editorial process. Thus, the proposed study, thematic Usability of scientific journals, aims to analyze the usability of the copyright registration process and submission of articles in the Electronic System for Journal Publishing through BiblioCanto magazine, part of the Electronic Journals Portal of the Federal University of Rio Grande do Norte (UFRN). For the realization of the research, two valuation techniques were used: the Usability Test with a total of twenty participants and the Cooperative Evaluation, with the same number of participants separated in four categories considered target audience of that magazine, namely: undergraduate students, graduate students, teachers and librarians. The results indicated that the two analyzed processes (copyright registration and submission of articles) need improvement. In the case of the registration process, the following needs are: signalizing of the conducting registration ambient; description and exclusion of requested information on the registration form. In the process of article submission, it is emphasized improvement of aspects: the early steps to submission, signaling of required fields, concise description of the steps, minimization and review of the steps. To this end, it is believed that in general idea the SEER partially meets the needs of its users regarding the usability of such software.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The electronic journals correspond publishing channels and dissemination of scientific information. Through them, users can spread their studies as well as developing new researches. One of the systems used for creation and e-journals management is the Electronic System for Journal Publishing (SEER), used in the construction of periodic portals, as well as the creation of magazines in isolation. In this purport, it is believed that the management systems and creation of e-journals should be developed (internally and externally) according to the needs of its users. In the case of internal development, some of these processes refer to the copyright registration and submission of articles, which, in turn, are relevant tasks in the editorial process. Thus, the proposed study, thematic Usability of scientific journals, aims to analyze the usability of the copyright registration process and submission of articles in the Electronic System for Journal Publishing through BiblioCanto magazine, part of the Electronic Journals Portal of the Federal University of Rio Grande do Norte (UFRN). For the realization of the research, two valuation techniques were used: the Usability Test with a total of twenty participants and the Cooperative Evaluation, with the same number of participants separated in four categories considered target audience of that magazine, namely: undergraduate students, graduate students, teachers and librarians. The results indicated that the two analyzed processes (copyright registration and submission of articles) need improvement. In the case of the registration process, the following needs are: signalizing of the conducting registration ambient; description and exclusion of requested information on the registration form. In the process of article submission, it is emphasized improvement of aspects: the early steps to submission, signaling of required fields, concise description of the steps, minimization and review of the steps. To this end, it is believed that in general idea the SEER partially meets the needs of its users regarding the usability of such software.