This document presents a distributed framework for analyzing multimodal data from multiple sensors. The framework uses a publish/subscribe architecture to synchronize data collection across sensor nodes. Data is streamed from sensor nodes to processing nodes for analysis. To validate the framework, researchers built a multimodal learning system that collected audio, video, and motion data from presentations to provide feedback. Fifty-four students tested the system, which received positive feedback regarding usability and learning experience. The distributed framework allows scalable and efficient multimodal data collection and analysis.
Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
The Census Hub Project can be considerated at the moment as the most advanced project where Internet technologies and SDMX solutions for data transmission get together for an ambicious goal: the data dissemination of Census 2011 results.
We analyze the Census Hub architecture, where a central Hub at Eurostat side manage the user interface, transforming all selections made by the user on the screen in an sdmx query. This query is sent to the web service at NSI side, that parses the query and transforms it in an SQL query that can be used with a data base containing census data. Depending on how many countrys are involved in the answer, the hub will query the web service provided for that country. Finally, the Hub receive all answer fron NSI's and build up a final table, putting all answers toghether. The importance of this implementation is that is a completely new system that change completely the way to disseminate and exchange official data among organizations.
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
Towards building a message retrieval facility via telephoneeSAT Journals
Abstract Email is one of the most popular services offered in the internet age. Therefore, providing service for all is a crucial competitive asset for any country. The objective of our research is to integrate technological innovation into a hybrid system, in order to build a more accessible system for weaker sections of society. This paper presents ‘Telemail’ system that enables a person to listen to the emails in her/his POP3 email account on a telephone thus replacing the conventional way of reading mails on the Internet. This software will serve the needs of people who don’t have access to internet, are computer illiterate or blind. Keywords—Telemail, Accessibility, Telephone, Deprived Users, ICT in rural India, voice based interfaces, Tool Prototype
Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
The Census Hub Project can be considerated at the moment as the most advanced project where Internet technologies and SDMX solutions for data transmission get together for an ambicious goal: the data dissemination of Census 2011 results.
We analyze the Census Hub architecture, where a central Hub at Eurostat side manage the user interface, transforming all selections made by the user on the screen in an sdmx query. This query is sent to the web service at NSI side, that parses the query and transforms it in an SQL query that can be used with a data base containing census data. Depending on how many countrys are involved in the answer, the hub will query the web service provided for that country. Finally, the Hub receive all answer fron NSI's and build up a final table, putting all answers toghether. The importance of this implementation is that is a completely new system that change completely the way to disseminate and exchange official data among organizations.
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
Towards building a message retrieval facility via telephoneeSAT Journals
Abstract Email is one of the most popular services offered in the internet age. Therefore, providing service for all is a crucial competitive asset for any country. The objective of our research is to integrate technological innovation into a hybrid system, in order to build a more accessible system for weaker sections of society. This paper presents ‘Telemail’ system that enables a person to listen to the emails in her/his POP3 email account on a telephone thus replacing the conventional way of reading mails on the Internet. This software will serve the needs of people who don’t have access to internet, are computer illiterate or blind. Keywords—Telemail, Accessibility, Telephone, Deprived Users, ICT in rural India, voice based interfaces, Tool Prototype
Efficient Database Management System For Wireless Sensor Network Onyebuchi nosiri
An effective database management system has been put forward in this work to tackle the problem in remote monitoring using Wireless Sensor Network Object Oriented Analysis and Design method employed as classes was evolved to create objects in the employed program used. An algorithm was developed with a corresponding flowchart to realize the design, the work also came up with a dynamic graph plotter, as this offers an adaptive monitoring facility for data stored in the Database. Sensor Node query was implemented and result of transmitted data was filtered for a particular node
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
In today’s developing world various technologies are coming up, which aims in reducing the user’s work by providing specific results which is made possible by keeping track of the various activities performed by the user throughout the entire time. Context aware computing is one of the emerging fields that help in the process of providing accurate and specific results. Context aware computing refers to a general class of mobile systems that has the ability to sense the physical environment in which the user is currently in and adapt their behavior accordingly. Context awareness is a property of mobile devices that is defined in compliment to location awareness. Systems that use context aware computing provide the user’s preference based on the various environmental factors like location, time and other conditions. Researchers have been working on this domain for about a decade and various applications were developed for the purpose of demonstrating the capability of the context-aware systems, until recently this technology has been put in heavy use since nowadays whichever applications are made by companies for end-users have a requirement of providing more accurate and specific results. Recently context-aware systems combined with pervasive computing, which means always connected and available, are a growing trend which are applied on devices. The dependence on internet for providing results, introduces various complexities because in some places the extent of the internet is limited. Therefore the context aware technology should be made to work offline using the power of smart devices like smartphones which is owned by the majority of the world. In this way the technology can be provided on to various smart devices which would result in a much more enriched user experience.
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud
A survey on context aware system & intelligent Middleware’sIOSR Journals
Abstract: Context aware system or Sentient system is the most profound concept in the ubiquitous computing.
In the cloud system or in distributed computing building a context aware system is difficult task and
programmer should use more generic programming framework. On the basis of layered conceptual design, we
introduce Context aware systems with Context aware middleware’s. On the basis of presented system we will
analyze different approaches of context aware computing. There are many components in the distributed system
and these components should interact with each other because it is the need of many applications. Plenty
Context middleware’s have been made but they are giving partial solutions. In this paper we are giving analysis
of different middleware’s and comprehensive application of it in context caching.
Keywords: Context aware system, Context aware Middleware’s, Context Cache
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
Several large-scale parole leakages exposed users to associate unprecedented risk of speech act and abuse of their data. associate inadequacy of password-based authentication mechanisms is turning into a serious concern for the complete data society. carries with it 3 major modules: (1) Mouse–Behavior dynamics Capture, (2) Feature Construction, and (3) coaching or Classification. the primary module serves to make a taking mouse behavior user signs. The second module is employed to extract holistic and procedural options to characterize mouse behavior and to map the raw options into distance-based options by exploitation numerous distance metrics. The third module, within the coaching section, applies neural network on the distance-based feature vectors to reckon the predominant feature elements, then builds the user’s profile employing a one-class classifier. within the classification section, it determines the user’s identity exploitation the trained classifier within the distance-based feature exploitation NN. A four Digit OTP is generated to the user’s email ID. The user are going to be giving the ‘2’ digit OTP and therefore the server are going to be giving balance ‘2’ digit OTP. Users ‘2’ digit OTP is verified by the server and contrariwise.
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
Efficient Database Management System For Wireless Sensor Network Onyebuchi nosiri
An effective database management system has been put forward in this work to tackle the problem in remote monitoring using Wireless Sensor Network Object Oriented Analysis and Design method employed as classes was evolved to create objects in the employed program used. An algorithm was developed with a corresponding flowchart to realize the design, the work also came up with a dynamic graph plotter, as this offers an adaptive monitoring facility for data stored in the Database. Sensor Node query was implemented and result of transmitted data was filtered for a particular node
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
In today’s developing world various technologies are coming up, which aims in reducing the user’s work by providing specific results which is made possible by keeping track of the various activities performed by the user throughout the entire time. Context aware computing is one of the emerging fields that help in the process of providing accurate and specific results. Context aware computing refers to a general class of mobile systems that has the ability to sense the physical environment in which the user is currently in and adapt their behavior accordingly. Context awareness is a property of mobile devices that is defined in compliment to location awareness. Systems that use context aware computing provide the user’s preference based on the various environmental factors like location, time and other conditions. Researchers have been working on this domain for about a decade and various applications were developed for the purpose of demonstrating the capability of the context-aware systems, until recently this technology has been put in heavy use since nowadays whichever applications are made by companies for end-users have a requirement of providing more accurate and specific results. Recently context-aware systems combined with pervasive computing, which means always connected and available, are a growing trend which are applied on devices. The dependence on internet for providing results, introduces various complexities because in some places the extent of the internet is limited. Therefore the context aware technology should be made to work offline using the power of smart devices like smartphones which is owned by the majority of the world. In this way the technology can be provided on to various smart devices which would result in a much more enriched user experience.
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud
A survey on context aware system & intelligent Middleware’sIOSR Journals
Abstract: Context aware system or Sentient system is the most profound concept in the ubiquitous computing.
In the cloud system or in distributed computing building a context aware system is difficult task and
programmer should use more generic programming framework. On the basis of layered conceptual design, we
introduce Context aware systems with Context aware middleware’s. On the basis of presented system we will
analyze different approaches of context aware computing. There are many components in the distributed system
and these components should interact with each other because it is the need of many applications. Plenty
Context middleware’s have been made but they are giving partial solutions. In this paper we are giving analysis
of different middleware’s and comprehensive application of it in context caching.
Keywords: Context aware system, Context aware Middleware’s, Context Cache
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
Several large-scale parole leakages exposed users to associate unprecedented risk of speech act and abuse of their data. associate inadequacy of password-based authentication mechanisms is turning into a serious concern for the complete data society. carries with it 3 major modules: (1) Mouse–Behavior dynamics Capture, (2) Feature Construction, and (3) coaching or Classification. the primary module serves to make a taking mouse behavior user signs. The second module is employed to extract holistic and procedural options to characterize mouse behavior and to map the raw options into distance-based options by exploitation numerous distance metrics. The third module, within the coaching section, applies neural network on the distance-based feature vectors to reckon the predominant feature elements, then builds the user’s profile employing a one-class classifier. within the classification section, it determines the user’s identity exploitation the trained classifier within the distance-based feature exploitation NN. A four Digit OTP is generated to the user’s email ID. The user are going to be giving the ‘2’ digit OTP and therefore the server are going to be giving balance ‘2’ digit OTP. Users ‘2’ digit OTP is verified by the server and contrariwise.
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
2. 53
Framework Architecture
Our framework architecture is based on a publish/subscribe service to synchronize data collection, processing
and storage among distributed computational nodes. Data collection is performed by nodes attached to sensors
(for example a webcam, microphone, kinect, etc.), depicted as capture device nodes in Figure 1. Each capture
device node subscribes to start and stop recording events with the centralized server. These events are triggered
by an interface to interact with the system’s user. When the event is published, the centralized server starts to
synchronize all data coming from device nodes.
At the moment the user triggers a start recording event via the session station, capture device nodes
start streaming their raw data to one or more processing nodes (Figure 2). Each processing node handles an
input mode, e.g. video, audio, posture, etc., and each capture device node can send one or more streams to
several processing nodes (for example the capture device node for the kinect sends several streams to different
processing nodes).
All data processing tasks are done in parallel while the session is recording. When the user decides to
finish the session, a stop recording event is published and all capture device nodes stop their data streams.
Additionally, after this event, the data aggregation service waits for all mode-processing nodes to submit their
reports before preparing a feedback summary that is sent to the user (Figure 2).
The purpose of this architecture is to decouple the data processing tasks from the data capture tasks.
Capture devices and mode processing nodes can easily be added or removed from the multimodal system
without major reconfiguration. Upon registration, each capture device is given one or more Uniform Resource
Identifiers URIs of their corresponding processing nodes.
The publish/subscribe server is implemented in a central server using Node.js while all nodes use
Python to receive and send events. Messages are not queued or stored and all recorded data is time-stamped
locally. All server and node clocks are synchronized using the Network Time Protocol (NTP).
Figure 1: The publish/subscribe service synchronizes
multimodal data collection across all capture devices.
Each capture device subscribes to the centralized
server and starts and stops recording events while a
session station publishes these events.
Figure 2: All capture devices stream their data to one
or more mode processing services. Each processing
service reports its results to a data aggregation
service where a feedback is generated and sent to the
user.
Application Example: Multimodal Learning System
To test the developed framework, we created a multimodal learning system (MLS) to collect and analyze
multimodal data from oral presentation’ students. The aim of the MLS is to capture data from several sensors
while students present their work orally and to provide on-time feedback at the end of the presentation by
analyzing nonverbal skills from gathered data. Thus, we design a physical space to locate all sensors having an
immersive, non-intrusive and automatic learning system.
3. 54
Figure 3. Setup of the multimodal learning system.
Hardware and Software
The MLS is composed of three media streams: audio, video and Kinect data. The audio is recorded using a 6-
microphone array with embedded echo cancellation and background noise reduction. This device is located at
the lower border of the presenter’s field of view. Video is recorded using three Raspberry Pis, each one attached
with two low-cost cameras, forming a 6-camera array that covers all sensing area (figure 3 and 4). Kinect data is
recorded with a Microsoft Kinect sensor (version 1). This device is located at the lower border of the presenter’s
field of view, near to the audio device. As depicted in figure 1, all recording hardware is positioned to cover the
multimodal sensing area (4 m2
approximately).
Figure 4. Captured frame from all six cameras.
At the top of the MLS, we created an application using the proposed framework to capture the
presenter’s data and give on-time feedback to the presenter. The application works as follows: 1) The presenter
loads the slides in the computer terminal via USB; 2) The presenter enters a valid email address to receive the
feedback results from the application; 3) the presenter starts the recording of all inputs by clicking a “Start”
button in the computer terminal; 4) the presenter does the oral presentation meanwhile all the servers gather and
analyze each input source; 5) the presenter stops the recording of the data by clicking a “stop” button that
appears in the computer terminal; 6) all partial analysis are sent to the central server ; 7) a summary of the
analysis is constructed and an email is sent to the presenter.
Data Analysis
Doing oral presentations implies the use of verbal and nonverbal communication skills. The purpose of this
MLS is to explore nonverbal skills through the analysis of audio, video and Kinect data streams. Therefore,
4. 55
from each data stream, a set of features are extracted and analyzed to provide a feedback message after the
presentation.
The audio stream is used to measure the clarity of the speech while doing an oral presentation. We
calculate the speech rate and detect the filled pauses of the presenter by following the work of De Jong &
Wempe (2009) and Audhkhasi, Kandhway, Deshmukh & Verma (2009), respectively.
The video stream from the six-camera array estimates the presenter’s gaze. Four of the cameras,
located in front of the presenter, indicate if the presenter is looking at the virtual audience screen, while the left
and right corner cameras help to point if the presenter is looking at the presentation screen. For each video input
the HAAR Cascade face detection algorithm (Lienhart, Kuranov, & Pisarevsky, 2003) is calculated and then,
joining all partial results, we obtained the final gaze position, which is determined by one of the two states:
facing the audience or watching presentation. At the end, we label each frame with one of the two mentioned
states.
Kinect data extracts body posture from skeleton data. Each skeleton frame is composed of 3D
coordinates of 20 joints from the full body. For purposes of this application, only upper limbs and torso joints
are relevant to calculate body posture of presenter. To determine whether a presenter is doing an specific
posture, we define three common postures founded in previous work (Echeverría, Avendaño, Chiluiza, Vásquez
& Ochoa, 2014). Thus, the euclidean distances and orientation are calculated from limb to limb at a frame level
and, each frame is labeled with one of the three postures.
An additional feature of the presentation was determined by analyzing the presenter’s presentation file.
Thus, based on a slide tutoring system tool (Echeverria, Guaman & Chiluiza, 2015), we extracted three features
from each presentation: contrast, number of words and font size. In the end, the tool determined if the
presentation was good or not. The presentation was analyzed per slide and globally.
Feedback
Due to the demanding time when giving on-time feedback in traditional setups, our MLS help us to provide the
feedback information right after finishing the presentation. The email that is sent to the presenter shows a
summary of the states gathered from each modality. Some predefined messages were inferred after selecting a
set of rules that describes whether the nonverbal communication skills were good or bad (figure 5).
Figure 5. Feedback message received by the presenter. Audio, postures and slides were analyzed.
Thus, for audio analysis we use speech rate and number of filled pauses to determine a set of rules that
describe the performance of the presenter while speaking. As for the posture analysis, we took each Kinect
frame labeled as: explaining, pointing or arms down and, calculate a percentage for each posture; with this
information we also determine a set of rules to describe the presenter’s performance according to the body
posture. Finally, the results obtained from the slide tutoring system tool helped to create the set of rules for the
slide analysis.
Experiment
Fifty-four computer science undergraduate students, 42 male and 12 female, were asked to participate in an
experiment to evaluate the proposed framework and the multimodal learning system.
5. 56
Prior to the presentation, they were informed to select an oral presentation they have previously
prepared. The day of the presentation, each student was briefly introduced to the learning system through an
explanation on the usage of the system and immediately started the presentation.
Once the oral presentation concluded, the student observed the system’s feedback and filled a
questionnaire, which consists on six questions using a 10-point likert scale (1: lower value, 10: higher value) and
four open-ended questions about the learning system’s overall impression and suggestions to improve it.
After recording all students, a manual verification task was carried out to delete presentations where a
source was not correctly recorded. Fifty presentations with an average of 8.52 minutes were selected as the final
dataset.
Results
Learners’ feedback showed positive results about the ease of use, intrusiveness, motivation and experience with
non-traditional classrooms (mode: 8), whereas students’ perception about the usefulness was reported in a lesser
extent (mode: 7). Nonetheless, they think that they learnt anything with the MLS (mode: 9) compared to their
previous knowledge. Table 1 shows the minimum, maximum, mode and standard deviation for each likert-scale
question.
Table 2: Scores obtained from likert-scale questions.
Question Min Max Mode Stdv.
On a scale from 1 to 10 with 1 being very awkward, and 10 being very natural, how would
you rate your experience with the application?
1 10 8 1.84
On a scale from 1 to 10, with 1 being very motivated, and 10 being very bored, how
motivated would you be to use the application again?
1 10 8 2.95
On a scale from 1 to 10, with 1 being low, and 10 being very high, how invasive were the
sensors being used to collect data about you?
1 10 1 2.88
On a scale from 1 to 10, with 1 being very likely, and being very unlikely, how likely would
you be to use this application in your free time?
1 10 7 2.73
On a scale of 1 to 10, with 1 being not at all, and 10 being completely, do you feel like you
learned anything while interacting with the application?
2 10 9 1.98
On a scale of 1 to 10, with 1 being much worse, and 10 being much better, how does using
this application compare to how you would normally learn the same content in a traditional
classroom?
1 10 8 2.05
From open-ended questions, learners revealed that they learnt from provided feedback specific issues
related to posture; slide content and contrast; and filled pauses while speaking.
It is important to note that in the verification task we realized that some of the recordings (sources)
were not correctly recorded due to the location of the device according to the presenter’s location. For instance,
some audio recordings were deleted because of the lower tone of voice; in this particular case, the coverage area
of the microphone was overestimated.
Discussion and future work
This paper describes the architecture of a distributed framework to gather and analyze multimodal data. The
framework uses a publish/subscribe paradigm to facilitate the connectivity among nodes along with sensors.
This framework also helps to maintain all the data well organized and in one place through recording sessions.
The analysis of data is made on each dedicated node, which helps to boost the performance of the different
algorithms for feature extraction and further analysis.
Using this framework, help researchers to be more efficient to keep all data synchronized. From this
experience, we reduced the synchronization time and we put more effort on the analysis of data.
In the future, we will make this framework publicly available. We are going to test this framework not
only for mobile devices (e.g. camera/voice recorder from smartphone) but also for digital pens and gadgets or
any kind of sensor. In addition, we want to add some functionality such as basic feature extraction algorithms
depending on the media to help multimodal community focus on the analysis of data.
References
Audhkhasi, K., Kandhway, K., Deshmukh, O. D., & Verma, A. (2009). Formant-based technique for automatic
filled-pause detection in spontaneous spoken English. In Acoustics, Speech and Signal Processing,
2009. ICASSP 2009. IEEE International Conference on (pp. 4857-4860). IEEE.
6. 57
Blikstein, P. (2013). Multimodal learning analytics. In Proceedings of the third international conference on
learning analytics and knowledge (pp. 102-106). ACM.
Camurri, A., Hashimoto, S., Ricchetti, M., Ricci, A., Suzuki, K., Trocca, R., & Volpe, G. (2000). Eyesweb:
Toward gesture and affect recognition in interactive dance and music systems. Computer Music
Journal, 24(1), 57-69.
De Jong, N. H., & Wempe, T. (2009). Praat script to detect syllable nuclei and measure speech rate
automatically. Behavior research methods, 41(2), 385-390.
Diduch, L., Fillinger, A., Hamchi, I., Hoarau, M., & Stanford, V. (2008). Synchronization of data streams in
distributed realtime multimodal signal processing environments using commodity hardware. In ICME
(pp. 1145-1148).
Echeverría, V., Avendaño, A., Chiluiza, K., Vásquez, A., & Ochoa, X. (2014). Presentation Skills Estimation
Based on Video and Kinect Data Analysis. In Proceedings of the 2014 ACM workshop on Multimodal
Learning Analytics Workshop and Grand Challenge (pp. 53-60). ACM.
Echeverria, V., Guaman, B., & Chiluiza, K. (2015). Mirroring Teachers' Assessment of Novice Students'
Presentations through an Intelligent Tutor System. In Computer Aided System Engineering (APCASE),
2015 Asia-Pacific Conference on (pp. 264-269). IEEE.
Hoste, L., Dumas, B., & Signer, B. (2011, November). Mudra: a unified multimodal interaction framework. In
Proceedings of the 13th international conference on multimodal interfaces (pp. 97-104). ACM.
Leong, C. W., Chen, L., Feng, G., Lee, C. M., & Mulholland, M. (2015). Utilizing Depth Sensors for Analyzing
Multimodal Presentations: Hardware, Software and Toolkits. In Proceedings of the 2015 ACM on
International Conference on Multimodal Interaction (pp. 547-556). ACM.
Lienhart, R., Kuranov, A., & Pisarevsky, V. (2003). Empirical analysis of detection cascades of boosted
classifiers for rapid object detection. In Pattern Recognition (pp. 297-304). Springer Berlin Heidelberg.
Oviatt, S. (2013). Problem solving, domain expertise and learning: Ground-truth performance results for math
data corpus. In Proceedings of the 15th ACM on International conference on multimodal interaction
(pp. 569-574). ACM.
Scherer, S., Weibel, N., Morency, L. P., & Oviatt, S. (2012). Multimodal prediction of expertise and leadership
in learning groups. In Proceedings of the 1st International Workshop on Multimodal Learning
Analytics (p. 1). ACM.
Worsley, M., & Blikstein, P. (2015). Leveraging multimodal learning analytics to differentiate student learning
strategies. In Proceedings of the Fifth International Conference on Learning Analytics And Knowledge
(pp. 360-367). ACM.
Acknowledgments
The authors would like to thank the SENESCYT for its support in the development of this study, to ESPOL's
educators and students that participated in the experiment.