A Logistic Regression Model for Student Retention
Bialaszewski, Dennis; Dalrymple, Margaret; Harmon, Michael (United States)
ABSTRACT:
Student retention has become a highly studied area for many colleges in the United States and Canada. Since resources are often allocated based upon student enrollment, knowing what factors can impact student retention are especially important. This study, utilizing a large data set of 5,083 students, analyzes 39 independent variables that enter into the retention of students. A
Logistic Regression approach is employed in order to determine the statistically significant variables in determining the probability of a student being retained.
A Methodology for the Automatic Identification and Classification of EEG Waves Based on Clinical Guidelines
Ramírez-Fuentes, C. A.; Tovar-Corona, B.; Silva-Ramírez, M. A.; Barrera-Figueroa, V.; Garay-Jiménez, L. I. (Mexico)
ABSTRACT:
In order to identify abnormal behaviors related to epileptic seizures and other neurological disorders, in this paper, it is described a methodology with a clinical approach to classify events shown in EEG recordings, based on the international standards and current guidelines. According to medical definitions, for this work the EEG signal was classified into suppressions, rhythms, frequencies and abnormal behaviors, obtained from several combinations of the signal’s parameters: amplitude, frequency and patient’s age. The mean of peak values was used to obtain the amplitude. The Fast Fourier Transform and high-pass filters were used to extract the dominant frequency. A set of 192 segments of one second duration, randomly selected from 7 patients, were evaluated and their behavior was identified and classified into 13 classes. It was obtained an efficiency of 96.35%. This method found abnormal behaviors related to epileptic seizures and other kinds of neurological disorders. This method identifies abnormal events, their timing and cortical distribution, making possible the extraction of seizure’s segments for further feature analysis.
A Reflection about Integrating Research, Education, and Problem Solving – Seeds of the 9th IMCIC 2018 (Invited Paper)
Rioga, Danielle do Carmo Pimenta; Baracho, Renata Maria Abrantes (Brazil)
ABSTRACT:
This paper refers to the Conversational Panel -
Integrating Research, Education, and Problem Solving from the
authors and presenters Professor T. Grandom Gill, Dr. Suzanne
Lunsford and Dr. Nagib Callaos. It was presented on the 9th
International Multi-Conference on Complexities, Informatics
and Cybernetics: IMCIC 2018 that took place in March from the
13th to the 16th in Orlando, Florida USA. The first topic of the
paper is the Introduction that explains the conference purpose and
what was exposed during the talk. The second point is The
Presentation and the Talk itself illustrating the main subjects that
were discussed between the presenters and the participants of the
conference. On the third theme the reality of Brazil is brought up
in details exemplifying the relation between the university and
the industry. In the Conclusion, which is the fourth issue, some
alternatives for the matters discussed are exposed. As a result,
there is the notorious agreement of the importance of the
discussion involving different researchers from various parts of
the world emphasizing the goal of expanding applied research to
solve problems of the society as a whole.
Airflow Station Controlled by PID and Fuzzy Controllers Using a Low Cost Card for Didactic Uses in Controllers’ Evaluation
Pilatasig, Marco; Chacón, Galo; Tapia, Víctor; Silva, Franklin; Acurio, Andrés (Ecuador)
ABSTRACT:
This paper presents a flow station implementation where the control can be carried out by using two algorithms: PID proportional integral derivative control and the fuzzy control. Both programmed in a low cost board. In this plant, the engineering students will be able to evaluate the behavior of the two control algorithms applied to an airflow station. The temperature variable is displayed in an HMI, the same one that is developed using python. The system implemented is easy to use and allows the students of the Electronics Programs to programing embedded systems using free software and improve the teaching-learning process in the Process Control subject.
An Approach to Communication for ICN and MANET Using a Softwarized Infrastructure
Kodama, Satoshi; Nakagawa, Rei (Japan)
ABSTRACT:
the philosophy behind TCP/IP networks into question. The combination of information-centric networks (ICNs) and mobile ad hoc networks (MANETs), which are innovative nextgeneration networks, is expected to lead to exciting
developments. In MANETs, node mobility increases the complexity of IP address management because the IP address is also used to identify the node’s current domain. We can therefore expect that this management overhead would be significantly reduced by treating the domain locator as additional information,
based on node information that can remain fixed. In addition, there has been little discussion of how this could be used in practice or how to implement a system that achieves this on a MANET from a network engineering perspective. This paper is the first to study this from a network engineering perspective and
aims to design a communications infrastructure for disaster victims using an ICN and a MANET, together with a means of attaching domain information and a new Name Resolution Protocol. We believe that these elements will be stepping stones on the road to constructing an information-centric MANET.
An Empirical Analysis of Data Security in a University Anchored Community Wireless Database against External Hackers
Kuchibhotla, Hari N.; Garrison-Alexander, Emma (United States)
ABSTRACT:
The ability to seamlessly connect various digital devices with its users, customers, and associated stakeholders is vital for the success of any organization operating in this technologically advanced world. The emergence of wireless equipment, and the ease in setting up wireless equipment has created tremendous opportunities for different organizations, and in particular for universities, by partnering with their local communities to create a
university anchored community wireless network. This will provide greater opportunities for students attending those universities to be part of the community-based initiatives, and universities can use the network as a source to fund some of its research. One of the main concern in a Community Wireless Network is to protect data,
specifically protection of data that resides in databases and stored in a persistent storage device such as disk. Encryption can provide strong security for data, but developing a database encryption and decryption strategy must take many factors into consideration. A multi-level encryption strategy is an effective way to achieve security
for data at rest.
Relational databases (RDBMS) and big data stores are one of the main targets for hackers due to the amount of sensitive information residing within, such as personally identifiable information and intellectual property. Many organizations fall victim to database intrusions because of common database flaws and lack of database audits and practices. To address their ever-expanding network perimeters that become more obvious as they expand
exponentially, organizations need to push data security much deeper to minimize the risk of compromise and fulfil various compliance requirements by adopting data protection measures throughout the database.
One of the main challenges associated with Community Wireless Network (CWN) is the protection of data hosted on their databases as it contains confidential information. Unless this data is protected and properly secured, this sensitive data might be exposed to potential hackers in this easily targeted cyber security breach world. This research will employ empirical research methods to understand the factors and access controls that influence and make data vulnerable to the external attackers. This will involve analyzing security at six distinctive elements that were essential in understanding the data security. These are: database backups, logs, overall database, object, row, and columnar levels.
This research will focus on analyzing data encryption and decryption techniques and access control mechanisms to secure databases against potential external hackers. This research will aspire to create and validate database encryption and decryption methodology using an Oracle-12c database on a Windows Operating System. Analyze and suggest different ways of protecting sensitive data against cyber criminals by securing data at various levels.
Improvements proposed will be made through research into the subject area in a University Anchored CWN.
An Performance Analysis of a PSO-Based Algorithm for Swarm Robotics
Melo, Rodrigo; Santana Junior, Clodomir J.; Albuquerque, Caio Victor E.; Campello Oliveira, Sergio (Brazil)
ABSTRACT:
The development of an algorithm responsible for coordinating a group of autonomous robots is a challenging research topic, which is frequently addressed by researchers in Swarm Robotics field. Hence, Swarm Robotics and Swarm Intelligence share a great number of principles. Therefore, it is common to adapt algorithms from the swarm intelligence to coordinate swarms of robots. The Particle Swarm Optimization is a well-known swarm algorithm, which can be adapted to coordinate a swarm of robots. In this work, the performance of a PSO-based algorithm was assessed in two different maps. The first map simulates an open area with obstacles, while the second map has the characteristics of an apartment. To analyze the impact of the fitness function in the algorithm performance, three different fitness functions were used. The results achieved in both maps are not only satisfactory, but revel the importance of the fitness function to the swarm performance.
Assignment of Resources in Distributed Systems
La Red Martínez, David L.; Acosta, Julio C.; Agostini, Federico (Argentina)
ABSTRACT:
In distributed processing systems it is often necessary to coordinate the allocation of shared resources that should be assigned in the processes in the modality of mutual exclusion; in such cases, the order in which the shared resources will be assigned in the processes that require them must be decided; in this paper we propose an aggregation operator (which could be used by a shared resources manager module) that will decide the order of allocation of the resources to the processes considering the requirements of the processes (shared resources) and the state of the distributed nodes where the processes operate (their computational load)
BIM as a Structural Safety Study Tool in Case of Fire - BIMSCIP
Porto, Marcelo Franco; Franco, José Ricardo Queiroz; Correa, Luiza Giori Barcellos; Alves, Lucas Vinicius Ribeiro; Baracho, Renata Maria Abrantes (Brazil)
ABSTRACT:
In making a brief recapitulation, one can see that the invention of technological instruments was present throughout the history of mankind. This is because one of the major functions of technology and the reason why many researchers are committed to its improvement is the development of new tools that allow
human life to improve, whether it is in order to overcome difficulties, optimize time, safety or others. In this article we will discuss how technology can be used to contribute to the safety of humans with regard to fighting fire and panic. The goal is to provide a faster and less error-prone standard checking process
than the manual method currently in use. The process of creating a plug-in for a BIM environment, to verify compliance of the standards of the Fire Department of Minas Gerais will be described. Emphasis will be given to the development of a code to implement the automatic checking of a group of technical instructions for the structural safety of buildings in cases of fire. The project was developed inside the Federal University of Minas Gerais, sponsored by the Federal Government, and will be given to the Fire Department as a donation, in order to contribute for society. The plug-in is already able to read the project and
return consistent results.
Biometric Encryption System for Increased Security
Jayapal, Ranjith; Govindan, Pramod (United States)
ABSTRACT:
In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Biometrics serve as a method to replace the cumbersome use of complex passwords. By using a Biometric Encryption method, one can personalize the biometric to encode a PIN, a password, or an alphanumeric string, for a multitude of applications such as, bank ATMs, building access, and computer terminal access. Moreover, the database only needs to store the biometrically encrypted PIN or password, not the large biometric sample.
Blockchain and Data Protection: The Value of Personal Data
Fabiano, Nicola (Italy)
ABSTRACT:
It is a challenge to define the Internet of Things (IoT) due to its technical and conceptual complexity. The IoT system allows you to transfer data on the Internet, including personal data. In this ecosystem there is an emerging phenomenon, basically a technical system, named blockchain. There are public
blockchain and private blockchain, but we know that it could also be a combined blockchain (consortium blockchain). Apart from the highly technical solution, hence, we cannot dismiss the legal obligations, where they are applicable, like in Europe, according to the General Data Protection Regulation (GDPR). It
is important to highlight the differences between privacy and data protection: they are not the same. We cannot dismiss that personal data is a value and it needs adequate protection. The focal point is to highlight if the privacy and data protection law (especially the GDPR) could be applied to the blockchain
considering its technical structure. Consequently, it is important to emphasize that the security measures are not enough to comply with privacy and data protection existing laws. Artificial Intelligence systems may facilitate every single step in the processing of personal data.
Building an Application Agent for the Semantic Web: A Case Study
Zlatareva, Neli; Swaim, Nathan; Fitzgerald, Marc; Bagheri-Marani, Shiva; Watkins, Janine (United States)
ABSTRACT:
The latest evolution of the World Wide Web, known as the Semantic Web, is intended to make the huge repository of information available on the web “computer-friendly”. Giving computers a direct access to various digital libraries and information resources will dramatically improve current web services allowing for unprecedented cooperation between humans and machines. This paper presents a small-scale application to illustrate the advantages of Semantic Web technologies compared to relational databases which are still the most prevalent information technology. We discuss the technologies that our application agent is built upon and describe how these technologies are utilized to search through simulated computer-friendly web sites, collecting and evaluating information to address user queries. Two example scenarios are presented to illustrate the retrieval capabilities of our agent.
Collaborative Design Decision Assisted by Modeling & Simulation: A Cardiac Pacemaker Case Study
Fernandes, Ramon; Onisto, Haroldo; Medeiros Jr., Johannes (Brazil)
ABSTRACT:
In a collaborative interdisciplinary system design and development, it is a no trivial task find those able to overcome the “linguistic barrier” among disciplines and domains, and also fully exercise the roles of Domain experts and Search experts. Considering this problem, we claim that a visual analytics based M&S sensemaking approach can fill this gap and additionally supports insightful contributions from designers and stakeholders with different levels of expertise and different backgrounds. In particular, a cardiac pacemaker case study is presented that illustrate how this approach helps to provide meaningful insights from engineers, physicians, and other stakeholders to support decision making.
Comparative Analysis between Routing Methods Systems Applied to the Rural School Transport Problem in Brazil
Porto, Marcelo Franco; Nunes, Nilson Tadeu Ramos; Vianna de Carvalho, Izabela Ribas; Teixeira, Raphael Bruno Alves; Fonseca, Marina Oliveira; Alves, Lucas Vinicius Ribeiro; Baracho, Renata Maria Abrantes (Brazil)
ABSTRACT:
Considering the specificities of Rural School Transport, the School of Engineering at the Federal University of Minas Gerais /UFMG, developed a methodology to calculate school bus routing. The assumption was that the model should be intuitively handled. In the present article, the proposed model is compared to traditional routing methods: TransCAD and ArcGIS.The city of Santa Leopoldina/ES, in Brazil was chosen as a case study. The objective of this article is to evaluate the benefits added to the new proposed methodology.
Component-Based System Design Guided by an Apparent-Ontology: A Case Study in Ultrasound Imaging
Fernandes, Ramon; Onisto, Haroldo (Brazil)
ABSTRACT:
Component-based development has been widely used in software engineering as a foundation for reducing development and production cost and the time-to-market. Because of this, different research groups have studied component-based development and its composability property under different levels and perspectives. Nevertheless, the component-based approach lacks formalism to system decomposition and composability. This paper suggests an empirical framework – presented as a case study – based on information-transformation, which can be used for two purposes: (1) to decompose the problem-solution space, bringing meaning to the composition in terms of a Function-Behavior-Structure schema; and (2) to create the component library applying an apparent ontology based on identified primitives.
Computational Geometry Estimation of Single Hidden Layer Size in Feedforward Neural Network Classifiers
Majalca, Ricardo; Acosta, Pedro Rafael (Mexico)
ABSTRACT:
In this paper, a method to estimate the size of a Feed-Forward Neural Network when using only one hidden layer is presented. The considered method uses a heuristic technique for establishing the size of the hidden layer. It is based on the determination of an underlying frontier among classes, on any separable classification problem. The frontier is approximated using a set of hyperplanes. Based on such a frontier, the number of hidden neurons is estimated. The method was applied to many data sets for classification, showing some advantages in classification accuracy. To illustrate the method and results, three representative examples are included in this paper. The method may be used to get an estimation of the size of the hidden layer or as the initial size of the hidden layer, on any constructing method for building feed forward neural networks if a better accuracy is needed.
Computer-Aided Innovative Methodology for Management and Personalized Representation of Big Data in Cultural Heritage
Alexakis, Emmanouil; Kapassa, Evgenia; Touloupou, Marios; Kyriazis, Dimosthenis; Georgopoulos, Andreas; Moropoulou, Antonia (Greece)
ABSTRACT:
This study, aims to achieve a straightforward methodology for affordable but of high quality and precision modeling of cultural heritage data and its exploitation towards the delivery of personalized content. Nowadays, as more and more scientific disciplines are engaged within the wider field of cultural heritage, high tech means have subsequently permeated in the field resulting in systematic generation of data by the respective experts, that in turn suggests a gap to be bridged not only in the level of the data diversity but also in the level of data archiving and interoperability. For example, three-dimensional (3D) representation has been an effective mean for studying and disseminating the built environment particularly the one of the cultural heritage. Especially during the past decade, the extended grow of the technical means and the development of standard algorithms have enabled a standardized process for automatic or semi-automatic 3D model generation. This has led to more and more researchers with various backgrounds (e.g. material scientists), to aspire to integrate the aspect of 3D virtualization within their work but there are limitations concerning the amount of the data that have to be managed. To facilitate these restraints, there is the need of a scalable platform to manage this cultural heritage data in three discreet modular levels: a) lower level of (raw) data collection (acquisition and storage), b) middle level of data analytics (correlation, contextualization, knowledge extraction and user-specific annotations) and c) higher level of data representation (interpretation and visualization). For a successful implementation, the interoperability of the data is a prerequisite as it allows the interlinking and correlation among them. The case study over which the methodology has been implemented is the recently rehabilitated Holy Aedicule of the Holy Sepulchre in Jerusalem. The interdisciplinary approach followed in every rehabilitation stage-phase produced a vast amount of data that that must be integrated in order to fulfill the prerequisite of data interoperability. To address this issue, the present study will provide the missing layer that enables the semantic labeling of multiple object categories: data processing and filtering, data type and properties, spatial representation/visualization data etc. As a result, the derivatives georeferenced high-resolution 3D models are transformed concluding in a multi-resolution model management on an interactive web platform.
Forensic Analysis of Windows 10 Volume Shadow Copy Service
Ghafarian, Ahmad; Hills, Ethan D. (United States)
ABSTRACT:
The Windows Operating System features a service called Volume Shadow Copy Service (VSS) that may provide evidential information to computer forensic investigators. Since Windows XP, the VSS has been utilized to take a snapshot of the active hard drive to be used in necessary recovery procedures. Originally designed to backup only operating system files, the VSS has become a popular OS software for third party recovery and backup programs for all file types. The volume shadow copy is a service actively running on Windows 10 by default that is triggered by either a Windows update or installation of new software. The forensic value of VSS becomes apparent when investigators are looking for suspicious activities such as deleting files. Comparing shadow copies is crucial for forensic investigators, as old shadows may prove valuable towards an investigation. In this paper, we develop a framework for the forensic analysis of Windows 10 VSS. We then use the framework to extract, analyze and demonstrate the forensic value of volume shadow copy in any forensic investigation.
Holistic Understanding of Challenges with Autonomous Vehicles
Bechor, Tamir; Zhang, Hengwei; Cruz, Leonard (United States)
ABSTRACT:
The increased presence of computers and interconnectedness in automobiles presents challenges and risks in effectively managing the advancement of a technology that society can benefit from. This set of problems is diverse and is not explicitly technical with some concerning social acceptance, liability, and cybersecurity. The amount of data that describes the current conditions and forces shaping autonomous vehicles is overwhelming to process. The intent of this paper is to provide a foundational understanding of associated challenges by reducing and ordering this data into consumable sets for drawing practical conclusions and relationships. The strategic goal of this research is to lay the groundwork for a Governance, Risk Management, and Compliance (GRC) framework that enables organizations to effectively manage risks associated with autonomous vehicles.
Humboldt’s Vision of a Smart(er) World
Doherr, Detlev; Jankowski, Andreas (Germany)
ABSTRACT:
In the 19th century Alexander von Humboldt explored the nature and was conceived a new vision of nature that still influences the way we understand the new world. Humboldt believed in the importance of accurate measurements and precise description of observations. His vision of nature included not only facts but also emotions. Nowadays smart solutions will be developed by using computer technology, which will influence our relationship to nature, our handling of the complexity and diversity of nature itself and the technological influences on the society. Could we avoid a new form of “Colonialism”, when a network of super computers will create a smarter world?
Information Modeling and Information Retrieval for the Internet of things (IoT) in Buildings
Baracho, Renata Maria Abrantes; Cunha, Izabella Bauer de Assis; Pereira Junior, Mário Lúcio (Brazil)
ABSTRACT:
The ability to monitor and analyze real-time information generated by sensors and devices is a differential to maximize employee effectiveness and productivity in organizations, reduce unscheduled downtime, increase production quality and minimize the risk of accidents. The implementation for effective smart building requires deep study of information systems, monitoring objectives with the data collection and analysis and reflection on concepts, representation, goals and occupations of buildings. This research is focused on the application of technologies within the domain of Architecture, Engineering and Construction (AEC). The objective is to identify the stage of current literature on the topics Information Modeling, Information Retrieval and Internet of Things (IoT) in buildings. It is also to discuss concepts and advances Smart Building, Building Automation, Intelligent Building and Information Modeling Building (BIM). Finally, it is proposed for the implementation of IoT in a research laboratory of UFMG. For this, the bibliographic research method was used in the main multidisciplinary databases and complete bases of the Information Science area, which proves the complementarity and interconnection between the concepts. The smart lab experiment is a proof of concept proposal that through practice makes simulations for real solutions like validation. The results demonstrate that the implementation of IoT provides new insights into the behavior of people and the environment, supporting the identification of standards and setting precedents for optimization.
Interaction Paradigms on iTV: A Survey towards the Future of Television
Silva, Telmo; Almeida, Pedro; Abreu, Jorge; Oliveira, Eliza (Portugal)
ABSTRACT:
One of the main research subjects in the interactive TV (iTV) field is related to the conceptualization of innovative user interfaces. The attention of the scientific community in this area is quite extensive, since the television continues to represent a significant role in everyday life. This paper presents a survey based on recent scientific publications that discuss innovative trends of interaction with television as well as TV features currently being studied and developed paving the way for future releases to the market. In this context, the main goal of the paper is to address several approaches with potential to predict what we can expect in the following generations of iTV solutions. To accomplish this, a systematic survey in the databases of ACM and IEEE was conducted, focusing on publications addressing advances in user interfaces and their related interaction paradigms. The results digested from the 31 selected articles provide a discussion about how the next probable ways of interaction with television can influence people daily life.
Machine Learning Security Vulnerabilities in Cyber-Physical Systems
Clark Jr., George W.; Doran, Michael V. (United States)
ABSTRACT:
Machine learning is increasingly being used in cyber-physical systems that include robots, autonomous vehicles, and military drones. As these cyber-physical systems are capable of inflicting harm on humans, the security of the machine learning components of these systems should be examined. This paper
reviews the current research in the field of adversarial machine learning including attack surface, threat models, attack methods, and defenses. It analyzes how this research can be applied to cyber-physical systems and extends upon a previously developed embedded system attack classification to include attacks on machine learning, and provides scenarios of such attacks. Finally, future work for experimentation on machine learning attacks is proposed.
Modern Information-Communication Methods of Analysis and Models of Complex Socio-Technical Systems
Buslaev, Alexander; Yashina, Marina (Russian Federation)
ABSTRACT:
Modern revolutionary changes in information-communication technology provides a qualitatively different level of full-scale tests and experimental data in many science fields and human activities. New trends are associated with the emergence of global human-machine systems, where the benefits of human intelligence are amplified capabilities of info-communication networks; engineering of cognitive systems. We discuss the problems of mathematical models for complex social-technical system in the case of Moscow traffic flow network. The analysis of modeling approaches and overview of models are developed. The info-communication ways of cognitive system for risk taking and aggressive driving behavior have been proposed.
Moving from Cloud to Fog: Implications and Challenges
Javidi, Giti; Sheybani, Ehsan; Rajabion, Lila (United States)
ABSTRACT:
With the rapid growth of internet of things (IoT) applications, the traditional centralized cloud computing is encountering severe challenges, such as high latency, low spectral efficiency (SE), and non-adaptive machine type of communication. Motivated to solve these challenges, fog computing is driving a trend which shifts the function of centralized cloud computing to the edge devices of the network. Fog computing extends the Cloud platform model by providing computing resources on the edges of a network. Fog computing (a term created by Cisco Systems Inc.) can enhance and complement cloud and is capable of processing large amounts of data locally and can be installed on heterogeneous hardware. In this article, we will discuss fog computing, its advantages, and its current applications. We will also present existing literature on fog computing applications to identify challenges and potential research directions aimed at using fog computing to extend cloud capabilities.
Obtaining Parking Information and Exporting it for Broadcasting Using TPEG, TMC, and DATEX II
Wahl, Harald; Galler, Rudolf; Reicher, Lukas; Klauser, Christian; Kaufmann, Christian; Mense, Alexander (Austria)
ABSTRACT:
Providing parking information can help to reduce travel time and fuel consumption, respectively. This paper presents a practical and theoretical approach how parking information could be obtained in Austria (especially in Vienna) and how it could be exported into the three main transport information technologies, i.e. Traffic Message Channel (TMC), Transport Protocol Experts Group (TPEG), and DATEX II. Furthermore, we describe how parking information could be obtained with Open Source software called TALEND and the facing problems due the implementation.
On-Line E-Portfolios in Higher Education - A Multidisciplinary Approach (Invited Paper)
Lunsford, Suzanne K.; Slattery, William (United States)
ABSTRACT:
The Science Teaching for Ohio’s New Economy (STONE) and Partners in Earth System Science (PIES) professional development programs are long term, collaborative experiences for in-service k-12 teachers. The summer and academic year components of both programs are designed to increase the integrated science content, pedagogical knowledge and technological abilities of teams of K-12 teachers in high need Ohio school districts. Teachers selected for participation are from schools serving a population of students who are approximately 63% economically disadvantaged. Each of the programs are composed of three distinct phases. These are Phase I Summer field and lab experiences, Phase II on-line internet experiences where the E-portfolios are developed and implemented and Phase III academic year web conferences to continue the development of the E-portfolios, assess students learning gains in content and discuss future plans. The participating teachers serve as catalysts and mentors to other teachers in their schools and districts, driving curriculum change within their school buildings and school districts. The development of E-portfolios are a critical element of both the STONE and PIES programs. During the academic year, Participants of both the STONE and PIES programs meet in an online setting to develop and share classroom activities, strategies to assess student learning in inquiry-based activities and share plans to continue their activities in the future.
Predicting and Explaining Security and Control of Mobile Payment Transaction: Financial/Health Institution
Bayaga, Anass (South Africa)
ABSTRACT:
The current conceptual research paper examines how to enhance security and control of mobile payments transaction (SCMPT). This is done by analyzing potential nuances in predicting and explaining SCMPT with a focus on financial and health institutions. Based on the nature and scope of the conceptualisation, taking into account unified theory of acceptance and use of technology (UTAUT); five aims have been recommended to predict and explain SCMPT. Following the aims, various practices and literature, it was revealed that the results could be used to enhance the design, implementation and choice of identity credentials for mobile payment transactions.
Punchlines and Plot Twists. Exploring the Relationships between Consciousness, Cybernetics, and Information Theory
Nugent, Paul D. (United States)
ABSTRACT:
Conscious awareness of one’s physical environment and of one’s own knowledge of the world represents a highly complex cybernetic system of information signaling and interpretation. This paper explores the notion that while Shannon’s theory of information may be applicable to some aspects of consciousness, there are others in which it seems to break down and this opens up new theoretical spaces. In particular, Wittgenstein’s duck-rabbit
figure, plot twists, and joke punchlines are used to illustrate that it is through contextual information associated with a message, as opposed to additional information within the message, that human consciousness is able to reduce noise and interpret meaning. Some general boundary conditions and considerations of weak versus strong signaling are also presented to encourage new lines of thinking relative to cybernetics, information theory, and human consciousness.
Real World Experience: Developing Novel Sensors - An Interdisciplinary Approach (Invited Paper)
Lunsford, Suzanne K.; Zhai, Lei; Slattery, William (United States)
ABSTRACT:
The Development of environmental sensors to detect harmful heavy metals and phenols in water have been an increased concern in the last few years. Our interdisciplinary approach to an inquiry -based lab experiences with the development of modified electrode sensors to detect heavy metals and phenols simultaneously without the need for prior separation has built a stronger tie to real world issues. The problem-based approach of how to develop an electrochemical sensor for heavy metal detection has gained momentum due to increased exposure to Lead (Pb) and Cadmium (Cd). Pb and Cd are neurotoxins in children with chronic exposure and there is a need for a reliable method to analyze heavy metals (Lead and Cadmium) in environmental and biological samples. Thus electrochemical techniques were integrated with the development of Carbon Nanotubes with selective polymers modified on to electrode surfaces with nanoparticles to enhance the detection of phenols and heavy metals will be discussed with real-world applications integrated with industry. The students have shown an enhancement in content knowledge gains with the problem-based real-world analysis of sensor development compared to the lecture based format of teaching. Also, students’ collaboration among different universities/departments and industrial settings to learn novel instrumentation such as Scanning Electron Microscopy (SEM) have built upon their interdisciplinary approach as well.
Real-Time Implementation of Model Predictive Control in a Low-Cost Embedded Device
Espinoza, John *; Buele, Jorge *; Castellanos, Esteban X. *; Pilatásig, Marco *; Ayala, Paulina *; García, Marcelo V. ** (* Ecuador, ** Spain)
ABSTRACT:
This document presents a general description of the implementation of a low-cost system for flow control. A preconditioning of the signal coming from the process to be controlled is carried out and, through Arduino UNO, data is acquired. Using this data in the embedded board Raspberry Pi 3, a predictive control by model (MPC) has been implemented in real time. The plant model is obtained using the identification tool of the MATLAB software. The design of the controller which are in the latest version of this software, has been developed in Simulink using the new complements made for this board. The experimental results show that despite the technical limitations and the high computational cost that this controller represents, both devices can work together and present high performance, robustness and good response in the presence of disturbances.
Real-Time Sentimental Polarity Classification on Live Social-Media
Alhayyan, Khalid N. *; Ahmad, Imran ** (* Saudi Arabia, ** Canada)
ABSTRACT:
In recent years, the popularity of social media networks has attracted the attention of researchers, government agencies, politicians and business world alike, as a powerful platform to find real-time trends. The data generated by social media offers an opportunity to investigate people's behaviors and activities based on this data, but the high velocity and low quality of social media data poses some unique challenges. Among main social media networks, Twitter is particularly popular for this purpose due to its easily accessible API that is open to use for research purposes. Different techniques can be used to analyze patterns from available data. One of such techniques to extract subjective information from any text, such as opinions on various topics, is Sentiment Polarity Classification, which quantifies emotions in texts and classifies them as positive, negative or neutral. Applying Sentiment Polarity Classification to live twitter data can be used to analyze real-time trends on a particular topic and is the focus of this paper. We have used StreamSensing approach for real time high velocity data. We have also performed a supervised machine learning on this data using Apache Spark micro-batching technology to classify the opinions and feelings of people in real-time about a certain topic. Experiments have been conducted on live twitter data and results are presented and analyzed. The findings of this paper fall into two perspectives: theoretical and practical. The theoretical perspective is seen in testing and confirming the validity of StreamSensing approach as well as the introduction of sentimental polarity algorithm, while practically; this approach can be extended to perform trend analyses on any real-time streams related to live events.
The Benefits of Peer Feedback in an Online Environment (Invited Paper)
van der Stap, Nanda *; Blair, Risa ** (* Netherlands, ** United States)
ABSTRACT:
This paper discusses the advantages to be had by structuring assignments and activities in the online environment to include peer feedback. This paper will first argue why peer feedback is an essential element in any learning process and why particular so in an online environment. Accordingly this paper will consider the challenges and how to meet them. Finally, this paper will consider students’ evaluations on peer feedback.
The BPMN as a Tool for the Development of the Information Flow of the Reception Sector and Welcome Program of Minas Gerais Federal University
Rioga, Danielle do Carmo Pimenta; Baracho, Renata Maria Abrantes (Brazil)
ABSTRACT:
This paper refers to the second stage of the research developed from 2015 to 2017. The first part was published and presented at the IMCIC 2017 event. The paper was called The Information Flow Development Process of the International Student Reception Department at UFMG. The methodology that
allowed this process was the Design Science Research. The main objective of this research is to understand the structure, the flows and the results of the Reception Sector and Welcome Program of Minas Gerais Federal University, in order to contribute to its internationalization process, through the development of a proposal of an Information Flow Model. The specific objectives include facilitating the process of information flow (exchange of documents, data and information) between the Reception Sector and the Welcome Program and between international and Brazilian students, with the possibility of a direct communication channel between the parties; to propose improvements for the
Reception Sector team and the Welcome Program and the International Relations Board, based on the advancement of the information processes and flows, and to stimulate the facilitation of the process of adaptation and integration of international students within the University community, through the application of software that will implement the information flow model allowing international students to have a total view of the exchange procedures. After the evaluations of the two models created in Step 1 the need to do the flows again was verified. Only one of the flows was exposed in the previously published paper; the Visual Information Flow. In this paper, the Step 2 is presented, which resulted in the creation of three information flow models using the Business Process Modeling Notation (BPMN) as a process management tool originated from the Business Process Management (BPM) methodology. Anyway, only the flow part 1 will be exposed: The student is in the home country – part 1.
The Second Half of My Life (Invited Paper)
Barroso, Leônidas Conceição (Brazil)
ABSTRACT:
It is a brief description of the author’s professional trajectory, living the second half of his life. This reflection was motivated by the plenary lecture delivered by Ira Blatstein at the 9th International Conference on Society and Information Technologies under the title “Strategic Planning for the Second Half of Your Life”.
The Shellfish Monitoring Plans Information System for Automatic Communication between Istituto Zooprofilattico Sperimentale Delle Venezie (IZSVe) and the Public Services in the Northern-East of Italy
Manca, Grazia; Boaretto, Elisa; Bille, Laura; Dalla Pozza, Manuela; Marangon, Stefano (Italy)
ABSTRACT:
In accordance with broad guidelines drawn up at Community level, Member States should establish national control plans, on the basis of shared and documented procedures involving both official authorities and laboratories. Data gathering standardisation and documents dematerialization play a key role to establish coherent and faster protocols of communication, to set traceability systems and epidemiological networks, required by the legislation in force. For the management of shellfish official controls in the Northern of Italy, an Information System has been developing, involving both the Local Public Health Units (LPHUs) and IZSVe veterinarians. From 2013 the new project has been implemented and it is now fully functional for the integrated management of the official monitoring program established according to the “Hygiene packaging”. The aim of this paper is to highlight the results obtained using innovative solutions for documents dematerialization, online samples acceptance and automatic data flows management between LPHUs and IZSVe.
The Warehouse Problem: Use of a Simulation and Scale Model to Evaluate Intelligent Control of an Autonomous Vehicle in a Factory
Doran, Michael V.; Henderson, Alexander; Maynard, Jacob (United States)
ABSTRACT:
A project was designed to model and simulate the functions of a warehouse environment equipped with an Automatic Guided Vehicle (AGV) technology. The centerpiece of the project was the to-scale mockup of the warehouse environment integrated with RFID technology to enable landmark recognition. A Lego NXT robot complete with RFID reception antennae and XBEE radio modules represent the AGVs. Communication across the system was monitored by a central control unit according to a hierarchical network structure, which enabled global vision for the system, prevented collisions, contention, and deadlock, and stored large amounts of system data for diagnostic and statistical purposes. Test results were compared to industry standards and applied to a real-world warehouse with no AGV system to determine that equal efficiency and throughput was possible with automation.
Using Experts Review to Validate an Interactive TV User Interface for the Unification of Contents
Abreu, Jorge; Almeida, Pedro; Silva, Telmo; Velhinho, Ana; Fernandes, Sílvia (Portugal)
ABSTRACT:
In a context of great transformations regarding the consumption habits along with an increase in the offer of On Demand services, complementary to the traditional TV operators, the TV ecosystem requires new and disruptive approaches to cope with such demanding scenario. This paper presents the results of an expert review of a user interface aiming to offer a unification of contents as means to address the new viewing habits and interactive television (iTV) trends. The primary goal of using this assessment method was to promptly validate the concept of unification of linear and nonlinear contents in the same interface by using a semi-functional prototype, in order to provide insights into further stages of Lab tests and field trials with end users. Important feedback about unification and personalization features, likewise specific interaction and UI issues were identified to be considered in higher fidelity versions by the research team or by other players of the iTV industry. This research is developed under the UltraTV project that results from a partnership between the academic field and the industry to bring innovation to the iTV domain.
Copyright © 2018 by International Institute of Informatics and Systemics
Published by International Institute of Informatics and Cybernetics