1,825 Hits in 8.4 sec

A data value chain to support the processing of multimodal evidence in authentic learning scenarios

Shashi Kant Shankar, Adolfo Ruiz-Calleja, Sergio Serrano-Iglesias, Alejandro Ortega-Arranz, Paraskevi Topali, Alejandra Martínez-Monés
2019 Learning Analytics Summer Institute Spain  
As a first step in this direction, this paper analyzes four MMLA scenarios, abstracts their data processing activities and extracts a Data Value Chain to model the processing of multimodal evidence of  ...  Multimodal Learning Analytics (MMLA) uncovers the possibility to get a more holistic picture of a learning situation than traditional Learning Analytics, by triangulating learning evidence collected from  ...  Acknowledgements This research has been partially funded by the European Union via the European Regional Development Fund and in the context of CEITER (Horizon 2020 Research and Innovation Programme, grant  ... 
dblp:conf/lasi-spain/ShankarRSOTM19 fatcat:iyj2llucjfd3jog2nplmrel56e

The effects of anthropomorphism and multimodal biometric authentication on the user experience of voice intelligence

Mels de Kloet, Shengyun Yang
2022 Frontiers in Artificial Intelligence  
Therefore, this research examines how anthropomorphism and multimodal biometric authentication influence the adoption of voice intelligence through user perception in the customer value chain.  ...  The increased popularity of voice intelligence, however, has not been reflected in the customer value chain.  ...  Acknowledgments We would like to thank the Amazon developer community for helping us design and develop the treatments in our experiment. We also would like to express our gratitude to Dr.  ... 
doi:10.3389/frai.2022.831046 pmid:36062266 pmcid:PMC9428311 fatcat:ck5mvwempzawrlp2pdzrzsqgfq

A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks

Daoqi Han, Songqi Wu, Zhuoer Hu, Hui Gao, Enjie Liu, Yueming Lu, Liguo Zhang
2021 Security and Communication Networks  
and enables a thorough data flow protection in the open and heterogeneous network environment of AIoT.  ...  With full connectivity, the issue of data security in the new cloud-edge-terminal network hierarchy of AIoTs comes to the fore, for which blockchain technology is considered as a potential solution.  ...  To evaluate the influence of the number of nodes, we execute the evidence storage service 1,000 times in each scenario.  ... 
doi:10.1155/2021/6671132 fatcat:2nsm55lvorgovcypdcnajojr4q

Learning Analytics Summer Institute Spain 2019: Learning analytics in higher education

Manuel Caeiro Rodríguez, Ángel Hernández-García, Pedro J. Muñoz Merino
2019 Learning Analytics Summer Institute Spain  
LASI Spain 19 is conceived as a platform to catalyze educators, technologists, researchers, enterprise and policymakers around shaping the next generation of learning infrastructures to truly serve the  ...  This year's edition of LASI Spain focused on a specific context of application of learning analytics: Higher Education. Learning Analytics has been called to improve  ...  Acknowledgements The authors want to thank the financial support provided by TELGalicia (under project ED431D 2017/12) and the IEEE Spain section.  ... 
dblp:conf/lasi-spain/RodriguezHM19 fatcat:e5cyxyeamrdhxmgeoh6swjof5y

Extending identity management system with multimodal biometric authentication

Bojan Jovanovic, Ivan Milenkovic, Marija Bogicevic-Sretenovic, Dejan Simic
2016 Computer Science and Information Systems  
In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials.  ...  The authentication process can be additionally secured by using biometric data for user verification.  ...  Acknowledgement This work is a part of the project Multimodal biometry in identity management, funded by Ministry of Education and Science of Serbia, contract number TR-32013.  ... 
doi:10.2298/csis141030003j fatcat:dwz5baknlbfctajxguv6bck6ye

Person Authentication using Relevance Vector Machine (RVM) for Face and Fingerprint

Long B. Tran, Thai H. Le
2015 International Journal of Modern Education and Computer Science  
Particularly, in the paper, the authors present a multimodal biometric system in which features from face and fingerprint images are extracted using Zernike Moment (ZM), the personal authentication is  ...  The proposed system has proven its remarkable ability to overcome the limitations of unimodal biometric systems and to tolerate local variations in the face or fingerprint image of an individual.  ...  A simple mathematical model is used to simplify the design of the processing chain, and to compare serial scheme performance with the best individual matcher.  ... 
doi:10.5815/ijmecs.2015.05.02 fatcat:lnwzdex77vg5fdzuasrj4yiove

A Scalable Architecture for the Dynamic Deployment of Multimodal Learning Analytics Applications in Smart Classrooms

Alberto Huertas Celdrán, José A. Ruipérez-Valiente, Félix J. García Clemente, María Jesús Rodríguez-Triana, Shashi Kant Shankar, Gregorio Martínez Pérez
2020 Sensors  
The area of Multimodal Learning Analytics (MMLA) explores the affordances of processing these heterogeneous data to understand and improve both learning and the context where it occurs.  ...  The smart classrooms of the future will use different software, devices and wearables as an integral part of the learning process.  ...  Acknowledgments: This work has been partially supported by the Government of Ireland post-doc fellowship (grant code GOIPD/2018/466 of the Irish Research Council), the Spanish Ministry of Economy and Competitiveness  ... 
doi:10.3390/s20102923 pmid:32455699 pmcid:PMC7285125 fatcat:ablwghgvmvfrpd5ml54zapeybi

A Novel Serial Multimodal Biometrics Framework Based on Semisupervised Learning Techniques

Qing Zhang, Yilong Yin, De-Chuan Zhan, Jingliang Peng
2014 IEEE Transactions on Information Forensics and Security  
We propose in this paper a novel framework for serial multimodal biometric systems based on semisupervised learning techniques.  ...  In terms of methodology, we propose to use semisupervised learning techniques to strengthen the matcher(s) on the weaker trait(s), utilizing the coupling relationship between the weaker and the stronger  ...  In the future, we plan to extend the proposed framework and SSL based method to process more biometric traits in a chain.  ... 
doi:10.1109/tifs.2014.2346703 fatcat:mzvcrnudbfh4toqvgixvly2uda

Emerging Biometrics: Deep Inference and Other Computational Intelligence [article]

Svetlana Yanushkevich, Shawn Eastwood, Kenneth Lai, Vlad Shmerko
2020 arXiv   pre-print
Biometric-enabled systems are evolving towards deep learning and deep inference using the principles of adaptive computing, - the front tides of the modern computational intelligence domain.  ...  We highlight the technology gaps that must be addressed in future generations of biometric systems.  ...  Acknowledgment This project was partially supported by Natural Sciences and Engineering Research Council of Canada (NSERC) through the grant "Biometric intelligent interfaces".  ... 
arXiv:2006.11971v1 fatcat:k6aunuoxc5apbb347vy2lj7bsq

Collocated Collaboration Analytics: Principles and Dilemmas for Mining Multimodal Interaction Data

Roberto Martinez-Maldonado, Judy Kay, Simon Buckingham Shum, Kalina Yacef
2017 Human-Computer Interaction  
However, in physical spaces it is not always easy to provide teams with evidence to support collaboration.  ...  The contribution of the paper includes the key insights and themes which we have identified and summarized in a set of principles and dilemmas that can inform design of future collocated collaboration  ...  The authors would like to thank all of the participants in the studies presented in this article including: volunteers, students, teachers and facilitators, for the time and help given throughout.  ... 
doi:10.1080/07370024.2017.1338956 fatcat:sqkq3es3czf65nuvoe2w26n7dy

Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks

Shengrong Bu, F. Richard Yu, Xiaoping P. Liu, Peter Mason, Helen Tang
2011 IEEE Transactions on Vehicular Technology  
The decisions are made in a fully distributed manner by each authentication device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.  ...  Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems.  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper. is  ... 
doi:10.1109/tvt.2010.2103098 fatcat:7k5jl4k32bbl7gcc3ae25zaobm

Distributed combined authentication and intrusion detection with data fusion in high security mobile ad-hoc networks

Shengrong Bu, F. Richard Yu, X. Liu Peter, Helen Tang, Peter Mason
The decisions are made in a fully distributed manner by each authentication device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.  ...  Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems.  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper. is  ... 
doi:10.1109/milcom.2010.5680201 fatcat:dt5mu6mkona5dijdmdud2pd4mm

Intelligent Technique for Human Authentication using Fusion of Finger and Dorsal Hand Veins

Mona A. Ahmed, Abdel-Badeeh M. Salem
2021 WSEAS Transactions on Information Science and Applications  
This paper presents a new multimodal biometric system using intelligent technique to authenticate human by fusion of finger and dorsal hand veins pattern.  ...  Multimodal biometric systems have been widely used to achieve high recognition accuracy.  ...  In the feature extraction modules, the acquired data is processed to extract a set of features.  ... 
doi:10.37394/23209.2021.18.12 fatcat:mvzenj2tunfuhcdcbzyibhalfm

Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships

Matthew Boakes, Richard Guest, Farzin Deravi, Barbara Corsetti
2019 IEEE Transactions on Biometrics Behavior and Identity Science  
By surveying the area, we have identified seven core factors that help to form a clearer understanding of what changes the performance of a system.  ...  In this paper, we investigate factors of a biometric system that is likely to affect performance, in particular, focusing on mobile device implementation.  ...  The users were then required to authenticate themselves in a variety of scenarios for a minimum of five transaction attempts.  ... 
doi:10.1109/tbiom.2019.2941728 fatcat:447vfzhayfhhhkgtoaniw23d7a

Generic Framework for Collaborative Work Environments [chapter]

Cosmin Porumb, Sanda Porumb, Bogdan Orza, Aurel Vlaicu
2010 New Advanced Technologies  
The product manager in a virtual enterprise is able to manage the resources, the customer/supplier relationships and to analyze the value chain in a dynamically and secure manner from anywhere in the world  ... New, Advanced Technologies 220 Low cost computer-supported collaborative learning prototype A lot of research has been done in the field of learning processes and learning activities  ...  The explanation is very simple: the agent in the area uses the mobile device in order to communicate to headquarter and the persons in charge has to share the processing results using the web browser,  ... 
doi:10.5772/9440 fatcat:dlz62bsmgvh3pi43bytthw7fne
« Previous Showing results 1 — 15 out of 1,825 results