Theoretical and Practical Experiences in the Use and Appreciation of the Audiovisual Aids by Professionals in Education
Abel Alfonso Castro,
Yuri Belén Ramírez,
Carmen Rosa Seijas Bagué,
Ana María Reyes Suárez,
Edward Peter Kardas
Issue:
Volume 6, Issue 2, June 2021
Pages:
22-29
Received:
6 February 2021
Accepted:
26 March 2021
Published:
20 April 2021
Abstract: The gradual incorporation of information and communication technologies influences all sectors of society, and education is not immune to this phenomenon, which has led to the use of various technological resources, including audiovisual aids. Their adoption poses constant challenges, since it requires knowledge and mastery of skills, so all actors will have to become literate in this regard at some point. The research starts from the systematization of the processes of integration and educational use of Information and Communication Technologies. In that sense, the authors of the following work intend to spread some experiences about the use and appreciation of the audiovisual aids, through theoretical approaches and inquiries made at different levels, educational and work contexts, a methodological procedure is also proposed that guides how to appreciate audiovisual aids, the result of research carried out with students and teachers. For its development, there were used the following methods: historical-logical, analysis and syntheses, explanatory- illustrative and observation, those that were carried out from perceptual processes, like analysis, synthesis, logic, and through abstraction, by allowing an exhaustive study on the theme and promoting the knowledge and development of the ability to appreciate audiovisual aids with their respective operations and actions, elements that are represented through the theoretical and practical experiences disseminated in the body of the work.
Abstract: The gradual incorporation of information and communication technologies influences all sectors of society, and education is not immune to this phenomenon, which has led to the use of various technological resources, including audiovisual aids. Their adoption poses constant challenges, since it requires knowledge and mastery of skills, so all actors...
Show More
Distributed Decision Fusion with M-ary Signaling and k-bit Transmission on Sensor Observation in Wireless Sensor Networks
Victor Wen-Kai Cheng,
Tsang-Yi Wang
Issue:
Volume 6, Issue 2, June 2021
Pages:
30-37
Received:
13 March 2021
Accepted:
30 March 2021
Published:
7 May 2021
Abstract: Multi-level decisions on sensor detection is able to improve the detection performance on the final decision made at the fusion center (FC) in wireless sensor networks (WSN). In this paper, the performance analysis of an M-ary signaling (MS) scheme using analog transmission and a k-bit transmission (KB) scheme is both examined for distributed binary detection. Under the multi-level decision algorithms, each sensor sends a signal carrying the information of a quantized version of a local decision statistic such as the conditional mean or the log-likelihood ratio. In MS, the output of the quantizer is transmitted directly without digitalizing and coding process, while in KB, each quantization output is coded with k bits and hereby a sensor sends a k-bit hard local decision to the FC. At the FC, the linear combiner detection rule on the transmission schemes is both adopted to make the final decision. The effects of the sensor decision and the transmission errors are incorporated in the analysis of the erroneous performance of the final decision. The goal of the proposed schemes is to minimize the final errors at the FC via optimizing the region allocation on the multi-level decision at the sensor. The numerical results illustrate that the proposed schemes achieve significant improvement in error performance over the conventional schemes under either additive white Gaussian noise (AWGN) channel or Rayleigh faded channel.
Abstract: Multi-level decisions on sensor detection is able to improve the detection performance on the final decision made at the fusion center (FC) in wireless sensor networks (WSN). In this paper, the performance analysis of an M-ary signaling (MS) scheme using analog transmission and a k-bit transmission (KB) scheme is both examined for distributed binar...
Show More
Speculative Packet Dispatch for Virtual Output Queuing Architecture Using LSTM Recurrent Neural Network
Alex Sumarsono,
Mario Rodriguez
Issue:
Volume 6, Issue 2, June 2021
Pages:
38-45
Received:
27 April 2021
Accepted:
17 May 2021
Published:
27 May 2021
Abstract: Virtual Output Queuing (VOQ) is an architecture widely employed in modern networking products. Traffic from every ingress port is stored in a set of queues mirroring the structure of the egress ports. This architecture allows congestion on one egress port to be isolated from the other ports. A request-grant protocol is used to route packets from ingress to egress. When a packet is received, a request signal is issued. After the request reaches the egress side, a grant signal is generated based on some fixed threshold indicating there is space in the egress buffer to absorb the largest packet size dispatched from ingress. The buffer must be sized deep enough to accommodate in-flight traffic associated with a scenario where heavy congestion is found after the grant is issued. Awaiting a grant signal to arrive before dispatching packets incurs significant end-to-end latency. To alleviate this problem, a speculative packet dispatch approach (SPD) is proposed in which the request grant protocol is completely eliminated. Packets are dispatched speculatively from ingress to egress based on predictions that there is enough space in the egress buffer. This is achieved by incorporating an LSTM recurrent neural network as part of the VOQ controller. The LSTM is trained by time-series data sets generated from past observations on the queue occupancy. The experimental results show that SPD delivers excellent improvement on the system performance, reduces buffering requirements and preserves the property of VOQ.
Abstract: Virtual Output Queuing (VOQ) is an architecture widely employed in modern networking products. Traffic from every ingress port is stored in a set of queues mirroring the structure of the egress ports. This architecture allows congestion on one egress port to be isolated from the other ports. A request-grant protocol is used to route packets from in...
Show More
Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters
Issue:
Volume 6, Issue 2, June 2021
Pages:
46-54
Received:
12 May 2021
Accepted:
4 June 2021
Published:
16 June 2021
Abstract: The Risk Assessment Method Threatening Letters (RAT in brief) provides assessors such as forensic psychologists working for law enforcement and justice departments with a structured assessment method for threatening letters. On the basis of an assessment framework and guidelines, threatening letters will be analysed according to eighteen characteristics. The purpose is to arrive at a risk definition regarding the chances that a person will resort to violence, and to apply risk management to individuals who make threats. With the development of the RAT, efforts have been made regarding the identification of threat level of persons whose identity has not yet been established or who have not been detained, due to the absence of a criminal file. With an assessment form, the presence and relevance of eighteen characteristics divided into: content words (9), emotion words (5), linguistic features (3) and details (1), are examined in disturbing and threatening letters. The content analysis allows assessors to encode a text in binary units of measurement (present or not present) and is based on a combination of empirical knowledge and professional judgement. The objective concerns individuals who are posting (repeated) threatening or disturbing letters on social media and whose authorship must be reviewed to reveal background characteristics for the writer, in the case: 1. they are written anonymously; 2. they are intimidating in nature; 3. they undermine faith in social institutions. Its scope includes public figures such as representatives of the government who frequently are subject to threat or violence. However, the RAT is equally useful for the interpretation of threats aimed at other persons in whose cases the nature and seriousness of the type of threat is also of importance.
Abstract: The Risk Assessment Method Threatening Letters (RAT in brief) provides assessors such as forensic psychologists working for law enforcement and justice departments with a structured assessment method for threatening letters. On the basis of an assessment framework and guidelines, threatening letters will be analysed according to eighteen characteri...
Show More