SeOppi Oppiminen ja koulutus -teemanumero ilmestyi huhtikuussa 2012.
Julkaisu sis辰lt辰辰 artikkeleita mm. seuraavista aiheista:
- K辰ytt辰j辰t muodostavat verkko-opetuksen arvon
- Opetus, tiede ja tutkimus uusi 2.0-vaihe SOMEttamalla
- Nettikansaa k辰til旦id辰辰n
- Internet-palveluiden k辰ytt旦ehdot tarkentuvat
Julkaisua painettiin 5000 kpl.
Outi Kuittisen esitelm辰 Helsingin yliopiston humanistisen tiedekunnan FHKT:n laitoksen Murros-projektikurssilaisille.
Presentation on the disruption of work life & what to do then for students of the University of Helsinki.
Tietoyhteiskunnan ja osallistumistalouden asettamat haasteet ja mahdollisuude...Marko Ter辰s
油
Alustuspuheenvuoro Tampereen eOppimisen klusterille, aiheena "Tietoyhteiskunnan ja osallistumistalouden asettamat haasteet ja mahdollisuudet opetuksessa ja ty旦el辰m辰ss辰".
The document discusses how the dopamine system and reward pathway in the brain are related to addiction. When stimulated by something pleasurable, the dopamine system reacts to bring attention to the stimulus. Repeated stimulation causes the brain to need more of the substance or activity to feel pleasure as the stimuli become less salient. This can lead to addiction as the user needs higher amounts to activate the reward pathway and feel the effects.
Outi Kuittisen esitelm辰 Helsingin yliopiston humanistisen tiedekunnan FHKT:n laitoksen Murros-projektikurssilaisille.
Presentation on the disruption of work life & what to do then for students of the University of Helsinki.
Tietoyhteiskunnan ja osallistumistalouden asettamat haasteet ja mahdollisuude...Marko Ter辰s
油
Alustuspuheenvuoro Tampereen eOppimisen klusterille, aiheena "Tietoyhteiskunnan ja osallistumistalouden asettamat haasteet ja mahdollisuudet opetuksessa ja ty旦el辰m辰ss辰".
The document discusses how the dopamine system and reward pathway in the brain are related to addiction. When stimulated by something pleasurable, the dopamine system reacts to bring attention to the stimulus. Repeated stimulation causes the brain to need more of the substance or activity to feel pleasure as the stimuli become less salient. This can lead to addiction as the user needs higher amounts to activate the reward pathway and feel the effects.
During World War II, Navajo men were recruited to create an unbreakable code using their native language. Philip Johnston, a World War I veteran, came up with the idea to use the complex Navajo language for military communications. Words for common terms were translated into Navajo code, which the Japanese were unable to decipher. The Navajo code talkers played a vital role in helping the U.S. communicate securely in the Pacific theater and are credited with saving many lives. After the war, the Navajo code talkers received medals in recognition of their brave and important service.
Hardoon Image Ranking With Implicit Feedback From Eye MovementsKalle
油
In order to help users navigate an image search system, one could
provide explicit information on a small set of images as to which
of them are relevant or not to their task. These rankings are learned
in order to present a user with a new set of images that are relevant
to their task. Requiring such explicit information may not
be feasible in a number of cases, we consider the setting where
the user provides implicit feedback, eye movements, to assist when
performing such a task. This paper explores the idea of implicitly
incorporating eye movement features in an image ranking task
where only images are available during testing. Previous work had
demonstrated that combining eye movement and image features improved
on the retrieval accuracy when compared to using each of
the sources independently. Despite these encouraging results the
proposed approach is unrealistic as no eye movements will be presented
a-priori for new images (i.e. only after the ranked images are
presented would one be able to measure a users eye movements
on them). We propose a novel search methodology which combines
image features together with implicit feedback from users
eye movements in a tensor ranking Support Vector Machine and
show that it is possible to extract the individual source-specific
weight vectors. Furthermore, we demonstrate that the decomposed
image weight vector is able to construct a new image-based semantic
space that outperforms the retrieval accuracy than when solely
using the image-features.
The document discusses changes to runtime permissions in Android 6 and links to documentation about those changes. It also provides code snippets for configuring an AeroGear push registration manager to work with a unified push server using Google Cloud Messaging sender IDs, variant IDs, secrets, and other parameters. References are included to additional Google documentation on cloud messaging topics.
na cookies merupakan (brand) Merek dagang dari sebuah Perusahaan kue kering yang telah berdiri sejak tahun 1997. nama Ina cookies muncul berkat kepiawaian seorang wanita bernama Rr Ina Wiyandini Dalam Menciptakan dan mengkreasikan kue kering untuk hari raya . Awalnya kue kring hanya berkutat pada nastar, Kastengels daan putri salju saja. Namun ibu ina kemudian melakukan inovasi baru untuk menambah jenis kue kering, Dengan memberikan toping coklat atau menggunakan bahan tradisional seperti tahu, tempe, dan jamur yang kemudian di olah menjadi kue kering. ina cookies merupakan The most creative cookies sesuai dengan semboyannya
Kinnunen Towards Task Independent Person Authentication Using Eye Movement Si...Kalle
油
We propose a person authentication system using eye movement signals. In security scenarios, eye-tracking has earlier been used for gaze-based password entry. A few authors have also used physical features of eye movement signals for authentication in a taskdependent
scenario with matched training and test samples. We propose and implement a task-independent scenario whereby the training and test samples can be arbitrary. We use short-term eye gaze direction to construct feature vectors which are modeled using Gaussian mixtures. The results suggest that there are personspecific features in the eye movements that can be modeled in a task-independent manner. The range of possible applications extends
beyond the security-type of authentication to proactive and user-convenience systems.
A model of visual saliency is often used to highlight interesting or perceptually significant features in an image. If a specific task is imposed upon the viewer, then the image features that disambiguate task-related objects from non-task-related locations should be incorporated into the saliency determination as top-down information. For this study, viewers were given the task of locating potentially cancerous lesions in synthetically-generated medical images. An ensemble of saliency maps was created to model the target versus error features that attract attention. For MRI images, lesions are most reliably modeled by luminance features and errors are mostly modeled by color features, depending upon the type of error (search, recognition, or decision). Other imaging modalities showed similar differences between the target and error features
that contribute to top-down saliency. This study provides evidence that image-derived saliency is task-dependent and may be used to predict target or error locations in complex images.
This document proposes the concept of Fleat, a mobile application that helps mothers plan healthy meals for their families. It describes Fleat as saving time by automatically generating shopping lists and recipe suggestions based on a user's purchases. Fleat also aims to save money by leveraging collective buying power through social "flocks" to offer weekly deals. The concept proposes features like nutritional analysis, recipe suggestions, and shopping lists. It includes a persona of target user Emily Lee and scenarios of how a new user and mobile user would interact with Fleat.
This document provides an overview of SQL injection attacks and techniques for exploiting Microsoft SQL Server databases. It discusses the basics of SQL injection vulnerabilities and how they can be used to bypass authentication, evade audit logs, and search for vulnerable websites. The document then covers normal SQL injection attacks on MSSQL, including using HAVING/GROUP BY, CONVERT functions, and UNION queries. It also discusses blind SQL injection techniques, more advanced attacks using extended stored procedures, and SQL injection worm attacks. Countermeasures are suggested, and the document provides references and greetings.
Diasarja kertoo Lontoon BETT-opetusteknologiamessuilla tammikuussa 2014 oppimastani ja kokemastani. Omat ja muiden suomalaisten matkaraportit on koottu blogiini: http://www.matleenalaakso.fi/2014/01/suomalaisten-bett-2014-matkaraportit.html
Sosiaalisella medialla tehoa ja tuottavuutta teollisuuteen - kuinka mukaan ve...Timo Rainio
油
Esitys "Johtajan tulevaisuus Teollisuus vuonna 2020" -seminaarissa teemana "Sosiaalisella medialla tehoa ja tuottavuutta teollisuuteen - kuinka mukaan verkostoihin"
6. Digipuhetta
tuottavuus nousee vain
digitalisoimalla
Ilman muutosta
toimintatapoihin tai edes muutoshalukkuutta
haluatko heti, vai tehd辰辰nk旦 ATK:lla?
toimii jokaisella laitteella
Digitaalisuusmuuttaakaiken
digitaalisuus vaatii uuden kulttuurin
digitaalisuussy旦 kulttuurinaamupalaksi
data on uusi 旦ljy
s辰hk旦inen distruptio
7. Itseruoskintaa
ihan kiva
油idea
油mutta
ei toimi Suomessa
Suomalaiset eiv辰t
osaa meill辰 on
油niin huono
itsetunto
Kyll辰 me
油ne
油v辰lineet
hankittiin mutta ei
niit辰 kukaan k辰yt辰http://www.getty.edu/art/collection/objects/314/bernardino-足lanino-足the-足flagellation-足italian-足about-足1550/
8. DIGITAIDOT OSAAMME JA
EMME OSAA
Julkisen sektorin ja kansalaisten hyv辰t edellytykset eiv辰t
konkretisoidu k辰yt旦ksi. Digibarometri 2015:sta
Teknologiateollisuus.fi
9. Mist辰 puhun kun puhun
digitaidoista?
https://www.flickr.com/photos/britishlibrary/1
1227981943/in/album-足72157638544764936/
13. Taitotasot yleisesti v辰lineist辰 ja
yksityiskohdista viis
Oleellista: HYDYNTMINEN
1.
油
Henkil旦kohtaiset
perus IT
油-足taidot
2.
油
Henkil旦kohtaiset
verkkotaidot
3.
油Yhteisty旦
verkkoa
hy旦dynt辰en
Osaan
kirjoittaa
dokumentin ja
油
tallentaa sen
L旦yd辰n tietoa,
油
osaan viestitell辰
ja
油osaan jakaa
kuvia yms
Jaettujen
tietojen
muokkaus tiimin
kesken on
油
arkip辰iv辰辰
14. Bonustaso 4: yhteisesti sovitut
toimintatavat! (harvinaista herkkua)
Yhteinen
jaettu
tieto
Muokkaan
sovitulla
tavalla
Luon uutta
sovitulla
tavalla
Hy旦dynn辰n
sovitulla
tavalla
16. Yhdess辰 sovitut prosessit
nopeuttavat uusien mukaantuloa ja
sujuvoittavat arkea. Prosessin ei ole
pakko olla raskas. T辰rke辰辰
s辰辰nn旦llisesti tarkistaa tehd辰辰nk旦
oikeita asioita.
#provinkki:
油kutsu sit辰 ketter辰ksi jos se
油helpottaa!
17. HAASTE: Jos osa yhteis旦st辰
kamppailee tason 1. kanssa, on
vaikeaa ty旦skennell辰 tasolla 3.
@markosuomi
18. Jos yksi jarruttaa, koko yhteis旦
taantuu
Yhteinen
jaettu
tieto
Muokkaan
sovitulla
tavalla
Luon uutta
sovitulla
tavalla
"M辰 en
油halua
koska voin
sanoa ei"
Hy旦dynn辰n
sovitulla
tavalla
37. Hy旦dynnet辰辰n yhteis旦llist辰
oppimista
Wikipedia: Yhteis旦llinen oppiminen on toimintaa, jossa suurehko
ryhm辰 (esim. luokka) yritt辰辰 yhdess辰 tietoisesti ymm辰rt辰辰 tai selitt辰辰
jotakin ilmi旦t辰 tai asiaa. Pyrkiess辰辰n ymm辰rt辰m辰辰n ja selitt辰m辰辰n
ilmi旦t辰, ryhm辰 tuottaa uutta tietoa, jota ei voida palauttaa kenenk辰辰n
yksil旦n tuottamaksi tiedoksi.
@markosuomi
40. Muutosprojektit eiv辰t en辰辰 riit辰
koska arki on jatkuvaa
muutosta. Oppimista pit辰辰
mahdollistaa jatkuvasti.
@markosuomi
41. Tavoitteet johtavat oppimista (ja
toivottavasti hankintoja sek辰 resursointia)
Miksi?
Mik辰 on
油t辰m辰n
tarkoitus,
油mit辰
hy旦dymme?
Tilannekartoitus
Mit辰 osaamme ja
油
mit辰 pit辰辰 osata
jotta tavoitteet
t辰yttyv辰t?
Mit辰
Sis辰lt旦辰
Koulutusta
Sparrausta
Vertaistukea
Miten
omin voimin
ulkopuolista apua
N辰iden yhdistelm辰
verkostot
50. Kuvien l辰hteet
The British Library / Flickr Commons
The Getty Open Content Program
Marko Suomi
https://www.flickr.com/photos/britishlibrary/11114509395/