Pub Date : 2023-11-02DOI: 10.3389/fcomp.2023.1135201
Björn W. Schuller, Shahin Amiriparian, Anton Batliner, Alexander Gebhard, Maurice Gerczuk, Vincent Karas, Alexander Kathan, Lennart Seizer, Johanna Löchner
Charisma is considered as one's ability to attract and potentially influence others. Clearly, there can be considerable interest from an artificial intelligence's (AI) perspective to provide it with such skill. Beyond, a plethora of use cases opens up for computational measurement of human charisma, such as for tutoring humans in the acquisition of charisma, mediating human-to-human conversation, or identifying charismatic individuals in big social data. While charisma is a subject of research in its own right, a number of models exist that base it on various “pillars,” that is, dimensions, often following the idea that charisma is given if someone could and would help others. Examples of such pillars, therefore, include influence (could help) and affability (would help) in scientific studies, or power (could help), presence, and warmth (both would help) as a popular concept. Modeling high levels in these dimensions, i. e., high influence and high affability, or high power, presence, and warmth for charismatic AI of the future, e. g., for humanoid robots or virtual agents, seems accomplishable. Beyond, also automatic measurement appears quite feasible with the recent advances in the related fields of Affective Computing and Social Signal Processing. Here, we therefore present a brick by brick blueprint for building machines that can appear charismatic, but also analyse the charisma of others. We first approach the topic very broadly and discuss how the foundation of charisma is defined from a psychological perspective. Throughout the manuscript, the building blocks (bricks) then become more specific and provide concrete groundwork for capturing charisma through artificial intelligence (AI). Following the introduction of the concept of charisma, we switch to charisma in spoken language as an exemplary modality that is essential for human-human and human-computer conversations. The computational perspective then deals with the recognition and generation of charismatic behavior by AI. This includes an overview of the state of play in the field and the aforementioned blueprint. We then list exemplary use cases of computational charismatic skills. The building blocks of application domains and ethics conclude the article.
{"title":"Computational charisma—A brick by brick blueprint for building charismatic artificial intelligence","authors":"Björn W. Schuller, Shahin Amiriparian, Anton Batliner, Alexander Gebhard, Maurice Gerczuk, Vincent Karas, Alexander Kathan, Lennart Seizer, Johanna Löchner","doi":"10.3389/fcomp.2023.1135201","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1135201","url":null,"abstract":"Charisma is considered as one's ability to attract and potentially influence others. Clearly, there can be considerable interest from an artificial intelligence's (AI) perspective to provide it with such skill. Beyond, a plethora of use cases opens up for computational measurement of human charisma, such as for tutoring humans in the acquisition of charisma, mediating human-to-human conversation, or identifying charismatic individuals in big social data. While charisma is a subject of research in its own right, a number of models exist that base it on various “pillars,” that is, dimensions, often following the idea that charisma is given if someone could and would help others. Examples of such pillars, therefore, include influence (could help) and affability (would help) in scientific studies, or power (could help), presence, and warmth (both would help) as a popular concept. Modeling high levels in these dimensions, i. e., high influence and high affability, or high power, presence, and warmth for charismatic AI of the future, e. g., for humanoid robots or virtual agents, seems accomplishable. Beyond, also automatic measurement appears quite feasible with the recent advances in the related fields of Affective Computing and Social Signal Processing. Here, we therefore present a brick by brick blueprint for building machines that can appear charismatic, but also analyse the charisma of others. We first approach the topic very broadly and discuss how the foundation of charisma is defined from a psychological perspective. Throughout the manuscript, the building blocks (bricks) then become more specific and provide concrete groundwork for capturing charisma through artificial intelligence (AI). Following the introduction of the concept of charisma, we switch to charisma in spoken language as an exemplary modality that is essential for human-human and human-computer conversations. The computational perspective then deals with the recognition and generation of charismatic behavior by AI. This includes an overview of the state of play in the field and the aforementioned blueprint. We then list exemplary use cases of computational charismatic skills. The building blocks of application domains and ethics conclude the article.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"178 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135974885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-30DOI: 10.3389/fcomp.2023.1149305
Fengxiang Li, Siska Fitrianie, Merijn Bruijnes, Amal Abdulrahman, Fu Guo, Willem-Paul Brinkman
The Artificial-Social-Agent (ASA) questionnaire is an instrument for evaluating human-ASA interaction. It consists of 19 constructs and related dimensions measured by either 24 questionnaire items (short version) or 90 questionnaire items (long version). The questionnaire was built and validated by a research community effort to make evaluation results more comparable between agents and findings more generalizable. The current questionnaire is in English, which limits its use to only a population with an adequate command of the English language. Translating the questionnaire into more languages allows for the inclusion of other populations and the possibility of comparing them. Therefore, this paper presents a Mandarin Chinese translation of the questionnaire. After three construction cycles that included forward and backward translation, we gave both the final version of the translated and original English questionnaire to 242 bilingual crowd-workers to evaluate 14 ASAs. Results show on average a good level of correlation on the construct/dimension level (ICC M = 0.79, SD = 0.09, range [0.61, 0.95]) and on the item level (ICC M = 0.62, SD = 0.14, range [0.19, 0.92]) between the two languages for the long version, and for the short version (ICC M = 0.66, SD = 0.12, range [0.41, 0.92]). The analysis also established correction values for converting questionnaire item scores between Chinese and English questionnaires. Moreover, we also found systematic differences in English questionnaire scores between the bilingual sample and a previously collected mixed-international English-speaking sample. We hope this and the Chinese questionnaire translation will motivate researchers to study human-ASA interaction among a Chinese literate population and to study cultural similarities and differences in this area.
人工-社会-代理(ASA)问卷是评估人类-社会-代理互动的工具。它由19个构式和相关维度组成,由24个问卷项目(短版)或90个问卷项目(长版)测量。调查问卷是由一个研究团体努力建立和验证的,以使评估结果在药物和发现之间更具可比性。目前的调查问卷是用英语编写的,这限制了它的使用范围,只有掌握英语语言的人群才能使用。将调查问卷翻译成更多的语言,可以纳入其他人群,并有可能对他们进行比较。因此,本文提出了一份调查问卷的中文翻译。经过前向翻译和后向翻译的三个构建周期,我们将翻译后的最终版本和原始英文问卷交给了242名双语人群工作者,以评估14个asa。结果显示,两种语言在长版本和短版本(ICC M = 0.66, SD = 0.12,范围[0.41,0.92])的结构/维度水平(ICC M = 0.79, SD = 0.09,范围[0.61,0.95])和项目水平(ICC M = 0.62, SD = 0.14,范围[0.19,0.92])上平均具有良好的相关性。分析还建立了中英文问卷项目得分转换的校正值。此外,我们还发现双语样本与先前收集的混合国际英语样本之间的英语问卷得分存在系统性差异。我们希望这一发现和中文问卷翻译能够激励研究人员在中国识字人群中研究人类与asa的互动,并研究这一领域的文化异同。
{"title":"Mandarin Chinese translation of the Artificial-Social-Agent questionnaire instrument for evaluating human-agent interaction","authors":"Fengxiang Li, Siska Fitrianie, Merijn Bruijnes, Amal Abdulrahman, Fu Guo, Willem-Paul Brinkman","doi":"10.3389/fcomp.2023.1149305","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1149305","url":null,"abstract":"The Artificial-Social-Agent (ASA) questionnaire is an instrument for evaluating human-ASA interaction. It consists of 19 constructs and related dimensions measured by either 24 questionnaire items (short version) or 90 questionnaire items (long version). The questionnaire was built and validated by a research community effort to make evaluation results more comparable between agents and findings more generalizable. The current questionnaire is in English, which limits its use to only a population with an adequate command of the English language. Translating the questionnaire into more languages allows for the inclusion of other populations and the possibility of comparing them. Therefore, this paper presents a Mandarin Chinese translation of the questionnaire. After three construction cycles that included forward and backward translation, we gave both the final version of the translated and original English questionnaire to 242 bilingual crowd-workers to evaluate 14 ASAs. Results show on average a good level of correlation on the construct/dimension level (ICC M = 0.79, SD = 0.09, range [0.61, 0.95]) and on the item level (ICC M = 0.62, SD = 0.14, range [0.19, 0.92]) between the two languages for the long version, and for the short version (ICC M = 0.66, SD = 0.12, range [0.41, 0.92]). The analysis also established correction values for converting questionnaire item scores between Chinese and English questionnaires. Moreover, we also found systematic differences in English questionnaire scores between the bilingual sample and a previously collected mixed-international English-speaking sample. We hope this and the Chinese questionnaire translation will motivate researchers to study human-ASA interaction among a Chinese literate population and to study cultural similarities and differences in this area.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"122 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136103968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-30DOI: 10.3389/fcomp.2023.1233905
Susan Loh, Yasu Santo, Marcus Foth
The current outsourcing of maintenance and the use of technological devices to automatically care for plants in buildings change the spatial experience between human office occupants and plants. This caretaker system distances people from plants, inclining us to regard them more as decorative objects. The relationship between humans and plants in a building is often unidirectional, with plants providing humans multiple benefits such as improved health and well-being, and increased worker productivity. In our human-plant interaction study, we developed a layer of care infrastructure within an office building that gives agency to people as a collective to interact with and take care of other non-human beings; that is, plants. In re-imagining mediated human-building interaction, we employed technology as an ambient mediator where people, plants and technology comprised the plant care system in a typical office building. A year-long design intervention was introduced within a typical office floor using artifacts (pots, shelves, and digital system) which we fabricated for the plants. From the results of an 8 week participation experiment together with data from qualitative interviews of 6 study participants, we identified five themes: Technology, Object/Thing, Infrastructuring, Commoning, and Care. Our analysis of these themes informs a care infrastructuring approach where both humans and plants become interdependent office co-inhabitants. By entangling with technology, care, and others, we present an infrastructuring layer to mediate human-building interactions with plants.
{"title":"Plant-human entanglements in buildings: designing for care infrastructuring with office occupants and pot plants","authors":"Susan Loh, Yasu Santo, Marcus Foth","doi":"10.3389/fcomp.2023.1233905","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1233905","url":null,"abstract":"The current outsourcing of maintenance and the use of technological devices to automatically care for plants in buildings change the spatial experience between human office occupants and plants. This caretaker system distances people from plants, inclining us to regard them more as decorative objects. The relationship between humans and plants in a building is often unidirectional, with plants providing humans multiple benefits such as improved health and well-being, and increased worker productivity. In our human-plant interaction study, we developed a layer of care infrastructure within an office building that gives agency to people as a collective to interact with and take care of other non-human beings; that is, plants. In re-imagining mediated human-building interaction, we employed technology as an ambient mediator where people, plants and technology comprised the plant care system in a typical office building. A year-long design intervention was introduced within a typical office floor using artifacts (pots, shelves, and digital system) which we fabricated for the plants. From the results of an 8 week participation experiment together with data from qualitative interviews of 6 study participants, we identified five themes: Technology, Object/Thing, Infrastructuring, Commoning, and Care. Our analysis of these themes informs a care infrastructuring approach where both humans and plants become interdependent office co-inhabitants. By entangling with technology, care, and others, we present an infrastructuring layer to mediate human-building interactions with plants.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"317 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136067720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-30DOI: 10.3389/fcomp.2023.1274832
Huma Jamil, Yajing Liu, Nathaniel Blanchard, Michael Kirby, Chris Peterson
In the ever-evolving landscape of deep learning, novel designs of neural network architectures have been thought to drive progress by enhancing embedded representations. However, recent findings reveal that the embedded representations of various state-of-the-art models are mappable to one another via a simple linear map, thus challenging the notion that architectural variations are meaningfully distinctive. While these linear maps have been established for traditional non-adversarial datasets, e.g., ImageNet, to our knowledge no work has explored the linear relation between adversarial image representations of these datasets generated by different CNNs. Accurately mapping adversarial images signals the feasibility of generalizing an adversarial defense optimized for a specific network. In this work, we demonstrate the existence of a linear mapping of adversarial inputs between different models that can be exploited to develop such model-agnostic, generalized adversarial defense. We further propose an experimental setup designed to underscore the concept of this model-agnostic defense. We train a linear classifier using both adversarial and non-adversarial embeddings within the defended space. Subsequently, we assess its performance using adversarial embeddings from other models that are mapped to this space. Our approach achieves an AUROC of up to 0.99 for both CIFAR-10 and ImageNet datasets.
{"title":"Leveraging linear mapping for model-agnostic adversarial defense","authors":"Huma Jamil, Yajing Liu, Nathaniel Blanchard, Michael Kirby, Chris Peterson","doi":"10.3389/fcomp.2023.1274832","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1274832","url":null,"abstract":"In the ever-evolving landscape of deep learning, novel designs of neural network architectures have been thought to drive progress by enhancing embedded representations. However, recent findings reveal that the embedded representations of various state-of-the-art models are mappable to one another via a simple linear map, thus challenging the notion that architectural variations are meaningfully distinctive. While these linear maps have been established for traditional non-adversarial datasets, e.g., ImageNet, to our knowledge no work has explored the linear relation between adversarial image representations of these datasets generated by different CNNs. Accurately mapping adversarial images signals the feasibility of generalizing an adversarial defense optimized for a specific network. In this work, we demonstrate the existence of a linear mapping of adversarial inputs between different models that can be exploited to develop such model-agnostic, generalized adversarial defense. We further propose an experimental setup designed to underscore the concept of this model-agnostic defense. We train a linear classifier using both adversarial and non-adversarial embeddings within the defended space. Subsequently, we assess its performance using adversarial embeddings from other models that are mapped to this space. Our approach achieves an AUROC of up to 0.99 for both CIFAR-10 and ImageNet datasets.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136105712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-25DOI: 10.3389/fcomp.2023.1154069
Jouni Pöyhönen, Martti Lehto
Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. In the coming years, digitalization and increased levels of autonomy in logistic transport chains are expected to take leaps forward. This development can help create safer, more efficient, more sustainable, and more reliable service chains to meet the requirements for a better quality of life and global prosperity. Port and harbor operations connect the maritime transport to other modes of transportation and enable multimodal transportation. Smart ports play a central role in future transport logistics and supply chains. Digitalization helps improve the efficiency of terminal systems in the processes of these ports. In the best cases, digitalization can also promote the reduction of emissions by optimizing port operations and enhancing cargo and people flows while improving the experience for all stakeholders. The improvement of port processes relies on the development of information and communication technology (ICT) as well as on industrial control systems (ICS) and operation technologies (OT). At the same time, the cyber security of maritime logistics also needs to be addressed. This article presents our findings related to the Sea4Value research goal on cyber security, which is a comprehensive cyber security architecture for port services at the system level. The article emphasizes the importance of a system of systems approach in terms of a comprehensive cyber security management process for port ecosystems. The description and recognition of management steps of every stakeholder are the key elements in this kind of process.
{"title":"Comprehensive cyber security for port and harbor ecosystems","authors":"Jouni Pöyhönen, Martti Lehto","doi":"10.3389/fcomp.2023.1154069","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1154069","url":null,"abstract":"Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. In the coming years, digitalization and increased levels of autonomy in logistic transport chains are expected to take leaps forward. This development can help create safer, more efficient, more sustainable, and more reliable service chains to meet the requirements for a better quality of life and global prosperity. Port and harbor operations connect the maritime transport to other modes of transportation and enable multimodal transportation. Smart ports play a central role in future transport logistics and supply chains. Digitalization helps improve the efficiency of terminal systems in the processes of these ports. In the best cases, digitalization can also promote the reduction of emissions by optimizing port operations and enhancing cargo and people flows while improving the experience for all stakeholders. The improvement of port processes relies on the development of information and communication technology (ICT) as well as on industrial control systems (ICS) and operation technologies (OT). At the same time, the cyber security of maritime logistics also needs to be addressed. This article presents our findings related to the Sea4Value research goal on cyber security, which is a comprehensive cyber security architecture for port services at the system level. The article emphasizes the importance of a system of systems approach in terms of a comprehensive cyber security management process for port ecosystems. The description and recognition of management steps of every stakeholder are the key elements in this kind of process.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-24DOI: 10.3389/fcomp.2023.1158476
Erivan Gonçalves Duarte, Isabelle Cossette, Marcelo M. Wanderley
Music educators and researchers have grown increasingly aware of the need for traditional musical practices to promote inclusive music for disabled people. Inclusive music participation has been addressed by Accessible Digital Musical Instruments (ADMIs), which welcome different ways of playing and perceiving music, with considerable impact on music-making for disabled people. ADMIs offer exciting possibilities for instrument design to consider and incorporate individual constraints (e.g., missing arm, low vision, hearing loss, etc.) more than traditional acoustic instruments, whose generally fixed design allows little room for disabled musicians inclusivity. Relatively few works discuss ADMIs in the context of disability studies, and no work has investigated the impact of different disability models in the process of designing inclusive music technology. This paper proposes criteria to classify ADMIs according to the medical, social, and cultural models of disability, then applies these criteria to evaluate eleven ADMIs targeting d/Deaf people. This analysis allows us to reflect on the design of ADMIs from different perspectives of disability, giving insights for future projects and deepening our understanding of medical, social, and cultural aspects of accessible music technology.
{"title":"Analysis of Accessible Digital Musical Instruments through the lens of disability models: a case study with instruments targeting d/Deaf people","authors":"Erivan Gonçalves Duarte, Isabelle Cossette, Marcelo M. Wanderley","doi":"10.3389/fcomp.2023.1158476","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1158476","url":null,"abstract":"Music educators and researchers have grown increasingly aware of the need for traditional musical practices to promote inclusive music for disabled people. Inclusive music participation has been addressed by Accessible Digital Musical Instruments (ADMIs), which welcome different ways of playing and perceiving music, with considerable impact on music-making for disabled people. ADMIs offer exciting possibilities for instrument design to consider and incorporate individual constraints (e.g., missing arm, low vision, hearing loss, etc.) more than traditional acoustic instruments, whose generally fixed design allows little room for disabled musicians inclusivity. Relatively few works discuss ADMIs in the context of disability studies, and no work has investigated the impact of different disability models in the process of designing inclusive music technology. This paper proposes criteria to classify ADMIs according to the medical, social, and cultural models of disability, then applies these criteria to evaluate eleven ADMIs targeting d/Deaf people. This analysis allows us to reflect on the design of ADMIs from different perspectives of disability, giving insights for future projects and deepening our understanding of medical, social, and cultural aspects of accessible music technology.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135265965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-23DOI: 10.3389/fcomp.2023.1209515
Sally Hamouda, Sahith Kancharla, Gurkirat Singh, Lin Yang, Zhuoqun Wang, Siliang Zhang, Raseen Nirjhar, John Golden
Data and visualizations are powerful tools that provide insights, analysis, and conclusions in a logical and easy-to-understand manner. However, the current school curriculum lacks adequate preparation for students to understand, analyze, interpret, or create complex data visualizations, which can hinder their potential careers in data science. To address this gap, our project aimed to develop a user-friendly web-based tool that provides interactive lessons on data and visualizations for elementary school children. The website consists of 12 lessons, categorized by grade levels (1st–2nd grade, 3rd–4th grade, and 5th–6th grade), and includes an interactive question-answer section. Users can scroll down after reading the lessons and practice questions based on the visualizations. The website also has the potential to incorporate games related to data and visualization. The lessons are implemented using React.js and Java with the Spring framework, and new lessons can easily be added by storing them in a markdown folder. The website features a navigation bar with tabs for Home, Lessons, Games, About, and Contact. Additionally, a feedback form is included to gather user feedback for further improvements. The website is currently in the testing stage, and future surveys for teachers and elementary school students will be added to enhance the features provided. Our study presents preliminary findings and serves as a foundational exploration. We acknowledge that further research and experimentation are required to validate and expand upon the results discussed herein.
{"title":"KiData: simple data visualization tool for future data scientists","authors":"Sally Hamouda, Sahith Kancharla, Gurkirat Singh, Lin Yang, Zhuoqun Wang, Siliang Zhang, Raseen Nirjhar, John Golden","doi":"10.3389/fcomp.2023.1209515","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1209515","url":null,"abstract":"Data and visualizations are powerful tools that provide insights, analysis, and conclusions in a logical and easy-to-understand manner. However, the current school curriculum lacks adequate preparation for students to understand, analyze, interpret, or create complex data visualizations, which can hinder their potential careers in data science. To address this gap, our project aimed to develop a user-friendly web-based tool that provides interactive lessons on data and visualizations for elementary school children. The website consists of 12 lessons, categorized by grade levels (1st–2nd grade, 3rd–4th grade, and 5th–6th grade), and includes an interactive question-answer section. Users can scroll down after reading the lessons and practice questions based on the visualizations. The website also has the potential to incorporate games related to data and visualization. The lessons are implemented using React.js and Java with the Spring framework, and new lessons can easily be added by storing them in a markdown folder. The website features a navigation bar with tabs for Home, Lessons, Games, About, and Contact. Additionally, a feedback form is included to gather user feedback for further improvements. The website is currently in the testing stage, and future surveys for teachers and elementary school students will be added to enhance the features provided. Our study presents preliminary findings and serves as a foundational exploration. We acknowledge that further research and experimentation are required to validate and expand upon the results discussed herein.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135367735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-20DOI: 10.3389/fcomp.2023.1191853
Shruthi Koratagere Anantha Kumar, Edward J. Oughton
How cost-efficient are potential infrastructure sharing business models for the 5G era (and beyond)? This significant question needs to be addressed if we are to deliver universal affordable broadband in line with Target 9.1 of the UN Sustainable Development Goals. Although almost two-thirds of the global population is now connected, many users still lack access to high-speed and reliable broadband connectivity. Indeed, some of the largest connectivity issues are associated with those living in areas of low economic viability. Consequently, this assessment evaluates the cost implications of different infrastructure sharing business models using a techno-economic assessment framework. The results indicate that a rural 5G neutral host network (NHN) strategy helps to reduce total cost between 10 and 50% compared with other sharing strategies. We also find that, compared to a baseline strategy with No Sharing , the net present value of rural 5G sharing strategies can earn between 30 and 90% more profit. The network upgrades to 5G using various sharing strategies are most sensitive to changes in the average revenue per user, the adoption rate, and the amount of existing site infrastructure. For example, the results from this study show that a 20% variation in demand revenue is estimated to increase the net present value of the sharing strategies by 2–5 times compared to the No Sharing strategy. Similarly, a 10% increase in existing infrastructure lowers the net present value by 8–30%. The infrastructure sharing strategies outlined in this study have the potential to enhance network viability while bridging the digital divide in remote and rural locations.
{"title":"Techno-economic assessment of 5G infrastructure sharing business models in rural areas","authors":"Shruthi Koratagere Anantha Kumar, Edward J. Oughton","doi":"10.3389/fcomp.2023.1191853","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1191853","url":null,"abstract":"How cost-efficient are potential infrastructure sharing business models for the 5G era (and beyond)? This significant question needs to be addressed if we are to deliver universal affordable broadband in line with Target 9.1 of the UN Sustainable Development Goals. Although almost two-thirds of the global population is now connected, many users still lack access to high-speed and reliable broadband connectivity. Indeed, some of the largest connectivity issues are associated with those living in areas of low economic viability. Consequently, this assessment evaluates the cost implications of different infrastructure sharing business models using a techno-economic assessment framework. The results indicate that a rural 5G neutral host network (NHN) strategy helps to reduce total cost between 10 and 50% compared with other sharing strategies. We also find that, compared to a baseline strategy with No Sharing , the net present value of rural 5G sharing strategies can earn between 30 and 90% more profit. The network upgrades to 5G using various sharing strategies are most sensitive to changes in the average revenue per user, the adoption rate, and the amount of existing site infrastructure. For example, the results from this study show that a 20% variation in demand revenue is estimated to increase the net present value of the sharing strategies by 2–5 times compared to the No Sharing strategy. Similarly, a 10% increase in existing infrastructure lowers the net present value by 8–30%. The infrastructure sharing strategies outlined in this study have the potential to enhance network viability while bridging the digital divide in remote and rural locations.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135617015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-19DOI: 10.3389/fcomp.2023.1281100
Phillip Kerger, Ryoji Miyazaki
We investigate a framework for binary image denoising via restricted Boltzmann machines (RBMs) that introduces a denoising objective in quadratic unconstrained binary optimization (QUBO) form well-suited for quantum annealing. The denoising objective is attained by balancing the distribution learned by a trained RBM with a penalty term for derivations from the noisy image. We derive the statistically optimal choice of the penalty parameter assuming the target distribution has been well-approximated, and further suggest an empirically supported modification to make the method robust to that idealistic assumption. We also show under additional assumptions that the denoised images attained by our method are, in expectation, strictly closer to the noise-free images than the noisy images are. While we frame the model as an image denoising model, it can be applied to any binary data. As the QUBO formulation is well-suited for implementation on quantum annealers, we test the model on a D-Wave Advantage machine, and also test on data too large for current quantum annealers by approximating QUBO solutions through classical heuristics.
{"title":"Quantum image denoising: a framework via Boltzmann machines, QUBO, and quantum annealing","authors":"Phillip Kerger, Ryoji Miyazaki","doi":"10.3389/fcomp.2023.1281100","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1281100","url":null,"abstract":"We investigate a framework for binary image denoising via restricted Boltzmann machines (RBMs) that introduces a denoising objective in quadratic unconstrained binary optimization (QUBO) form well-suited for quantum annealing. The denoising objective is attained by balancing the distribution learned by a trained RBM with a penalty term for derivations from the noisy image. We derive the statistically optimal choice of the penalty parameter assuming the target distribution has been well-approximated, and further suggest an empirically supported modification to make the method robust to that idealistic assumption. We also show under additional assumptions that the denoised images attained by our method are, in expectation, strictly closer to the noise-free images than the noisy images are. While we frame the model as an image denoising model, it can be applied to any binary data. As the QUBO formulation is well-suited for implementation on quantum annealers, we test the model on a D-Wave Advantage machine, and also test on data too large for current quantum annealers by approximating QUBO solutions through classical heuristics.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135730414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-16DOI: 10.3389/fcomp.2023.1154737
David Kirsh
In this article, I consider how scientific theories may explain architectural atmosphere. Architects use atmosphere to refer to a holistic, emergent property of a space that partly determines the mood of inhabitants. It is said to be a “subtle, intangible, ambient quality of a place” that also significantly shapes the way we interact with a space. It is caused by the way light, texture, materials, layout, geometry, acoustics, smell, and other perceptual properties influence affect. But it goes beyond these individually because of non-linear interactions between them. In sections one and two, I explain what an externalist account of the atmosphere would look like. This is an interpretation that objectifies the atmosphere, treating it as a complex causal property of buildings and spaces, accessible to scientific study through ethnographic research, through quantifying and minutely observing and recording humans and the buildings they are in, and then using machine learning and statistical analyses to identify correlations. The goal is to push the identification of the underlying external attributes as far as possible, ultimately to where a machine might enter a room, move around, and then label its atmosphere. In section three, I explore an internalist or subjectivist account of the atmosphere. This is the position that pushes back on machine identification of atmospheres. A subjectivist interpretation is harder to study scientifically because it involves knowing so much about the inner state and the history of a person. Culture, incoming mood, prior experience and associations, interests, tasks, social interaction, and more may all affect mood. Section four explores the frequently underestimated role—on emotion and space comprehension—played by the tasks that occupants perform while in a space, and the way their surrounding social and technological context intrudes on their encounter. I introduce and defend the view that tasks, social context, and nearby technology situate a person in a different environment than when they are inactive. This complicates the search for atmosphere. Nonetheless, I end on an optimistic note that there may yet be a place for atmosphere in the neuroscience of architecture, but it will be much different than our current thinking.
{"title":"Atmosphere, mood, and scientific explanation","authors":"David Kirsh","doi":"10.3389/fcomp.2023.1154737","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1154737","url":null,"abstract":"In this article, I consider how scientific theories may explain architectural atmosphere. Architects use atmosphere to refer to a holistic, emergent property of a space that partly determines the mood of inhabitants. It is said to be a “subtle, intangible, ambient quality of a place” that also significantly shapes the way we interact with a space. It is caused by the way light, texture, materials, layout, geometry, acoustics, smell, and other perceptual properties influence affect. But it goes beyond these individually because of non-linear interactions between them. In sections one and two, I explain what an externalist account of the atmosphere would look like. This is an interpretation that objectifies the atmosphere, treating it as a complex causal property of buildings and spaces, accessible to scientific study through ethnographic research, through quantifying and minutely observing and recording humans and the buildings they are in, and then using machine learning and statistical analyses to identify correlations. The goal is to push the identification of the underlying external attributes as far as possible, ultimately to where a machine might enter a room, move around, and then label its atmosphere. In section three, I explore an internalist or subjectivist account of the atmosphere. This is the position that pushes back on machine identification of atmospheres. A subjectivist interpretation is harder to study scientifically because it involves knowing so much about the inner state and the history of a person. Culture, incoming mood, prior experience and associations, interests, tasks, social interaction, and more may all affect mood. Section four explores the frequently underestimated role—on emotion and space comprehension—played by the tasks that occupants perform while in a space, and the way their surrounding social and technological context intrudes on their encounter. I introduce and defend the view that tasks, social context, and nearby technology situate a person in a different environment than when they are inactive. This complicates the search for atmosphere. Nonetheless, I end on an optimistic note that there may yet be a place for atmosphere in the neuroscience of architecture, but it will be much different than our current thinking.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136116738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}