Eur J Investig Health Psychol Educ
September 2024
Previous studies have focused on the design of video lectures to improve students' social presence by enhancing instructor presence for learners in lecture-based online courses; however, there has been limited emphasis on the peer presence in which learning from video lectures takes place. This study's first objective is to develop a social presence (SP)-based teaching strategy to design online learning activities aimed at improving students' social presence by providing social clues about peer presence and encouraging peer communication. The second objective is to compare students' social presence, social interaction, and academic performance from lecture-based online learning supported by either a conventional teaching strategy or an SP-based teaching strategy.
View Article and Find Full Text PDFIEEE Trans Cybern
November 2024
Int J Environ Res Public Health
January 2023
The emotion of humans is an important indicator or reflection of their mental states, e.g., satisfaction or stress, and recognizing or detecting emotion from different media is essential to perform sequence analysis or for certain applications, e.
View Article and Find Full Text PDFIEEE Trans Pattern Anal Mach Intell
March 2023
Graph Convolutional Networks (GCNs), as a prominent example of graph neural networks, are receiving extensive attention for their powerful capability in learning node representations on graphs. There are various extensions, either in sampling and/or node feature aggregation, to further improve GCNs' performance, scalability and applicability in various domains. Still, there is room for further improvements on learning efficiency because performing batch gradient descent using the full dataset for every training iteration, as unavoidable for training (vanilla) GCNs, is not a viable option for large graphs.
View Article and Find Full Text PDFIEEE Trans Neural Netw Learn Syst
April 2024
Three-dimensional point cloud classification is fundamental but still challenging in 3-D vision. Existing graph-based deep learning methods fail to learn both low-level extrinsic and high-level intrinsic features together. These two levels of features are critical to improving classification accuracy.
View Article and Find Full Text PDFInt J Environ Res Public Health
February 2022
The interactions among all members of an online learning community significantly impact collaborative reflection (co-reflection). Although the relationship between learners' roles and co-reflection levels has been explored by previous researchers, it remains unclear when and with whom learners at different co-reflection levels tend to interact. This study adopted multiple methods to examine the interaction patterns of diverse roles among learners with different co-reflection levels based on 11,912 posts.
View Article and Find Full Text PDFStudies have demonstrated that stochastic configuration networks (SCNs) have good potential for rapid data modeling because of their sufficient adequate learning power, which is theoretically guaranteed. Empirical studies have verified that the learner models produced by SCNs can usually achieve favorable test performance in practice but more in-depth theoretical analysis of their generalization power would be useful for constructing SCN-based ensemble models with enhanced generalization capacities. In particular, given a collection of independently developed SCN-based learner models, it is useful to select certain base learners that can potentially obtain preferable test results rather than considering all of the base models together, before simply taking their average in order to build an effective ensemble model.
View Article and Find Full Text PDFMultiview clustering refers to partition data according to its multiple views, where information from different perspectives can be jointly used in some certain complementary manner to produce more sensible clusters. It is believed that most of the existing multiview clustering methods technically suffer from possibly corrupted data, resulting in a dramatically decreased clustering performance. To overcome this challenge, we propose a multiview spectral clustering method based on robust subspace segmentation in this article.
View Article and Find Full Text PDFInt J Environ Res Public Health
March 2020
Learning persistence is a critical element for successful online learning. The evidence provided by psychologists and educators has shown that students' interaction (student-student (SS) interaction, student-instructor (SI) interaction, and student-content (SC) interaction) significantly affects their learning persistence, which is also related to their academic emotions. However, few studies explore the relations among students' interaction, academic emotions and learning persistence in online learning environments.
View Article and Find Full Text PDFIEEE/ACM Trans Comput Biol Bioinform
September 2021
A protein complex is a group of associated polypeptide chains which plays essential roles in the biological process. Given a graph representing protein-protein interactions (PPI) network, it is critical but non-trivial to detect protein complexes, the subsets of proteins that are tightly coupled, from it. Network embedding is a technique to learn low-dimensional representations of vertices in networks.
View Article and Find Full Text PDFThis paper considers a problem of landmark point detection in clothes, which is important and valuable for clothing industry. A novel method for landmark localization has been proposed, which is based on a deep end-to-end architecture using prior of key point associations. With the estimated landmark points as input, a deep network has been proposed to predict clothing categories and attributes.
View Article and Find Full Text PDFIEEE Trans Image Process
September 2018
Learning-based hashing is a leading approach of approximate nearest neighbor search for large-scale image retrieval. In this paper, we develop a deep supervised hashing method for multi-label image retrieval, in which we propose to learn a binary "mask" map that can identify the approximate locations of objects in an image, so that we use this binary "mask" map to obtain length-limited hash codes which mainly focus on an image's objects but ignore the background. The proposed deep architecture consists of four parts: 1) a convolutional sub-network to generate effective image features; 2) a binary "mask" sub-network to identify image objects' approximate locations; 3) a weighted average pooling operation based on the binary "mask" to obtain feature representations and hash codes that pay most attention to foreground objects but ignore the background; and 4) the combination of a triplet ranking loss designed to preserve relative similarities among images and a cross entropy loss defined on image labels.
View Article and Find Full Text PDFRole assignment is a critical element in the role-based collaboration process. There are many factors to consider when decision makers undertake this task. Such factors include a decision maker's preferences and the team's performance.
View Article and Find Full Text PDFFog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack.
View Article and Find Full Text PDFMultitask learning (MTL) aims to improve the generalization performance of multiple tasks by exploiting the shared factors among them. Various metrics (e.g.
View Article and Find Full Text PDFFog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications.
View Article and Find Full Text PDFSensors (Basel)
January 2017
Applications running on the Internet of Things, such as the Wireless Sensor and Actuator Networks (WSANs) platform, generally have different quality of service (QoS) requirements. For urgent events, it is crucial that information be reported to the actuator quickly, and the communication cost is the second factor. However, for interesting events, communication costs, network lifetime and time all become important factors.
View Article and Find Full Text PDF