Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Robot Perception Errors And Human Resolution Strategies In Situated Human-Robot Dialogue, Niels Schütte, Brian Mac Namee, John D. Kelleher Jan 2017

Robot Perception Errors And Human Resolution Strategies In Situated Human-Robot Dialogue, Niels Schütte, Brian Mac Namee, John D. Kelleher

Articles

Errors in visual perception may cause problems in situated dialogues. We investigated this problem through an experiment in which human participants interacted through a natural language dialogue interface with a simulated robot.We introduced errors into the robot’s perception, and observed the resulting problems in the dialogues and their resolutions.We then introduced different methods for the user to request information about the robot’s understanding of the environment. We quantify the impact of perception errors on the dialogues, and investigate resolution attempts by users at a structural level and at the level of referring expressions.


Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly Jan 2017

Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly

Articles

n recent years, data analytics has been a growing phenomenon in many fields, including sport, and there has been an increased focus on how technology will impact the work of coaching andperformance professionals. This paper provides a reflection of the use of data analytics within the Gaelic Athletic Association’s (GAA) football coaching practice in Ireland, and evaluates for coaches how to enhance kick- out distribution and effectiveness. Specifically, the study aimed to dissect and analyse kick- out strategies to assess from a coaching perspective, the impact on distribution andeffectiveness. The research is a …


Information Hiding With Data Diffusion Using Convolutional Encoding For Super-Encryption, Jonathan Blackledge, Paul Tobin, J. Myeza, C.M. Adolfo Jan 2017

Information Hiding With Data Diffusion Using Convolutional Encoding For Super-Encryption, Jonathan Blackledge, Paul Tobin, J. Myeza, C.M. Adolfo

Articles

The unification of data encryption with information hiding methods continues to receive significant attention because of the importance of protecting encrypted information by making it covert. This is because one of the principal limitations in any cryptographic system is that encrypted data flags the potential importance of the data (i.e. the plaintext information that has been encrypted) possibly leading to the launch of an attack which may or may not be successful. Information hiding overcomes this limitation by making the data (which may be the plaintext or the encrypted plaintext) imperceptible, the security of the hidden information being compromised if …


A Conceptual Framework For A Software Development Process Based On Computational Thinking, Catherine Higgins, Ciaran O'Leary, Orla Hanratty, Fredrick Mtenzi Jan 2017

A Conceptual Framework For A Software Development Process Based On Computational Thinking, Catherine Higgins, Ciaran O'Leary, Orla Hanratty, Fredrick Mtenzi

Articles

A software development process is a mechanism for problem solving to help software developers plan, design and structure the development of software to solve a problem. Without a process to guide the structured evolution of a solution, it is extremely likely that at least some aspect of the resulting software will be omitted or incorrectly implemented. Even though the importance of utilising a software process for solving problems is accepted in the business and academic communities, it is a topic that is addressed very lightly (if at all) in most freshman undergraduate computing courses with most courses focussing on programming …


Abusive Text Detection Using Neural Networks, Hao Chen, Susan Mckeever, Sarah Jane Delany Jan 2017

Abusive Text Detection Using Neural Networks, Hao Chen, Susan Mckeever, Sarah Jane Delany

Articles

Neurall network models have become increasingly popular for text classification in recent years. In particular, the emergence of word embeddings within deep learning architecture has recently attracted a high level of attention amongst researchers.


A Software Development Process For Freshman Undergraduate Students, Catherine Higgins, Fredrick Mtenzi, Ciaran O'Leary, Orla Hanratty, Claire Mcavinia Jan 2017

A Software Development Process For Freshman Undergraduate Students, Catherine Higgins, Fredrick Mtenzi, Ciaran O'Leary, Orla Hanratty, Claire Mcavinia

Articles

This conceptual paper presents work which is part of an ongoing research project into the design of a software development process aimed at freshman, undergraduate computing students. The process of how to plan and develop a solution is a topic that is addressed very lightly in many freshman, undergraduate courses which can leave novices open to developing habit-forming, maladaptive cognitive practices. The conceptual software development process described in this paper has a learning process at its core which centres on declarative knowledge (in the form of threshold concepts) and procedural knowledge (in the form of computational thinking skills) scaffolding freshman …


Subjective Usability, Mental Workload Assessments And Their Impact On Objective Human Performance, Luca Longo Jan 2017

Subjective Usability, Mental Workload Assessments And Their Impact On Objective Human Performance, Luca Longo

Articles

Self-reporting procedures and inspection methods have been largely employed in the fields of interaction and web-design for assessing the usability of interfaces. However, there seems to be a propensity to ignore features related to end-users or the context of application during the usability assessment procedure. This research proposes the adoption of the construct of mental workload as an additional aid to inform interaction and web-design. A user-study has been performed in the context of human-web interaction. The main objective was to explore the relationship between the perception of usability of the interfaces of three popular web-sites and the mental workload …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …