On the effectiveness of a Mobile Puzzle Game UI to Crowdsource Linked Data Ma...Emanuele Della Valle
Linked Data publishing on the Web is a stably growing phenomenon, but its effective usage depends on the ability of consumers to assess the trustworthiness and the relevance of the published data. Pure automatic techniques are often inadequate to this end. Crowdsourcing is often advocated as a valuable solution. In this presentation, we propose WikiFinder – a Games With A Purpose inspired by popular mobile puzzle games – and we report on its effectiveness in solving typical Linked Data Management tasks.
On the effectiveness of a Mobile Puzzle Game UI to Crowdsource Linked Data Ma...Emanuele Della Valle
Linked Data publishing on the Web is a stably growing phenomenon, but its effective usage depends on the ability of consumers to assess the trustworthiness and the relevance of the published data. Pure automatic techniques are often inadequate to this end. Crowdsourcing is often advocated as a valuable solution. In this presentation, we propose WikiFinder – a Games With A Purpose inspired by popular mobile puzzle games – and we report on its effectiveness in solving typical Linked Data Management tasks.
Let's see improvement in ASP.NET MVC 3 about Javascript and Ajax that covers unobtrusive javascript, JSON binding, and especially we will talk deeper about data validation that everyone must be involved. In ASP.NET MVC 3 we can make validation more simpler and better by Model Validation and Remote Validation.
Speaker: Ajarn Suthep Sangvirotjanaphat
A Microsoft Most Valuable Professional (MVP) award since 2004-present. Founder of the GreatFriends.Biz community which is a small but nice and peaceful .net developer community in Thailand. The GreatFriends.Biz also provides training classes in .NET technologies and OOAD/OOP/UML to more than 1,800 developers in several companies and organizations.
Deep Learning for Recommendations: Fundamentals and Advances
In this part, we focus on Graph Neural Networks for Recommendations.
Tutorial Website/slides: https://advanced-recommender-systems.github.io/ijcai2021-tutorial/
https://youtu.be/4aXk3LNTJRc
Let's see improvement in ASP.NET MVC 3 about Javascript and Ajax that covers unobtrusive javascript, JSON binding, and especially we will talk deeper about data validation that everyone must be involved. In ASP.NET MVC 3 we can make validation more simpler and better by Model Validation and Remote Validation.
Speaker: Ajarn Suthep Sangvirotjanaphat
A Microsoft Most Valuable Professional (MVP) award since 2004-present. Founder of the GreatFriends.Biz community which is a small but nice and peaceful .net developer community in Thailand. The GreatFriends.Biz also provides training classes in .NET technologies and OOAD/OOP/UML to more than 1,800 developers in several companies and organizations.
Deep Learning for Recommendations: Fundamentals and Advances
In this part, we focus on Graph Neural Networks for Recommendations.
Tutorial Website/slides: https://advanced-recommender-systems.github.io/ijcai2021-tutorial/
https://youtu.be/4aXk3LNTJRc
Patterns for building patterns communitiesYishay Mor
Keynote at e-Learning Patterns, Tübingen, March 4-6, 2009
http://www.iwm-kmrc.de/workshops/e-learning-patterns/
Video
http://www.iwm-kmrc.de/workshops/e-learning-patterns/videos/Keynote1YishayMor.html
http://www.iwm-kmrc.de/workshops/e-learning-patterns/videos/Keynote2YishayMor.html
Abstract
http://www.iwm-kmrc.de/workshops/e-learning-patterns/abstracts/patternscommunties.htm
The construct of design pattern is often summarised as "the core of a solution to a problem in context". What, then, is the problem that design patterns solve, and in which contexts?
As design patterns break new grounds in educational research and practice, challenging questions arise: how do we engage new audiences in the pattern paradigm? How do we adapt the form and modes of use of patterns to make them useful in diverse realms of practice? Why do we have such a strong conviction in the value of design patterns?
The tradition of design patterns refers to concepts such as "timelessness" and "expertise". These are problematic in a world of accelerating change. Yet another fundamental principle is accentuated; the need to establish robust design languages capable of capturing the complexity of problems in our environment and offering verifiable solutions. I argue that design-level discourse is imperative in many critical domains of human activity, and that patterns should play a central role in such discourse. Over the last few years, my colleagues and I have been developing a methodology for participatory workshops for practical design patterns. This methodology has emerged from the "Learning Patterns" project, and is being refined by the "Pattern Language Network" project.
In this talk, I will describe the methodology, its history and future plans, and provide some illustrative examples. I will also highlight some of the fundamental questions which is provokes.
Deep Learning for Recommendations: Fundamentals and Advances
In this part, we focus on the Fundamentals of Deep Recommender Systems.
Tutorial Website/slides: https://advanced-recommender-systems.github.io/ijcai2021-tutorial/
https://youtu.be/_M5S0Njmc_c
Romero & Vallerand (2016) Co-creative activities for the 21st century kids-R02Margarida Romero
The objective of this guide is to promote learning activities based on the co-creative uses of technologies. Activities found within these pages are designed to develop five key competencies for 21st century kids: critical thinking, collaboration, creativity, problem solving and computational thinking.The guide is built around 15 activities that integrate different creative uses of technologies for learning :
2 unplugged activities introducing computational thinking ;
3 creative robotics activities ;
4 activities introducing creative programming (#Scratch);
1 activity for creating a comic ;
3 creative electronic activities (#MakeyMakey) ;
2 activities for tinkering and 3D digital creation.
These activities aim at developing interdisciplinary and transdisciplinary learning objectives including STEAM education (science, technology, engineering, arts and math), languages, social sciences and personal development.
Analysis of student sentiment during video class with multi-layer deep learni...IJECEIAES
The modern education system is an essential part of the rise of technology. The E-learning education system is not just an experimental system; it is a vital learning system for the whole world over the last few months. In our research, we have developed our learning method in a more effective and modern way for students and teachers. For significant implementation, we are implementing convolutions neural networks and advanced data classifiers. The expression and mood analysis of a student during the online class is the main focus of our study. For output measure, we divide the final output result as attentive, inattentive, understand, and neutral. Showing the output in real-time online class and for sensory analysis, we have used support vector machine (SVM) and OpenCV. The level of 5*4 neural network is created for this work. An advanced learning medium is proposed through our study. Teachers can monitor the live class and different feelings of a student during the class period through this system.
Presentation Alberto Barbero - MEDEAnet Webinar:Programming as creativityMEDEA Awards
This presentation was given by Alberto Barbero as part of the MEDEAnet webinar: Programming as creativity on 16 October 2014. MEDEAnet aims to promote media-based learning to organisations and practitioners through local training and networking events, online resources and knowledge sharing. MEDEAnet will also exploit best practices of the annual competition MEDEA Awards and extend its existing informal network and support the MEDEA Association, a membership organisation that ensures the sustainability of the MEDEA Awards. More info: http://www.medeanet.eu/
SyncMeta: Near Real-time Collaborative Conceptual Modeling on the WebNicolaescu Petru
Framework for near real-time (meta) modeling on the Web. Permits the collaborative editing of meta models and the generation of near real-time collaborative modeling editors. It uses a visual modeling approach.
http://dbis.rwth-aachen.de/cms/research/ACIS/SyncMeta
In this webinar, Prof Hendrik Drachsler will reflect on the process of applying learning analytics solutions within higher education settings, its implications, and the critical lessons learned in the Trusted Learning Research Program. The talk will focus on the experience of edutec.science research collective consisting of researchers from the Netherlands and Germany that contribute to the Trusted Learning Analytics (TLA) research program. The TLA program aims to provide actionable and supportive feedback to students and stands in the tradition of human-centered learning analytics concepts. Thus, the TLA program aims to contribute to unfolding the full potential of each learner. It, therefore, applies sensor technology to support psychomotor as well as web technology to support meta-cognitive and collaborative learning skills with high-informative feedback methods. Prof. Drachsler applies validated measurement instruments from the field of psychometric and investigates to what extent Learning Analytics interventions can reproduce the findings of these instruments. During this webinar, Prof Drachsler will discuss the lessons learned from implementing TLA systems. He will touch on TLA prerequisites like ethics, privacy, and data protection, as well as high informative feedback for psychomotor, collaborative, and meta-cognitive competencies and the ongoing research towards a repository, methods, tools and skills that facilitate the uptake of TLA in Germany and the Netherlands.
Smart Speaker as Studying Assistant by Joao ParganaHendrik Drachsler
The thesis by Joao Pargana followed two main goals, first, a smart speaker application was created to support learners in informal learning processes through a question/answer application. Second, the impact of the application was tested amongst various users by analyzing how adoption and
transition to newer learning procedures can occur.
Dieser Entwurf eines Verhaltenskodex richtet sich an Hochschulen, die mittels Learning Analytics die Qualität des Lernens und Lehrens verbessern wollen. Der Kodex kann als Vorlage zur Erstellung von organisationsspezifischen Verhaltenskodizes dienen. Er sollte an Hochschulen, die Learning Analytics einführen wollen, durch Konsultationen mit allen Interessengruppen überprüft und an die Ziele sowie die bestehende Praxis innerhalb der jeweiligen Hochschulen angepasst werden. Der Kodex wurde auf Grundlage einer Analyse bestehender europäischer Kodizes und der in Deutschland geltenden Rechtsgrundlage vom Innovationsforum Trusted Learning Analytics des hessenweiten Projektes "Digital gestütztes Lehren und Lernen in Hessen" entwickelt.
Abstract (English):
This code of conduct can be used as a template for creating organization-specific codes of conduct in Germany. The Code was developed on the basis of an analysis of existing European codes of conduct and the legal basis for the usage of data in higher education in Germany.
Rödling, S. (2019). Entwicklung einer Applikation zum assoziativen Medien Ler...Hendrik Drachsler
Ziel der vorliegenden Bachelorarbeit ist es, den Einfluss von zusätzlicher am Handgelenk wahr-genommener Vibration in Verbindung mit der visuellen Darstellung eines Lerninhaltes auf denLernerfolg zu messen. Der Lernerfolg wird hierbei durch die Lerngeschwindigkeit sowie denUmfang der Wissenskonsolidierung über die Testreihe definiert. Zu diesem Zweck wurde eine Experimentalstudie zumAssoziativen Lernendurchgeführt. Für die Studie verwendeten 33Probanden eine App, die für die vorliegende Arbeit entwickelt wurde. Im Mittel aller Studiener-gebnisse wurden sowohl für die Lerngeschwindigkeit als auch für die Wissenskonsolidierungbessere Werte erzielt, wenn die Probanden die Möglichkeit hatten, den Lerninhalt sowohl visu-ell als auch haptisch zu erfahren. Die festgestellten Unterschiede des Lernerfolges erreichtenjedoch keine statistische Signifikanz. Die Abweichungen der Ergebnisse nach der Umsetzungder vorgeschlagenen Änderungen am Studiendesign sind abzuwarten. Die Bachelorarbeit ist vor allem für den Bildungsbereich interessant.
The present bachelor thesis aims to measure the influence of vibration perceived at the wrist in connection with the visual representation of learning content on the learning success. The learning success is defined by the learning speed and the extent of knowledge consolidation over the test series. For this purpose, an experimental study on Associative Learning was conducted. For the study, 33 test persons used an app, which was developed for the present work. On average of all study results better values were achieved for both learning speed and knowledge consolidation, if the test persons could experience the learning content both visually and haptically. However, the differences in learning outcomes did not reach statistical significance. The results of the deviations after the implementation of the proposed changes to the study design must be awaited. The Bachelor’s thesis is particularly interesting for the education sector.
E.Leute: Learning the impact of Learning Analytics with an authentic datasetHendrik Drachsler
Nowadays, data sets of the interactions of users and their corresponding demographic data are becoming more and more valuable for companies and academic institutions like universities
when optimizing their key performance indicators. Whether it is to develop a model to predict the optimal learning path for a student or to sell customers additional products, data sets to
train these models are in high demand. Despite the importance and need for big data sets it still has not become apparent to every decision-maker how crucial data sets like these are for the
future success of their operations.
The objective of this thesis is to demonstrate the use of a data set, gathered from the virtual learning environment of a distance learning university, by answering a selection of questions in
Learning Analytics. Therefore, a real-world data set was analyzed and the selected questions were answered by using state-of-the-art machine learning algorithms.
Romano, G. (2019) Dancing Trainer: A System For Humans To Learn Dancing Using...Hendrik Drachsler
Masters thesis by Romano, G., (2019). Dancing is the ability to feel the music and express it in rhythmic movements with the body. But learning how to dance can be challenging because it requires proper coordination and understanding of rhythm and beat. Dancing courses, online courses or learning with free content are ways to learn dancing. However, solutions with human-computer interaction are rare or
missing. The Dancing Trainer (DT) is proposed as a generic solution to fill this gap. For the beginning, only Salsa is implemented, but more dancing styles can be added. The DT uses the Kinect to interact multimodally with the user. Moreover, this work shows that dancing steps can be defined as gestures with the Kinect v2 to build a dancing corpus. An experiment with
25 participants is conducted to determine the user experience, strengths and weaknesses of the DT. The outcome shows that the users liked the system and that basic dancing steps were
learned.
In May 2018, the new General Data Protection Regulation (GDPR) will enter into force in the European Union. This new regulation is considered as the most modern data protection law for Big Data societies of tomorrow. The GDPR will bring major changes to data ownership and the way data can be accessed, processed, stored, and analysed in the European Union. From May 2018 onwards, data subjects gain fundamental rights such as ‘the right to access data’ or ‘the right to be forgotten’. This will force Big Data system designers to follow a privacy-by-design approach for their infrastructures and fundamentally change the way data can be treated in the European Union.
The presentation provides an overview of the Trusted Learning Analytics Programme as it has been recently initiated at the University of Frankfurt and the DIPF research institute in Germany. Educational data is under special focus of the GDPR, as it is considered as highly sensitive like data from a nuclear plant. It shows opportunities and challenges for using educational data for learning analytics purposes under the light of the GDPR 2018.
Fighting level 3: From the LA framework to LA practice on the micro-levelHendrik Drachsler
This presentation explores shortcomings of learning analytics for the wide adoption in educational organisations. It is NOT about ethics and privacy rather than focuses on shortcomings of learning analytics for teachers and students in the classroom (micro-level). We investigated if and to what extend learning analytics dashboards are addressing educational concepts. Map opportunities and challenges for the use of Learning Analytics dashboards for the design of courses, and present an evaluation instrument for the effects of Learning Analytics called EFLA. EFLA can be used to measure the effects of LA tools at the teacher and student side. It is a robust but light (8 items) measurement to quickly investigate the level of adoption of learning analytics in a course (micro-level). The presentation concludes that Learning Analytics is still to much a computer science dicipline that does not fulfill the often claimed position of the middle space between educational and computer science research.
Presentation given at PELARS Policy event, Brussles, 09.11.2016. A follow up op the first LACE Policy event in April 2015. Special focus is on the exploitation and sustainability activities for LACE in the SIG LACE SoLAR.
Dutch Cooking with xAPI Recipes, The Good, the Bad, and the ConsistentHendrik Drachsler
This paper presents the experiences of several Dutch projects in their application of the xAPI standard and different design patterns including the deployment of Learning Record Stores. In this paper we share insights and argue for the formation of an international Special Interest Group on interoperability issues to contribute to the Open Analytics Framework as envisioned by SoLAR and enacted by the Apereo Learning Analytics Initiative. Therefore, we provide an overview of the advantages and disadvantages of implementing the current xAPI standard by presenting projects that applied xAPI in very different ways followed by the lessons learned.
Recommendations for Open Online Education: An Algorithmic StudyHendrik Drachsler
Recommending courses to students in online platforms is studied widely. Almost all studies target closed platforms, that belong to a University or some other educational provider. This makes the course recommenders situation specific. Over the last years, a demand has developed for recommender system that suit open online platforms. Those platforms have some common characteristics, such as the lack of rich user profiles with content metadata. Instead they log user interactions within the platform that can be used for analysis and personalization. In this paper, we investigate how user interactions and activities tracked within open online learning platforms can be used to provide recommendations. We present a study in which we investigate the application of several state-of-the-art recommender algorithms, including a graph-based recommender approach. We use data from the OpenU open online learning platform that is in use by the Open University of the Netherlands. The results show that user-based and memory-based methods perform better than model-based and factorization methods. Particularly, the graph-based recommender system proves to outperform the classical approaches on prediction accuracy of recommendations in terms of recall. We conclude that, if the algorithms are chosen wisely, recommenders can contribute to a better experience of learners in open online courses.
Soude Fazeli, Enayat Rajabi, Leonardo Lezcano, Hendrik Drachsler, Peter Sloep
Privacy and Analytics – it’s a DELICATE Issue. A Checklist for Trusted Learni...Hendrik Drachsler
The widespread adoption of Learning Analytics (LA) and Educational Data Mining (EDM) has somewhat stagnated recently, and in some prominent cases even been reversed following concerns by governments, stakeholders and civil rights groups about privacy and ethics applied to the handling of personal data. In this ongoing discussion, fears and realities are often indistin-guishably mixed up, leading to an atmosphere of uncertainty among potential beneficiaries of Learning Analytics, as well as hesitations among institutional managers who aim to innovate their institution’s learning support by implementing data and analytics with a view on improving student success. In this presentation, we try to get to the heart of the matter, by analysing the most common views and the propositions made by the LA community to solve them. We conclude the paper with an eight-point checklist named DELICATE that can be applied by researchers, policy makers and institutional managers to facilitate a trusted implementation of Learning Analytics.
DELICATE checklist - to establish trusted Learning AnalyticsHendrik Drachsler
The DELICATE checklist contains eight action points that should be considered by managers and decision makers planning the implementation of Learning Analytics / Educational Data Mining solutions either for their own institution or with an external provider.
The eight points are:
1. Determination: Decide on the purpose of learning analytics for your institution. What aspects of learning or learner services are you trying to improve?
2. Explain: Define the scope of data collection and usage. Who has a need to have access to the data or the results? Who manages the datasets? On what criteria?
3. Legitimate: Explain how you operate within the legal frameworks, refer to the essential legislation. Is the data collection excessive, random, or fit for purpose?
4. Involve: Talk to stakeholders and give assurances about the data distribution and use. Give as much control as possible to data subjects (permission architecture), and provide access to their data for the individuals.
5. Consent: Seek consent through clear consent questions. Provide an opt-out option.
6. Anonymise: De-identify individuals as much as possible, aggregate data into meta-models.
7. Technical aspects: Monitor who has access to data, especially in areas with high staff turn-over. Establish data storage to high security standards.
8. External partners: Make sure externals provide highest data security standards. Ensure data is only used for intended purposes and not passed on to third parties.
We hope that the DELICATE checklist will be a helpful instrument for any educational institution to demystify the ethics and privacy discussions around Learning Analytics. As we have tried to show in this article, there are ways to design and provide privacy conform Learning Analytics that can benefit all stakeholders and keep control with the users themselves and within the established trusted relationship between them and the institution.
Updated Flyer of the LACE project with latest tangible outcomes and collaboration possibilities.
LACE connects players in the fields of Learning Analytics (LA) and Educational Data Mining (EDM) in order to support the development of a European community and share emerging best practices.
Objectives
-------------
• Promote knowledge creation and exchange
• Increase the evidence base about Learning Analytics
• Contribute to the definition of future directions
• Build consensus on pressing topics like data interoperability, data sharing, ethics and privacy, and Learning Analytics supported instructional design
Activities
• Organise events to connect organisations that are conducting LA/EDM research
• Create and curate a knowledge base to capture evidence for the effectiveness of Learning Analytics
• Produce reviews to inform the LACE community about latest developments in the field
Presentation given at Serious Request 2015, #SR15, Heerlen.
Within the Open University we started a 12 hours marathon college, to collect money for the charity action of radiostation 3FM. The collected money will go to the red cross and support young people in conflict areas.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Assure Contact Center Experiences for Your Customers With ThousandEyes
ReMashed - An Usability Study of a Recommender System for Mash-Ups for Learning at ICL Conference 2009, Voillach, Austria
1. ReMashed –An Usability Study of a
Recommender System
for Mash-Ups for Learning
Hendrik Drachsler, Dries Pecceu, Tanja Arts, Edwin Hutten, Peter van Rosmalen,
Hans Hummel & Rob Koper
2. My background…
Learning Networks
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 2 | 23 September, 2009
3. Learning Networks
Explicitly address informal
learning
Learners can publish, share,
rate, tag and adjust their
own Learning Activities in a
Learning Network
Open Corpus that emerges
form the bottom upwards
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 3 | 23 September, 2009
4. Personal Environments
Nowadays …
More Information
Blog Reader Providers
Social
Bookmarking
Various
Communities
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 4 | 23 September, 2009
6. Selection problem because …
…of the amount
of data that is
emerging.
…learners can be
overwhelmed by
the plethora of
information.
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 6 | 23 September, 2009
7. Can we create a Recommender System
Today, Recommender Systems
for Mash-Ups for Learning?
supporting our decisions
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 7 | 23 September, 2009
8. What is ReMashed?
A Mash-up environment that allows you to
personalize emerging information of online
communities with a recommender system.
You tell what kind of Web 2.0 services you
use and then you are able to define which
contributions of other members you like
and do not like.
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 8 | 23 September, 2009
9. Goals for ReMashed
1. End-User level
Providing a recommender system for Web 2.0
sources of learners in informal Learning
Networks.
2. Researcher level
1. Offering researchers a system for the evaluation of
recommendation algorithms for learners in informal
Learning Networks.
2. Creating user-generated-content data sets for
recommender systems in informal Learning Networks.
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 9 | 23 September, 2009
10. How does it work?
ReMashed uses collaborative filtering to
generate recommendations.
It works by matching together users with
similar tastes (neighbours) on different
Web 2.0 resources (delicious, Flickr, blog
feeds, Slideshare, Twitter, and YouTube).
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 10 | 23 September, 2009
11. How does it work?
Cold-Start = Tag-based recommendation
Collaborative Filtering with ratings
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 11 | 23 September, 2009
13. The 1st Release
Recommendation
Algorithms
Database User Interface
of Items
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 13 | 23 September, 2009
14. System Evaluation
• At the TENCompetence Winterschool 2009
• Also external users sign up for the evaluation phase
• In total 49 people from 8 different countries
After this slide you
• created some
The evaluation phase ran for one month and was concluded
with an online recall questionnaire. really ugly ones do
you really want to
show them to the
• We received answers from 19 participants in total
audience?
(response rate of 38%).
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 14 | 23 September, 2009
15. Usage of Web 2.0 services
Strongly Agree Neutral Disagree Strongly
agree disagree
16% 5% 31% 11% 37%
1. Use a blog 21%
(n=3) (n=1) (n=6) (n=2) 48% (n=7)
2. Use social 42% 42% 6% 5% 5%
Bookmarking 84%
(n=8) (n=8) (n=1) (n=1) 10% (n=1)
5% 32% 21% 26% 16%
3. Share pictures 37%
(n=1) (n=6) (n=4) (n=5) 42% (n=3)
They just
4. Share 11% 26% 21% 21% twittered
17%
presentations 37%
(n=2) (n=5) (n=4) (n=4) 38% (n=5)
that the
5. Use micro- table is
11% 21% 10% 21% 37%
blogging
32%
(n=2) (n=4) (n=2) (n=4) 58% terrible.
(n=7)
0% 15% 38% 26% 21%
6. Upload videos 15%
(n=0) (n=3) (n=7) (n=5) 47% (n=4)
7. Use YouTube 5% 32% 15% 16% 32%
to collect videos 37%
(n=1) (n=6) (n=3) (n=3) 48% (n=6)
16. Satisfaction with ReMashed
Very Satisfied Unsatisfied Very Total
satisfied unsatisfied
1. Overall 5% 58% 26% 11% 100%
satisfaction (n=1) 63% (n=11) (n=5) 37% (n=2) (n=15)
2. Satisfaction tag-
20% 40% 27% 13% 100%
based algorithm
(n=3)
60% (n=6) (n=4)
40% (n=2) (n=16)
in the beginning
3. Satisfaction tag-
0% 69% 19% 13% 100%
based algorithm
(n=0) 69% (n=11) (n=3) 31% (n=2) (n=16)
at the end
4. Satisfaction
rating-based 8% 53% 31% 8% 100%
algorithm in the (n=1) 61% (n=7) (n=4) 39% (n=1) (n=14)
beginning
5. Satisfaction
rating-based 8% 54% 31% 8% 100%
algorithm at the (n=1) 62% (n=7) (n=4) 38% (n=1) (n=13)
end
17. Open Question
We received 9 answers:
• Integrate social networks like Linkedin, Facebook,
and MySpace.
• Integrate mind mapping tools like Mindmeister.
• Create clusters of Web 2.0 services of the same type,
e.g. combine Picassa and flickr in a subcategory
‘Pictures’.
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 17 | 23 September, 2009
19. The 2nd Release
DUINE Prediction
Engine
Database User Interface
of Items
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 19 | 23 September, 2009
20. You can use it as well!
Register at ReMashed
remashed.ou.nl. starts mashing.
Enter your favorite Taste your
Web 2.0 potatoes. personal
flavor of
Web 2.0.
Join the
community.
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 20 | 23 September, 2009
21. Future R&D
End-user perspective:
1. More Web 2.0 services and social networks
2. Widget / Portlet interface for other Personal Environments
3. Administration interface to create instances of the
ReMashed
Researcher perspective:
1. Creating data sets for Technology-Enhanced Learning
2. Exploring new recommendation technologies
3. Creating web services to offer recommendations to other
Mash Up Personal Learning Environments
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 21 | 23 September, 2009
22. Many thanks for your interest!
This slide is available here:
http://www.slideshare.com/Drachsler
Email: hendrik.drachsler@ou.nl
Skype: celstec-hendrik.drachsler
Blogging at: http://elgg.ou.nl/hdr/weblog
Twittering at: http://twitter.com/HDrachsler
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 22 | 23 September, 2009
23. Please sign up at:
http://remashed.ou.nl
hendrik.drachsler@ou.nl
International Conference on Interactive Computer Aided Learning, ICL 2009,Villach, AT
Page 23 | 23 September, 2009
Editor's Notes
A solution towards this problem might be recommender system technology. The main purpose of recommender systems on the Internet is to pre-select information a user might be interested in. For instance, the well-known company amazon.com [8] is using a recommender system to direct the attention of their users to other products in their collection. The motivation for a recommender system for Mash-Up Personal Learning Environments is to improve the ‘educational provision’; to offer a better goal attainment and to spend less time to find suitable learning material. Therefore, we developed a recommender system that offers advice to learners based on their Web 2.0 resources regarding the most suitable learning materials to meet their individual competence development.