1,904 research outputs found

    Smart feedback and the challenges of virtualisation

    Get PDF
    The use of audio feedback is becoming more prevalent and it would be possible to use avatars for this purpose. When audio feedback is recorded by a human tutor, the recording contains not only the text of the feedback, but also additional information associated with the intonation and manner of delivery of the voice. Experiments were conducted to investigate student’s responses to the use of audio in comparison with other forms of feedback. Students were generally positive about audio feedback; results also indicated that the conveyed emotion or intent is significant and that it is perceived by the student as an important part of the feedback. We also explore this in the context of strategies for the deployment of virtual agents in the provision of feedback

    Smart feedback and the challenges of virtualisation

    Get PDF
    The use of audio feedback is becoming more prevalent and it would be possible to use avatars for this purpose. When audio feedback is recorded by a human tutor, the recording contains not only the text of the feedback, but also additional information associated with the intonation and manner of delivery of the voice. Experiments were conducted to investigate student’s responses to the use of audio in comparison with other forms of feedback. Students were generally positive about audio feedback; results also indicated that the conveyed emotion or intent is significant and that it is perceived by the student as an important part of the feedback. We also explore this in the context of strategies for the deployment of virtual agents in the provision of feedback

    Autonomic computing architecture for SCADA cyber security

    Get PDF
    Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term ‘Autonomic Computing’ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator

    Autonomic computing meets SCADA security

    Get PDF
    © 2017 IEEE. National assets such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks are critical infrastructures. The cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. Cyber security conventional measures have proved useful in the past but increasing sophistication of attacks dictates the need for newer measures. The autonomic computing paradigm mimics the autonomic nervous system and is promising to meet the latest challenges in the cyber threat landscape. This paper provides a brief review of autonomic computing applications for SCADA systems and proposes architecture for cyber security

    TechNews digests: Jan - Nov 2009

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month
    • …
    corecore