In the current digital environment, a wide variety of resources have emerged to support the teaching and learning processes. This research focuses on Open Educational Resources (OER), a technological ...innovation that, for its effective implementation within educational institutions, requires the active participation of teachers. The main objective of this research was to identify and solve some of the challenges faced by high school mathematics and physics teachers when incorporating OER into their teaching practice. To achieve this, an Open Educational Resources Workshop was designed and implemented. It was a qualitative research study that employs a Participatory-Action-Research methodology in which it was possible to identify repositories and platforms used by participating teachers. This process led to a change in the perception of the factor “Time to find, review, and select OER”. The research involved the participation of 20 teachers with experience in teaching mathematics and physics at the high school level, in both urban and regional contexts, with at least one year of experience. This work contributes to the knowledge about the incorporation of OER into high school teaching practice in a Mexican context. In addition, it allows the identification of variations in the 5R model, which provides a framework for the implementation of OER in similar educational contexts.
The rapid development of information and communication technologies (ICT) has opened new possibilities for teaching and assessment practices in higher education, including computerbased assessment ...(CBA). Since the effective development of this depends on student acceptance, the present study analyzed the constructs that affect the intention to use CBA through the computer-based assessment acceptance model (CBAAM) at a private university in Mexico. The methodology was quantitative and divided into two phases: 1) application of an assessment with multiple-choice questions with automatic grading, and 2) testing of the measurement and structural model of the CBAAM instrument with 84 first-semester engineering students. The results indicate that playful perception has a direct effect on the use of CBA, while facilitating conditions, computer self-efficacy, perceived ease of use, goal expectation, social influence, and content only have indirect effects. The acceptance model studied explains approximately 47% of the variation in the intention to use. It is recommended to investigate other variables that affect the purpose of use and to apply the model in other contexts for further confirmation.
The RNA subunit of telomerase is an essential component whose primary sequence and length are poorly conserved among eukaryotic organisms. The phytopathogen Ustilago maydis is a dimorphic fungus of ...the order Ustilaginales. We analyzed several species of Ustilaginales to computationally identify the TElomere RNA (TER) gene ter1. To confirm the identity of the TER gene, we disrupted the gene and characterized telomerase-negative mutants. Similar to catalytic TERT mutants, ter1Δ mutants exhibit phenotypes of growth delay, telomere shortening and low replicative potential. ter1-disrupted mutants were unable to infect maize seedlings in heterozygous crosses and showed defects such as cell cycle arrest and segregation failure. We concluded that ter1, which encodes the TER subunit of the telomerase of U. maydis, have similar and perhaps more extensive functions than trt1.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
RESUMEN En el entorno digital actual ha surgido una amplia variedad de recursos destinados a apoyar los procesos de enseñanza-aprendizaje. Esta investigación se centra en los recursos educativos ...abiertos (REA), una innovación tecnológica que, para su efectiva implementación al interior de las instituciones educativas, necesita de la participación de los docentes. El objetivo general de esta investigación fue identificar y solucionar algunos de los desafíos que enfrentan los profesores de matemáticas y física de nivel medio superior (NMS) al incorporar los REA en su práctica docente, para lo cual se diseñó e implementó un taller de recursos educativos abiertos. Se trató de una investigación de corte cualitativo y metodología investigación-acción-participativa en la que se lograron identificar repositorios y plataformas utilizadas por los maestros participantes. Se logró modificar en jerarquía de importancia el factor “tiempo para encontrar, revisar y seleccionar REA”. La investigación contó con la participación de 20 profesores con experiencia en la enseñanza de las matemáticas y la física de NMS, tanto en contextos urbanos como regionales, con al menos un año de trayectoria docente. Este trabajo aporta al conocimiento sobre la incorporación de REA a la práctica docente del NMS en un contexto mexicano. Además, permite identificar variaciones en el modelo de las 5R, lo que proporciona un marco para la implementación de REA en contextos educativos similares.
In recent years, people’s authentication has taken a significant boom due to technological advances and research developed around the subject. In this process, computer vision techniques are used to ...process an image or video to determine a person’s identity. In thisarticle, we analyzed related works to the people authentication process, making a deep analysis in the works based on Support Vector Machines (SVM). In the same way, we roughly explained the stages that make up the process of people authentication. Finally, we present a set of experiments performed, using a feature combination based on color, texture, and symmetry. In contrast, SVM is used for the classification stage. This combination of features, together with the classifier, shows to be an alternative to people authentication
En los últimos años, la autenticación de personas ha tomado un gran auge debido a los avances tecnológicos e investigaciones que se han desarrollado alrededor del tema. En este proceso se usan técnicas de visión por computadora que permiten procesar una imagen o video para determinar la identidad de una persona. En el presente artículo, se analizan trabajos relacionados con el proceso de autenticación de personas, haciendo un análisis profundo en los trabajos basados en Máquina de Vectores de Soporte (Support Vector Machines).De igual manera, se explican a grandes rasgos las diferentes etapas que conforman el proceso de autenticación de personas. Finalmente, se presenta un conjunto de experimentos realizados, utilizando una combinación de características basadas en color, textura y simetría, mientras que, para la etapa de clasificación se utiliza SVM. Esta combinación de características aunada con el clasificador, muestra ser una alternativa para la autenticación de personas.
The Smart Factory has been a concept studied during the last decade that has not been standardized yet; for this reason, the academy and industry have developed a wide variety of new architectures ...that describe the integration of elements for digitization and interconnection. The present research aims to introduce a new architecture proposal for migrating traditional (automation) to smart (digitization) factories, implemented through open-source software. The proposed architecture is integrated, for the first time, by the interconnection of six main elements: cyber-physical systems, edge computing, artificial intelligence, cloud computing, data analytics, and cybersecurity; the research describes in detail their definitions, sub-elements, the interconnection between elements, and the minimum requirements for implementation. The test of the proposed smart factory was done through a scale smart factory pilot testing for a pick and place process, where the assembly of wood pieces from the geometric Tangram's puzzle was required; for this reason, the pilot testing includes a six-degree-of-freedom robot arm, a conveyor, a vision system, and a storage area. The case study conducted in this research allowed the assembly of four puzzles (fish, house, rocket, and swan) that were assembled with four different batches of pieces. The implementation allowed testing flexibility and adaptability. The final assembly reports included the status of assembly, the number of pieces assembled, the number of pieces stored, the assembly sequence, and the assembly time. Similarly, the development of the SCADA system allowed asset control as well as asset monitoring. The KPIs of the assembly process measured productivity (OTD) and time tracking (ATCT and TA) of the 16 tests, founding that the interconnection and digitization of the scale manufacturing cell were fully integrated and allowed repeatability; the proposed SF architecture represents an alternative for the small and medium automated factories to achieve interconnection and digitization, and it is ready to be tested in a more complex scenario.
En los últimos años, la autenticación de personas ha tomado un gran auge debido a los avances tecnológicos e investigaciones que se han desarrollado alrededor del tema. En este proceso se usan ...técnicas de visión por computadora que permiten procesar una imagen o video para determinar la identidad de una persona. En el presente artículo, se analizan trabajos relacionados con el proceso de autenticación de personas, haciendo un análisis profundo en los trabajos basados en Máquina de Vectores de Soporte (Support Vector Machines). De igual manera, se explican a grandes rasgos las diferentes etapas que conforman el proceso de autenticación de personas. Finalmente, se presenta un conjunto de experimentos realizados, utilizando una combinación de características basadas en color, textura y simetría, mientras que, para la etapa de clasificación se utiliza SVM. Esta combinación de características aunada con el clasificador, muestra ser una alternativa para la autenticación de personas.
Wheelchair Control Based on Facial Gesture Recognition Vázquez, J Emmanuel; Martin-Ortiz, Manuel; Olmos-Pineda, Ivan ...
International journal of information technologies and systems approach,
07/2019, Letnik:
12, Številka:
2
Journal Article
Recenzirano
In this article, an approach for controlling a wheelchair using gestures from the user's face is presented, particularly some commands for the basic control operations required for driving a ...wheelchair are recognized. In order to recognize the face gestures an Artificial Neural Network which is trained since it is one of the most successful classifiers in Pattern Recognition. In particular, the authors' proposed method is useful for controlling a wheelchair when the user has restricted (or zero) mobility in some parts of the body such as: legs, arms or hands. According to their experimental results, the proposed approach provides a successful tool for controlling a wheelchair through a Natural User Interface based on machine learning.
•Three different approaches to extracting features from EEG spectrograms are proposed with relevant results.•Type window and overlapping from short time Fourier Transform is justified based on ...spectrum energy.•A method for selecting the window length from short-time Fourier transform based on signal frequency is proposed.•For the two-classes problem case the here proposed method is competitive in accuracy when compared against the literature.•This approach requires fewer features than others.
Identification of EEG signals is currently an open problem where performance analysis in terms of accuracy is relevant in several fields, such as biomedicine and brain computer interfaces. Nevertheless, performance depends on the feature extraction phase, where the aim is to find relevant patterns related to different mental activities. Thus, in this work, an approach to extract features from EEG signals is proposed based on spectrograms: Firstly, STFT is applied to EEG to obtain time-frequency representations, where parameters such as window length and type are experimented based on the EEG signal frequency. After that, spectral peaks are found to be used as reference in order to obtain descriptors per spectrogram. Three ways for extracting features from EEG are presented, the first based on frequency and surfaces, the second using K-means to extract features and the adaptation of local ternary pattern, and finally, a third using maximum peaks. The extracted descriptors are evaluated by means of a multilayer perceptron, support vector machines, and k-nearest neighbors. The proposed approach was evaluated using the dataset from Bonn University, identifying a healthy person and an epileptic attack classes as main task. According to the experimental results, the proposed method obtains acceptable accuracy (100%) in several cases by considering fewer features than those extracted by other related works.
•An automatic region of interest segmentation method•A set of rules as a metric to measure the region of interest segmentation results•Analysis of thermal matrices as new data source for feature ...extraction•Design of experiments in a more robust manner taking into account most of the images in the database•Genetic algorithm for hyperparameter tunning for the Artificial Neural Network
Breast thermography images are a new type of data that has been analyzed in recent years in order to detect abnormalities, which can lead to a future breast cancer. This paper proposes a methodology for breast thermal image classification, which is useful in Computer-Aided Detection Systems. The main contribution is an automatic method to segment the region of interest (ROI) based on local operations, local analysis, interpolation and statistical operators. For our experiments, we used an image database that is widely used in this research area, obtaining accuracy results between 90.17% and 98.33%, which are competitive with respect to related works.