Ibs Band10
Ibs Band10
6FLHQFH&RPSXWHU(QJLQHHULQJDQG
(GXFDWLRQDO7HFKQRORJ\
TUDpress
IBS Scientific Workshop Proceedings
Herausgegeben von Stiftung IBS, Wolfram Hardt
Band
,QWHUQDWLRQDO6\PSRVLXPRQ
&RPSXWHU6FLHQFH&RPSXWHU
(QJLQHHULQJDQG(GXFDWLRQDO
7HFKQRORJ\
Prof. Dr. Wolfram Hardt (Hrsg.)
TUDpress
2020
%LEOLRJUDȴVFKH,QIRUPDWLRQGHU'HXWVFKHQ1DWLRQDOELEOLRWKHN
'LH'HXWVFKH1DWLRQDOELEOLRWKHNYHU]HLFKQHWGLHVH3XEOLNDWLRQLQGHU
'HXWVFKHQ1DWLRQDOELEOLRJUDȴHGHWDLOOLHUWHELEOLRJUDȴVFKH'DWHQVLQGLP
,QWHUQHW¾EHUKWWSGQEGQEGHDEUXIEDU
%LEOLRJUDSKLFLQIRUPDWLRQSXEOLVKHGE\WKH'HXWVFKH1DWLRQDOELEOLRWKHN
7KH'HXWVFKH1DWLRQDOELEOLRWKHNOLVWVWKLVSXEOLFDWLRQLQWKH'HXWVFKH1D
WLRQDOELEOLRJUDȴHGHWDLOHGELEOLRJUDSKLFGDWDDUHDYDLODEOHLQWKH,QWHUQHW
DWKWWSGQEGQEGH
,6%1
k78'SUHVV
7+(/(08QLYHUVLW¦WVYHUODJ
*PE+XQG&R.*
KWWSZZZWXGSUHVVGH
$OOH5HFKWHYRUEHKDOWHQ$OOULJKWVUHVHUYHG
*HVHW]WYRQGHQ+HUDXVJHEHUQ
3ULQWHGLQ*HUPDQ\
IBS Scientific Workshop Proceedings
The “International Symposium on Computer Science, Computer Engineering and
Educational Technologies” (ISCSET-2020) is the latest edition of the annual
international symposium on computer science funded by the “Internationales
Informatik- und Begegnungszentrum Sachsen (IBS)” fund and organized since 2012.
It was our distinct pleasure for this year’s symposium to organize by the Mongolian
Institute for Educational Research of the Ministry of Education and Science in
cooperation with IBS.
The successful organization of ISCSET-2020 allowed us to provide an opportunity for
leading international researchers to exchange ideas and research outcomes, facilitating
knowledge exchange among the research community.
While this year’s symposium took place at a time of a new normal brought by the
COVID-19 pandemic that has ravaged the world, it brought together leading
researchers in the fields of Computer Science and Educational Technologies in order
to discuss theories, practices, exchange ideas and introduce outcomes of innovative
research.
It is my strong belief that the issues discussed in this symposium will not only allow
us to overcome unprecedented challenges but in turn will make a contribution to
opening the door for citizens of the world to access high quality education in their field
of interest from anywhere in the world.
Even though the symposium took place in an online manner this year due to the
COVID-19 pandemic, we would like to extend our appreciation to the researchers that
took part in the symposium and presented innovative ideas. From the bottom of our
hearts, we would like to wish you endless success in your future works.
We will always be eager to further cooperate with you.
Incorporating Continuity between Professional Subjects into the English Curriculum ……... 14
Batbaatar Dashdemberel
Abstract—To prevent the consequences of emergencies at one-stage approach were used to implement the detection and
the workplace, it is necessary to use personal protective recognition of personal protective equipment instances in
equipment (PPE). There is an important problem of images.
automating personal protective equipment detection. In this
A.MobilenetV3
paper, the problem of automating PPE detection is solved
by using the modern architecture of RetinaNet to detect and The mobilenetV3 model is a representative of a new
classify objects in the image. generation of neural networks, which is based on a modern
architecture designed for low computing resources. Searching
Keywords—deep learning; detecting; classification; for MobileNetV3 [7] describes implementations of the latest
safety; loss function. version of mobile net: MobileNetV3-Large and
MobileNetV3-Small. The model is intended for semantic
I. INTRODUCTION image segmentation and object detection.
There are many hazards at workplaces that can harm the MobileNetV3, shows better results compared to
worker, such as high voltage, falling objects, sparks, etc. For MobileNetV2 [8]: on the MobileNetV3-Large modification it
example, wearing a hardhat is an effective protective measure is more accurate in the classification problem on the
for minimizing the risk of traumatic brain injury. Moreover, ImageNet dataset, and objects are detected more than 25%
a survey conducted by the US Bureau of Labor Statistics faster and with approximately the same accuracy as on
(BLS) suggests that 84% of workers who had suffered impact MobileNetV2, the experiment was carried out on the COCO
injuries to the head were not wearing head protection dataset [9].
equipment [1].
Compared to the previous implementation, MobileNetV3
To ensure the safety of employees at work, there is a need has a set of fundamental innovations: changing the structure
to use personal protective equipment (PPE) to prevent of the bottleneck layer, adding a new activation function, as
situations that threaten the health and life of the employee. As well as moving the expanding layer (bottleneck) beyond the
a result, there is an urgent task of automation of PPE merge level.
detection.
B.YOLOv3
As the field of deep learning and computer vision evolves,
more and more advanced image processing techniques are YOLO or «You Only Look Once» is CNN (convolutional
emerging. neural network) very popular architecture, which is used to
recognize multiple objects in an image. The main feature of
In this paper, the task of PPE detecting is solved by using this architecture compared to others is that most systems
modern neural network architectures to detect objects in the apply CNN several times to different regions of the image; in
image and classify instances. YOLO, CNN is applied once to the entire image at once. The
network divides the image into a kind of grid and predicts
II. OVERVIEW OF ADVANCED DEEP LEARNING SOLUTIONS bounding boxes and assigns it to certain object class.
When solving computer vision problems, two types of
approaches to detection (localization, object detection) and YOLOv3 is an improved version of the YOLO
recognition are used. One-stage approach: this approach uses architecture. It consists of 106 convolutional layers and better
one convolutional neural network to detect an object and detects small objects compared to its predecessor YOLOv2.
assign it to a class. These detectors include SSD [2] and The main feature of YOLOv3 is that there are three layers
YoloV3 [3]. at the output, each of which is designed to detect objects of
On the contrary, two-stage involves 2 stages of object different sizes.
detection. First, the model proposes a set of regions of С. RetinaNet
interests (ROI) by select search or regional proposal network. The RetinaNet [6] neural network differs from other
The proposed regions are sparse as the potential bounding algorithms in a set of fundamental features that allow it to
box candidates can be infinite. Second, a classifier only show good results and outperform competitors in terms of
processes the region candidates. Examples of architectures accuracy, the innovations proposed by RetinaNet authors will
based on this approach are Faster R-CNN [4] or Mask-RCNN be described below. Focal loss function with hyper parameter.
[5]. In the paper [6], the authors consider a modification of the
In this work, neural networks with the architecture loss function (1) for classification problems - Cross-entropy
RetinaNet [6], YoloV3 [3] and MobilenetV3 [7] based on the (CE).
In the article, the authors have chosen the best hyper Fig. 2. RetinaNet network architecture.
parameter value γ = 2. Fig. 1 shows the graph from work [6],
showing the dependence of losses on the accuracy of The specific feature of the pyramidal structure of the
prediction at different values of hyper parameter γ. As can be artificial neural network is that the features extracted by the
seen, the transition from the value of the loss indicator to a convolution layers of the map at different levels of the
high probability of belonging to the class, with the growth of convolution layers of the neural network are considered as a
hyperparameter γ becomes more complicated, i.e. high hierarchical pyramid. Maps at the lower levels have a high
probability of belonging to the class is achievable at resolution, and the upper levels have a high semantic
sufficiently low values . component. Maps of the upper level are up sampled to the
size of the lower layer map, and then combined into a single
set of maps, a similar operation is performed for all layers.
This algorithm structure provides sufficiently high quality
performance against the other modern detector architectures.
Table I shows a comparison table of neural networks and their
mAP (mean Average Precision) indicators at different IoU
(Intersection over Union) - the overlap between the areas of
prediction and validation example.
Indicators
Methods Backbone
AP AP50 AP75
Two-stage methods
Fig. 1. Dependence of the probability of belonging to a class on the loss Faster R-CNN+++ ResNet-101-C4 34.9 55.7 37.4
function at different values of hyper parameter γ.
Faster R-CNN w FPN ResNet-101-FPN 36.2 59.1 39.0
Faster R-CNN by Inception-ResNet-v2 34.7 55.5 36.7
In our work further we will consider an experiment with G-RMI
the selection of hyper parameters and γ, the purpose of which Faster R-CNN w Inception-ResNet-v2- 36.8 57.7 39.2
is to achieve the best possible neural network performance on TDM TDM
its own data set. One-stage methods
YOLOv2 DarkNet-19 21.6 44.0 19.2
Moreover, RetinaNet architecture is based on a pyramidal SSD513 ResNet-101-SSD 31.2 50.4 33.3
structure. The backbone (basic model) for RetinaNet feature DSSD513 ResNet-101-DSSD 33.2 53.3 35.2
map extraction is FPN (Feature Pyramid Network) [10], a RetinaNet ResNet-101-FPN 39.1 59.1 42.3
modification of ResNet architecture [11]. RetinaNet ResNeXt-101-FPN 40.8 61.1 44.1
YOLOv3 608x 608[3] Darknet-53 33.0 57.9 34.4
Also RetinaNet includes two sub networks, the first sub
network performs a concurrent classification of objects at the
backbone outputs, the second, regression of the boundaries of In the article [3] the authors compare indicators of the
the detected object. The activation function of each approach used in RetinaNet and other modern neural
convolution layer is ReLu, the sigmoidal activation function networks with a one-stage YOLOv3 detector. From the Table
is set at the classifier output. Fig. 2 shows structural scheme I, we can see that RetinaNet shows the best results exactly,
of RetinaNet. but loses in frame processing speed. As for the task set in this
10
article, the focus is on object detection accuracy, sacrificing range [0:1]. mAP is calculated for a specific IoU, in this paper
speed. IoU will be taken more or equal to 0.5.
When implementing a system of recognition of PPE, In this paper, due to the Focal Loss functions of the
training is provided on its own dataset: video from production RetinaNet neural network, we will also initialised
hyperparameters of loss functions, the coefficients αt and γ. To
and images of employees with and without PPE. On the
select the optimal value of the hyper parameters of the loss
images were marked areas of PPE, the detector is trained on
function, a search on lattice was performed. The domain of
13 classes: the presence / absence of PPE (positive and definition of hyper parameters was established based on the
negative examples), as well as the presence of a person. The best combinations of parameters in the article [6]: αt = 0.25, γ
data set was marked using the Visual Object Tagging Tool. = 2.0:
The dataset was randomly split into a test dataset and a α = {0.05,0.15,0.25,0,35}
learning dataset at a ratio of 800 examples – learning data,
200 - testing data. The total number of instances in all images γ={0.5,1.0,2.0,3.0,4.0}
is more than 4800 A search was performed for each pair (αt, γ). A series of
The trained neural network model makes a prediction of experiments was performed with the initialisation of different
finding a specific class of PPE in a certain zone. parameters αt and γ of the loss function in order to increase the
mAP50 values. Table II shows the dependence of the quality
The process of training of detectors requires certain indicators of neural network learning with initialised hyper
hyperparameters to be set in advance, such as the number of parameters, in Fig. 3 shows a graph of dependence. As can be
epochs, learning rate, the size of the batch, the optimization seen from the table, the best combination of parameters αt =
method. 0.15, γ = 2 gives AP50 = 58.92.
Number of epochs increasing leads to an increase in TABLE II. TABLE OF THE DEPENDENCE OF THE INDICATORS OF
accuracy, but large number of epochs significantly increases THE QUALITY OF LEARNING A NEURAL NETWORK WITH
INITIALISED HYPER PARAMETERS.
the training time without a noticeable improvement in the
quality of prediction. If the loss values decreased slightly over Hyperparameters Indicators
several epochs in a row training was stopped. The size of the αt γ AP50 Recall precision F-score
batch is the number of images at the input of the neural 0.05 2.0 48.60 0.520 0.394 0.449
network in one pass, was set equal to 2. All hyper parameters 0.15 1.0 53.92 0.510 0.554 0.531
were initialized on the basis of experiments in order to achieve
0.15 2.0 58.92 0.691 0.387 0.496
the optimal ratio between high quality training and the least
0.15 3.0 54.00 0.688 0.230 0.344
time spent.
0.25 0.5 51.25 0.495 0.515 0.505
To minimize the Focal loss quality functional, one of the 0.25 1.0 55.02 0.561 0.509 0.534
effective methods of stochastic optimization was used – Adam 0.25 2.0 58.44 0.706 0.424 0.530
[12], learning rate – 3×10-4, the model was trained in 30 0.25 3.0 55.14 0.748 0.233 0.355
epochs. 0.25 4.0 54.76 0.775 0.206 0.325
A. Hardware and Software 0.35 1.0 50.47 0.605 0.425 0.499
0.35 2.0 57.09 0.690 0.377 0.488
The personal protective equipment detection system was
0.35 3.0 54.78 0.773 0.214 0.335
implemented in the Python 3 programming language using the
Pytorch deep learning library, training visualization tools, the
TensorboardX package, plotly, OpenCV library for computer
vision and image processing algorithms and Nvidia CUDA
technology.
Often, training and testing deep learning models requires
significant computational resources. The use of graphic
process units, the advantage of which is parallel computing,
can reduce the training time, so the model was trained on the
Nvidia GeForce GTX 2060 GPU.
In addition to the GPU, the hardware characteristics of the
PC: Intel Core i7-7900f processor; RAM 16.0 GB; GPU
frequency 1710 MHz, 8192 MB GDDR6 video memory.
B. Experimental results for RetinaNet, MobilenetV3, YOLOv3
To assess the quality of the trained model, the following
indicators were chosen: recall, precision, the main criteria for
the quality of training are their generalization - F-measure (f1 Fig. 3. Graph of mAP versus hyper parameters of the loss function.
score) and Average precision (AP). Recall is an indicator of
the sensitivity of the algorithm to type II errors (false We trained the RetinaNet model at 100 epochs with the
negative). Precision is an indicator of the sensitivity of the best parameters and got the value mAP50 = 60.08, which is
learning algorithm to type I errors (false positives). F-measure comparable to the value mAP50 presented in the original work
can be interpreted as the integral assessment of accuracy and [6]. The models of neural networks YOLOv3 and
recal. mAP calculates the average precision for recall in the MobileNetV3 were also trained. The indicators of the quality
11
of neural networks learning is presented in Table III, the absence of hardhat on workers [13], a method for detecting
results of the learning algorithm are presented in Fig. 4, 5. the presence of hardhat using the SSD neural network
architecture [14], one of the most recent approaches based on
TABLE III. CNN METHODS COMPARISON. YOLOv3 [16]. Table 4 shows comparison between previous
Model Indicators papers and ours.
architecture mAP50 Recall Precision F1-score
TABLE IV. PREVIOUS STUDIES COMPARISON. THE
MobileNetV3 43.81 0.523 0.371 0.449 PERFORMANCE OF THE PROPOSED METHODS IN TERMS OF
YOLOv3 56.35 0.717 0.252 0.355 AVERAGE PRECISION (AP50) AND DETECTION SPEED.
RetinaNet 60.08 0.691 0.387 0.496
Criteria Hat Vest/Uniform
No No FPS
Detection Hat Vest
hat vest
previous studies
Fang et al. [13] >90,00p × × 10
Xie et al. [15]
54,60 × × 11
(CAHD)
Wu et al. [14]
74,76 62,67 × × 3,22
(Pelee-RPA)
Nath et al. [16]
74,29 63,84 74,32 73,18 13
(Approach-1)
Ours 79,90 76,67 80,48 79,98 7
× - Not applicable
p - Precision.
12
the image of a person too. At the same step, we know the [4] S. Ren, K. He, R. Girshick, J. Sun, Faster R-CNN: Towards
coordinates of the head with the helmet or its absence (in the Real-Time Object Detection with Region Proposal Networks,
training sample, there are classes - “with helmet”, “without in IEEE Transactions on Pattern Analysis and Machine
helmet”). Further, knowing the coordinates of the “person” Intelligence, vol. 39, no. 6, pp. 1137-1149, (2017).
object in the image, there is an understanding that the “helmet” [5] K. He, G. Gkioxari, P. Dollár, R. Girshick, Mask R-CNN,
object should not go beyond the boundaries of the “person” 2017 IEEE International Conference on Computer Vision
object. (ICCV), Venice, pp. 2980-2988, (2017).
[6] T. Lin, P. Goyal, R. Girshick, K. He, P. Dollár, Focal Loss for
In cases where it is necessary to expand the functions of Dense Object Detection, 2017 IEEE International Conference
the video analytics system, optionally, a variant of the on Computer Vision (ICCV), Venice, pp. 2999-3007, (2017).
composition of the detector algorithm and the algorithm for [7] A. Howard, M. Sandler, G. Chu, L.-C. Chen, B. Chen, M. Tan,
determining a person’s posture is possible, which allows you W. Wang, Y. Zhu, R. Pang, V. Vasudevan, Q. V. Le, H. Adam.
to analyze a person’s posture to assess and prevent accidents Searching for MobileNetV3 (cite arxiv: 1905.02244), (2019).
in hazardous situations: employee fall, immobility, unusual [8] M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, L. Chen,
behavior, etc. MobileNetV2: Inverted Residuals and Linear Bottlenecks,
2018 IEEE/CVF Conference on Computer Vision and Pattern
To determine the coordinates of body parts and the human Recognition, Salt Lake City, UT, 2018, pp. 4510-4520,
posture, the OpenPose algorithm [17] is used. The (2018).
implemented algorithm has the possibility of several people [9] T.-Y. Lin et al. (2014) Microsoft COCO: Common Objects in
being in the image. At the output of the convolutional neural Context. In: Fleet D., Pajdla T., Schiele B., Tuytelaars T. (eds)
network, we get a discrete set of reference points that Computer Vision – ECCV 2014. ECCV 2014. Lecture Notes
correspond to parts of the body, and then we analyze the in Computer Science, vol 8693. Springer, Cham, (2014).
associations of pairs of points. [10] T. Lin, P. Dollár, R. Girshick, K. He, B. Hariharan, S.
Belongie, Feature Pyramid Networks for Object Detection,
V. CONCLUSION 2017 IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), Honolulu, HI, 2017, pp. 936-944,
Modern methods of data analysis and computer vision can
(2017).
be applied to effectively monitor compliance with safety [11] K. He, X. Zhang, S. Ren, J. Sun, Deep Residual Learning for
standards by employees, which will lead to a reduction in Image Recognition, 2016 IEEE Conference on Computer
emergency situations in hazardous industries. As part of this Vision and Pattern Recognition (CVPR), Las Vegas, NV,
work, an approach using deep learning tools to the task of 2016, pp. 770-778, (2016),
determining the availability of personal protective equipment [12] D. Kingma, J. Ba, Adam: A Method for Stochastic
for employees was proposed: a training data set was prepared, Optimization, International Conference on Learning
the neural network architecture was selected and the optimal Representations (2014).
combination of hyper parameters was established. The value [13] Q. Fang, H. Li, X. Luo, L. Ding, H. Luo, T.M. Rose, W. An,
Detecting non-hardhat-use by a deep learning method from
of the average precision of the trained model (Average
far-field surveillance videos, Autom. Constr. 85 (2018).
precision) AP50 = 60.08. To further improve the quality of the [14] J. Wu, N. Cai, W. Chen, H. Wang, G. Wang, Automatic
algorithm, it is planned to quantitatively and qualitatively detection of hardhats worn by construction personnel: a deep
increase the set of training data, and modify the architecture learning approach and benchmark dataset, Autom. Constr. 106
of the neural network. (2019).
[15] Z. Xie, H. Liu, Z. Li, Y. He, A convolutional neural network
REFERENCES based approach towards real-time hard hat detection, Proc.
[1] M.-W. Park, N. Elsafty, Z. Zhu, Hardhat-wearing detection for IEEE International Conference on Progress in Informatics and
enhancing on-site safety of construction workers, J. Constr. Computing (PIC), IEEE, pp. 430, (2018).
Eng. Manag. 141 (9) (2015). [16] N. D. Natha, A. H. Behzadanb, S. G. Paala, Deep learning for
[2] W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-Y. site safety: Real-time detection of personal protective
Fu, A. C. Berg, SSD: Single Shot MultiBox Detector. In: Leibe equipment, Automation in Construction, Vol. 112, (2020).
B., Matas J., Sebe N., Welling M. (eds) Computer Vision – [17] Z. Cao, G. Hidalgo Martinez, T. Simon, S.-E. Wei, Y. A.
ECCV 2016. ECCV 2016. Lecture Notes in Computer Sheikh, OpenPose: Realtime Multi-Person 2D Pose
Science, vol 9905. Springer, Cham. (2016). Estimation using Part Affinity Fields, IEEE Trans Pattern
[3] J. Redmon, A. Farhadi, YOLOv3: An Incremental Transactions on Pattern Analysis and Machine Intelligence,
Improvement, (cite arxiv:1804.02767 Comment: Tech (2019).
Report), (2018).
13
Incorporating Continuity between Professional
Subjects into the English Curriculum
Batbaatar Dashdemberel
Education department
Orkhon University
Ulaanbaatar, M ongolia
[email protected]
14
developed the new curriculu m o f Fashion 3. Urlakh Erdem Fashion Design Institute
Design course.
2) Co mpiled an innovative textbook with a wide 4. Mongolian State University of Arts and Culture
range of design texts, appropriate exercises, and
word chains based on the content. 5. City University
15
cut area at the front which allows for varying amount of in groups. Between 10-15 new words are included to avoid
___________ to be displayed. When describing a duplicating data and taking less time[11].
___________ we prefer to add a little more detail and would
normally describe the shape as having a ‘V’, either a 'square' TABLE I. CROSSWORD-1 [11]
or a 'U' cut. The Scoop Neckline; Scoop necks are very
similar to a 'U' cut 'Plunging Neckline'; howev er, they № Crosswords’ questions-down
usually have a much ___________ cut and are not 2 more attractive than usual:
uncommonly found on things like T-Sh irts, with a recent 3 graceful and attractive in appearance or behavior:
trend making them very popular especially in men's fashion. 5 the narrow space between a woman’s breasts, that is seen when
A scoop neck tends to allow for more cleavage than a 'U' cut she wears a piece of clothing that does not cover the top of
plunging neckline would, but as you will appreciate where them:
we draw the distinction between the t wo can be a b it 7 a piece of women’s clothing that is held in position by a strap
___________. that goes behind the neck so that the upper back and shoulders
are not covered:
Scoop necklines are ideal for a slightly mo re flirtatious 8 a woman’s breasts:
outfit and are often seen in dresses aimed at the club wear
market. The Boat Neckline; A Boat Neck is a much wider TABLE II. CROSSWORD-2 [11]
neckline that is usually cut into a shallow 'U' shape which
№ Crosswords’ questions-across
often passes the collar bones and hangs on the shoulders.
1 the advantages something has compared to something else:
4 something that you cannot remember or understand clearly:
6 dropping suddenly or having a shape that drops a long way
down:
9 If a threat or doubt hangs over a place or a situation, it exists:
10 extending far down from the top or surface:
№ Sentence-A № Sentence-B
b) Crosswords
1 T his is a reasonably 1 shoulders and neck of the
In addition to thinking skills, two types of word network common neckline that is wearing
exercises were introduced to develop visual and spatial found
skills, allowing students to work in pairs, indiv idually, and
16
№ Sentence-A № Sentence-B
2 Scoop necklines are ideal 2 where the shoulder ends
for a slightly
3 A very modest neckline 3 more flirtatious outfit
that is ideal for
4 T hey normally hangover 4 those situations
the arms below
5 T his is an ideal neckline to 5 on both tops and dresses
accentuate the
__________________ __________________
17
There are a test sample of a min i-shape of a skirt design,
which is widely used by wo men, to create a unique image o f 3 68.96
the garment. As a result of the course, innovative works are
emerging. 2 54.34
1 63.7
2) Memorize the words while drawing and making
small-scale of work Control class 70.2
3 83.2
Fig. 8. Memorize the words [7].
2 63.69
3) Integrate English lessons with other professional
curriculum 1 67.5
0 20 40 60 80 100
Like it very much
Fig .11. T he average grade of three years of study evaluation-1.
Like it
5%
0% Experiments conducted in the 2012-2014 school year
11% Like it moderately showed that the average grade of the control class was
48% 14.54% higher than the highest grade of the normal class [6].
Little bit This suggests that it is mo re effective to use professional
36%
terminology in English lessons, and to use new words in
Dislike
sentences and dialogues in the form of ro le-p lays. It was
also 11.39% more effective than the average for the 2011-
2013 school year.
Fig. 9. Integrate English into professional curriculum.
1) Average English language assessment for the first
This graph shows that 48% like it very much, 36% like term of the 2019-2020 academic year
it, 11% like it moderately, and 5% a little bit. Th is leads to
the conclusion that in the future, it is necessary to integrate
English into professional courses at universities.
18
98 emotional support for the publication of Fashion design
96 English textbooks. Above all I would like to express my
deep gratitude to Professor D.Nyamjav, Ph.D., Sc.D who
94
mentored and supported me in challenging times.
92
90 96.5
88 95 94.6 92.7 93.8 93.8 93.6 REFERENCES
86 90.4 90.3 [1] Ayar, Z. & Yangın-Ekşi, Y. (2019). “Continuing professional
84 87.1 87.1 development options of foreign language school directors”,
International Online Journal of Education and Teaching (IOJET),
82 6(3). 707-721.
1,1 1,2 1,3 1,4 2,1 2,2 2,3 2,4 3,1 3,2 3,5 [2] Azhar, S. M. & Shahid, A. (2014). “ Sketching effective faculty
professional development framework”, Asian Journal of Business
Management, 6(2), 118–123.
Fig. 12. T he average grade of the last semester of study evaluation [3] Baird, , Alexander, (1976), “The study and teaching of literature”,
ELT J, 30, 4, 221–6.Google Scholar
In the first half of the year, the average score was 92.2% [4] Batbaatar.D (2012) "Opportunity to motivate students to learn English
when the Eng lish language curriculu m was developed in using professional learning materials" unpublished report
conjunction with the professional curricula of the university, [5] Batbaatar.D (2012) "Orientation to Teaching English to Professional
Students" unpublished report
and textbooks and manuals were developed and tested. This
[6] Batbaatar.D (2014) “ Opportunities to introduce fashion design
graph shows a dramatic change in the quality of education. English to English training”, Research paper №14, Orkhon
University, 2014
[7] Batbaatar.D (2016) “ Methodological issues of closely linking the
content of professional English courses with other curricula” (on the
III. CONCLUSION example of professional design), Research paper №16, Orkhon
University 2016
Based on our research on “Incorporating Continuity [8] Batbaatar.D, Fashion design English-1, UB 2016
between Professional Subjects into the English Curriculu m” , [9] Batbaatar.D, Fashion design English-2, UB 2016
we developed a detailed curriculu m in conjunction with [10] Batbaatar.D, Fashion design English-3, UB 2016
other professional curricula in collaboration with
[11] Batbaatar.D, Fashion design English-4, UB 2016
professional teachers of design theory and methodology.
[12] Batbaatar.D, Fashion design English-5, UB 2016
Experiments and research on professional English teaching
[13] Batmunkh.T s and Erdenemaam.S, “Theory and methodology of
methods have been successful. This is one of the most foreign language teaching”, UB, 2014
important issues for professional English teachers. [14] Batmunkh.T s, “Theory and methodology of teaching foreign
languages”, UB, 2008
We have developed an English textbook for [15] Bazarragchaa.B, “Comprehension of language”, UB, 2004
undergraduate students majoring in fashion design. The [16] Burmaa.T s and Bayanjargal P, “Methodology of Teaching English”,
possibility of teaching English based on textbooks was Ulaanbaatar, 2012
studied, as a result, professional English language training [17] Burmaa.T s, “Methodological research to teach English language
provided them with the professional vocabulary of design reading skills to students”, Doctoral dissertation, UB, 2011
and laid the foundation for research. [18] Chuluundorj.B, “Introduction to the study of Mongolian language in
parallel with non-native language”, UB, 1999
[19] “ Collaborative Learning ISS Proceedings”, 2013, Page 9
It is necessary to further improve the English language [20] Demid.B, “ Improving foreign language teaching methodology based
teaching methodology for professional fashion design and on the text”, Doctoral dissertation, UB, 1998.
introduce it in university curricula. Educational institutions [21] Galsan.S, “ Linguistics and other aspects”, UB, 2008
and communit ies that provide train ing not only in the field [22] Gurbazar.R, “ Fundamentals of translation theory and practice”, UB,
of design, but also in other innovative fields, should 1996
regularly develop textbooks and manuals that contain the [23] Hajidsuren.N, “ Principles of foreign language teaching”, UB, 1998
content and concepts of the innovative field. [24] Ichinhorloo.Sh, ”Training methodology reform”, UB, 2009
[25] Khishigdelger.B, “Foreign language teaching methods, theory and
Creat ive assignments by students in accordance with the application”, UB, 2015
professional English curricu lu m had a positive effect on the [26] Luvsandorj.T s, “Curriculum development and educational standards”,
learning outcomes and created the conditions for innovative UB, 2004
work. Professional English training is more focused on the [27] Mira.N and Burmaa.Ts, “Problems of English language education and
solutions”, UB, 2009
pragmatis m than theory, and we believe that this
professional English training is effective and extremely [28] Mira.N, “Theoretical and methodological issues of teaching English
to secondary school students”, Doctoral dissertation in Education,
useful. UB, 2003
[29] Mónica Rodríguez-Bonces, “ A basis for the design of a curriculum
incorporating music and drama in children’s English language
ACKNO WLEDGMENT instruction”, Issues in Teachers’ Professional Development, 19(2),
203-223.
I exp ress my gratitude to B. Mungunkhulug, Ph.D., [30] Narantsetseg.M (2016) “Improving the learning process using
Associate Professor, who encouraged me to do research professionally-oriented Russian language textbooks”, Ph.D. thesis
work, G. Tungalag Ph. D, Director of the Mongolian [31] Nyamjav.D, “Theory and methodology of foreign language teaching”,
Fashion Design Institute, who provided financial and UB, 2009
19
[32] Oyun.B, “Exploring the possibility of using game methods in Russian [35] Sukhomlinsky VA, “ One hundred tips for teachers”, UB, 1985
language teaching in secondary schools”, Doctoral dissertation in [36] T sedev.Kh, “Ways to increase professional terminology in foreign
Education, UB, 2006 language lessons”, Page 180
[33] Richards, J.C. (2001). "Curriculum Development in Language [37] T uya.Sh, “Modern methods and technologies of foreign language
T eaching", Cambridge: Cambridge University Press. teaching”, UB, 2010
[34] Sirajul Munir, “Turning Classroom Project into Textbook Design in
English for Specific Purposes Subject”, Dinamika ilmu, Volume
19(1), 2019
20
Education in Pandemic Crisis Implementation via
ICT Online Technologies
Cyryl Koshyk
Director of Technology, AI & Global Expansion ( ICT & Innovation Department)
The Kyoto College of Graduate Studies for Informatics
Kyoto, Japan
[email protected]
Abstract—Due to recent unpredicted COVID-19 pandemic, In 20th century education has changed rapidly with the
the worldwide global outbreak halted the world still. Education development of learning technologies.
sectors were deeply disrupted and tremendously affected. The
situation, forced nearly all schools and universities to rapidly Technologies can now deliver easy to access, proactive
adopt new ICT technologies, shifting into online technologies, and comprehensive learning and teaching environments.
adopting them partially or fully. This new modality, provided
distance learning and teaching, called Education 2.0. II. EDUCATION 2.0
Education 2.0 is online distributed learning for students,
regardless of their physical location which may be affected by As of 2020, students have higher expectations, on
isolation restrictions and country lockdowns. Time critical integrating ICT into classrooms.
assimilation of ICT into education sector became Many researches has proven that usage of ICT in the
indispensable, in order to adhere side effects of pandemic process of learning and teaching, can greatly improve
outbreak of COVID-19.
students achievements, as well as technology based
In Japan, at The Kyoto College of Graduate Studies for education can be useful in – increasing creativity and
Informatics, actions had to be taken rapidly regarding thinking skills.
COVID-19, creating never tested before large scaled successful New generations are born and have grown up with these
online ecosystem, that provided uninterrupted online based technologies. They are defined as “digital natives”. As a
education platform consisting of an all in one learning result, the younger the students, the tendency for them to
education system. This included complete distance learning have a much higher interest and demand for strong ICT
and teaching technologies as: scoring, attendance reporting,
integration.
multi language support, direct interaction as group or one-on-
one, advanced students monitoring. Current online systems provide easy, intuitive learning
factors, giving confidence to professors, and engaging
Keywords—ICT, Pandemic, Education, Artificial students more into achieving greater accomplishments.
Intelligence, Distant Learning, eLearning
Professors express high confidence and competency in
I. INTRODUCTION using ICT to create deeper integrated forms in their
classrooms. When used well, content can become richer, and
Distribution method for education has changed forever, allow for better visual explanations. ICT has to power to
the aftermath of COVID-19 (Coronavirus) will never be offer state of the art interaction, and is now available even on
forgotten, preparing us today for similar, pandemic outbreaks portable mobile devices such as – phones or tablets.
in the near future, where ICT will be crucial and break major
ground for all education sectors.
III. ADOPTED TECHNOLOGIES
ICT (Integration of Information, Communication, and Portable mobile device hardware and processor
Technology) has long assisted school and universities - staff, advancements, allow for the possibility of highly interactive
teachers and professors, to replace traditional teaching learning without the need of personal computers. At KCG
methods with technology-based teaching and learning tools (The Kyoto College of Graduate Studies for Informatics) we
and facilities. While this process has been slow, at the have fully adopted various online platforms, systems and
beginning of 2020, the escalating and exponential infections services which are fully supported on mobile devices, if no
of COVID-19 (Coronavirus) worldwide, forced all schools computers are present.
and universities to resume partial or full operations via ICT
and specifically usage of online platforms, teachers Current following technologies and platforms were used
professors and school stuff had to quickly learn such in online distant teaching and virtual classrooms:
systems, no matter their backgrounds or knowledge. By
x Artificial Intelligence auto translation services
utilizing and adoption of ICT, education has been resumed.
provided by Google - ML AI
In Japan, ICT is considered as one of the main elements,
transforming the country into future development, with a x DeepL (www.deepl.com) for human like AI
strong focus on online eLearning systems and platforms. translated text content for online courses.
Technology-based importance in learning and teaching it is x Zoom (www.zoom.us) for live interaction and
becoming more present in schools. attendance monitoring
21
x YouTube Live (www.youtube.com) backboned by OBS rendered output in form of “Virtual Web Camera”
Google cloud servers, for live 4k streaming could be feed directly into any streaming software or online
platform, as a single video feed at any given resolution (4k,
x Slack (www.slack.com) and Discord HD).
(www.discord.com) for mass interactive multi chat
with students To improve and provide clear audio quality, teachers
used mobile phones as microphones.
x UNASENSE (www.unasense.com) Cutting edge,
worlds first Artificial Intelligence online platform WO Mic (www.wolicheng.com) app and software was
specifically designed for education used as virtual microphones. From in depth testing, we
concluded that, mobile phone microphones provided superior
x dotCampus LMS (www.dotcampus.com) for quality with very low audio noise compared to even higher
publishing, posting, archiving content end webcams built-in microphones.
x Custom written PHP powered modules for interactive
quiz, tests and monitoring, served by Linux operating V. CONTENT QUALITY CONTROL
systems in the cloud, provided and hosted by Google To deliver the highest quality content possible where
Cloud. sound, verbal and visual communication were key factors of
x CDN (Content Delivery Networks) provided by distant teaching, equipment such as camera and microphone
CloudFlare (www.cloudflare.com), for fastest were taken into consideration. We tested multiple hardware
possible delivery to countries outside of Japan, and devices and concluded mobile devices, specifically
ensuring steady and fast hosted content. phones delivered the best quality, overall portability, and
were already distributed to all faculty staff.
By mixing all these technologies together, a new learning
system was provided for complete uninterrupted teaching Technically benchmarked [1], mobile phones are
and learning solution. equipped with much higher CMOS imaging sensors, then
normal computer or laptop cameras. Where 4k and even 8k
resolutions can be achieved, rendering high quality image
IV. CONTENT PREPARATION quality, making it a main choice in our eLearning course
For content preparation, screen capturing software was teachings.
used for easy technical adoption for all professors
Performing well in low light conditions, mobile
(irrespective of age groups or ability with screen
microphone sensitivity delivers high quality sound. Some
capturing/streaming knowledge. Software such as Screen-O-
teachers also used Bluetooth devices for more portability.
Matic (www.screencast-o-matic.com), and FastStone Screen
Recorder (www.faststone.org) were employed. All performed well, and are highly suggested for any type
of video/audio content recordings and online live streaming.
Professors having access to PC based stationary
computers or laptops equipped with Windows 10,
additionally offered already built-it XBOX Game Bar VI. INTERNET REQUIREMENTS
feature, allow for high quality offline video content Many students without access to computer labs relayed
preparation, without the need of additional software. solely on their own mobile devices (phones, tablets). All the
Professors were trained in groups and one on one, via online school’s eLearning content was accessible even on lower
tutorials both in Japanese and English (multi language). bandwidth networks such as 2g and 3g.
All school members, staff and professors were allocated 4k high resolution video streaming feed was
small space in their locations, used green screen material automatically downgraded to lower resolutions, depending
backdrop mounted on wall or tripods, in order to display on viewing device, 4k for regular broadband internet (Cable),
background elements on screen. “Green screen” is a known HD 1920x1080 for 4g, LTE, and 1280x720 for 3g networks
technique, normally used in TV stations for broadcasting as and lower.
well as in feature films productions of visual effects,
allowing green screen material to be replaced and instantly All live video content while streaming was also recorded
turning any wall into fully “transparent backdrop”. This and storage locally on teachers drive. This was, later
allowed for static pictures or animated videos to be displayed uploaded and archived for offline viewing into dotCampus
directly behind the speaker. online eLearning LMS platform.
Powerful multi language open source software OBS
VII. CLASSROOM INTERACTION
(Open Broadcaster Software www.obsproject.com) was used
to create virtual set, basic or complex containing multi- Virtual classrooms greatly differ from traditional ones
layered visual elements such as - pictures, charts, videos, (real presence in physical classrooms).
giving more control of content placement, compared to
However, interesting patterns could be observed in
standalone direct feed web camera.
virtual classrooms. Isolated “single-out” students seem to
OBS software platform enabled teachers to include live focus better, as they felt more responsible and more in
websites with interaction and browsing capabilities, specific control, while in their own private environments, students
full screen or cropped software screen grabs, interactive were less vulnerable, stressed and more open to discussion.
widgets, live playback YouTube reference videos, Better performing students were interacting and active
PowerPoint Charts and more. more in online chat rooms, delivering higher quality home-
work and assignments.
22
All students class hours were tracked by the online YouTube Live, which enabled live auto translations into
platform dotCampus LMS; email and phone push different languages. In The Kyoto College of Graduate
notifications were sent to inform them of next upcoming Studies for Informatics, international students were able to
lessons. watch video streaming in their native language. Additionally,
AI based DeepL services was used for preparing
E-mail communication didn't satisfy our expectations. downloadable PowerPoint presentations in multi languages.
Students equipped with personal computers tend to have
response that were usually delayed. We shifted into mobile All live streaming content after online airing had
devices, which were key in active and fast responsive embedded subtitles.
communication.
By using Google ML speech to text [2], audio spoken
Teachers and students used mobile apps for mass multi language could be embedded into the video stream as well.
chat instant communications such as Slack and Discord at all
times. Students were assigned to specific class groups, few Artificial intelligence has dominated speech to text and
contributing students were also assigned as administrators to text to speech engines for years now, it is a great extension to
filter chat content, and monitor all chat activities. any eLearning platforms.
Additionally, the Discord app allowed for voice and X. ATTENDANCE MONITORING CHALLENGE
webcam communication.
During the pandemic, where the online world was the
Online hours lesson were done via Zoom software app only safe way of communication with students, eLearning
for live feed streaming. class attendant monitoring has been a challenge, whereby
Students using laptops or personal computers could share students were not physically present in classrooms.
their screens directly with teachers, if help or support was The Kyoto College of Graduate Studies for Informatics
needed. Teacher could access and control the student designed its own proprietary system for attendance
keyboard and mouse, helping in specific tasks. monitoring. Students logged to the learning system, using
Many students used both mobile devices for direct their student unique ID number.
communication such as video, voice and chat and personal Additionally, in some classes, "Face ID" AI system were
computer online or offline as work machines. applied, by using custom built artificial intelligence based -
In mandatory courses and classrooms exceeding 250 face recognition system. Some students didn't have access to
students, to provide highest quality streaming, we used computer webcams, so mobile devices (phones, tablets) were
YouTube Live, with outputted low latency in video used instead.
streaming delivery. At most a 5 second delay was noted. As mobile devices are multi-sensory devices, equipped
From our testing, we conclude that YouTube Live is a with cameras and microphones, "Face ID" AI system directly
solid platform for mass streaming. If one-way video scanned students faces from their phone, and recorded online
streaming is sufficient for specific lessons, performance was attendance.
superior and stable, and able to handle hundreds to thousands In conclusion, mobile devices are most versatile form for
of students at once. Additionally YouTube Live offers up to attendance monitoring no matter location or internet
8 hours nonstop recording directly to YouTube, backed by bandwidth speed.
Google servers, downloadable, with built in on the fly auto
translation into over 30 languages.
XI. ASSIGMENTS DELIVERY AND ONLINE GRADING
After completing their assignments, students directly
VIII. ARTIFICIAL INTELLIGENCE FOR EDUCATION
uploaded their assignments in the form of digital files into
The Kyoto College of Graduate Studies for Informatics is dotCampus LMS online platform at specified deadlines.
the world first university to fully utilize and adopt it's own, Teachers could then directly download the files as a single
100% online based artificial intelligence platform ZIP file containing all student assignments and review them.
UNASENSE (www.unasense.com). The system which was
originally designed and started by Prof. Cyryl Koshyk. This Assignment uploading is supported by all devices in all
powerful and flexible system is able to create standalone forms personal computers and mobile devices (phones,
mobile AI systems and programs made by students. It was tablets). In case of revisions, or additional comments,
first tested for medical AI programs and content, detecting teachers were able to log directly to student’ computers via
skin cancer on mobile devices, at Etugen University ZOOM or TeamViewer, encrypted bi-directional platforms,
(www.etugen.edu.mn) in Mongolia. and communicate directly with students in one on one
sessions.
UNASENSE AI has been deeply integrated into school
operations and routines, including assessment of student
XII. CONLUSSION AND FEEDBACK
knowledge and skill level. The platform will be available to
universities and schools around world, after all features has We performed an in depth student questionnaire online
been added and final testing phase has been conducted and evaluation. Our outcome reports showed that 76% students
complete. found eLearning distant learning compared to traditional
learning to be very good or good. Less then 5% of students
found it technically difficult however they learned quickly
IX. MULTI LANGUAGE SUPPORT
how to use such systems.
Due international students’ presence, live content was
prepared in multi-language release and streamed by Google's
23
Overall, we found that online courses and classes can “Virtual office hours” were provided to all students.
provide a high engagement rate. Professors, and staff specified hours and days where they can
be contacted online, for direct one on one communication for
Students primary preferred choice of accessing eLearning students to seek advisory, support and ask questions.
content was by using mobile devices.
Covid-19 (Coronavirus) has challenged education.
Strong focus should be given, to visual format of Students may prefer online over physical schools, where
delivery, and content optimized for slower internet (mobile artificial intelligence has been adopted and utilized. In 2021
3g,4g,LTE) for such devices. Most of our video content was we all will experience Education 2.0. More possibilities will
delivered in vertical screen format, which allowed for exist by using technology, resulting in new rules,
simultaneous live chat communication while video streaming requirements, and new policies. The future edu has begun
was performed. not as a choice, but as a path of transformation.
Vertical and square format videos are well suited for
eLearning delivery into mobile devices. REFERENCES
Teachers using mobile devices for their high-quality [1] Veli-Tapani Peltoketo, “Mobile phone camera benchmarking:
cameras and microphones render superior quality over most Combination of camera speed and image quality”, DOI:
10.1117/12.2034348, January 2014.
personal computer webcams; it also makes content more
[2] Tim Ashwell, J.R. Elam, “How accurately can the Google Web
portable. Speech API recognize and transcribe Japanese L2 English learners’
The learning curve is not complex both for teachers or oral production”, DOI: 10.29140/jaltcall.v13n1.212, 1892, April
2017.
students. We found that within a week, online eLearning
systems can be learned, allowing students to navigate, post
content, and enable overall interaction.
24
Risks in the Educational Sector: Theory and
Practice
Enkhtuvshin Jambaldorj
Sector for higher and professional education research
Mongolian Institute for Educational Research
Ulaanbaatar, Mongolia
[email protected]
Abstract - This study explains the relationship indicate that the Mongolian education sector is in a risky
between academic achievement and individual, family, situation. Identifying the root causes of such consequences
and social life, identifies the causes of risks in the (risks) from the system is not only a challenge for the
education sector, considers risks in relation to education sector but also for Mongolian society, but to
philosophical categories and systematic laws, develops reduce risks in the education sector, protect against potential
risk identification and classification models, and risks and according to V.V. Razuvaev reduce “the likelihood
formulates educational risks using this model. The issues of unintended consequences” [2] and improving the output
related to the sector policy will be evaluated in relation and performance of the education sector has become a
to the research results and suggestions on what to do current need.
next will be considered.
A. Goals
Keywords: cause-effect, risk, system, risk Contribute to the development of risk mitigation
classification, risks in education, risk management in measures in Mongolia's education sector.
education.
B. Objectives
I. INTRODUCTION
1) Compare the theoretical formulas proposed by
The academic performance of Mongolian secondary researchers on risk;
school students is not in the level of satisfactory. For 2) Formulate risks and highlight specifics in the
example: education sector;
According to the international TIMMS and PIRSL 3) Identify the root causes of educational risk;
scores, primary education is 37.8-41.5 percent and 4) Compare theoretical formulas with practical
basic education is 22.9-28.5 percent, which is 7 examples;
percent lower than the international average; [10] 5) Propose options for implementation at the national
In the general entrance exam held in 2019 only 28-37 level;
percent performance in subjects with the largest C. Literature review
number of examinees (Mongolian language,
Mathematics and English); [11] The concept of risk dates back hundreds of years and has
According to the quality assessment of secondary the root back to antiquity. ”In the sixteenth and sixteenth
education (Ministry of Education, Culture and centuries, the basic concepts of opportunity and probability
Science. 2019), 63 out of 100 examiners have shown were developed, as well as gambling, in the seventeenth and
dissatisfied results; [11] eighteenth centuries, the theory of probability and statistics,
in the nineteenth and twentieth centuries, progression and
These outcomes, which are the first gateway to the regression analysis. From the beginning of the twentieth
education system, continue to have a negative impact not century, when the theory of the game emerged, the concept
only on the quality of secondary education, but also on of a new modern risk was formed, researchers say. [13] In
youth employment, quality of life, economic and social the 1930s, A. Marshall and A. Piguo created a neoclassical
development, and competitiveness. It is still attracting flow of risk in the economic field, intensifying theoretical
attention that in “2019 the Mongolia's competitiveness ... research.
ranks last in terms of indicators directly related to the
education sector, such as skilled engineers, pollution issues, In our country, banking and insurance companies have
higher education, and knowledge exchange” [12] “There is been implementing risk management and risk research since
currently no publicly accepted understanding of risk in the mid-1990s, and government implementing agencies
education. Often, the risk is seen as a manifestation of have been implementing risk management since 2006. The
uncertainty, damage to the operation of an educational Education Inspection Agency (Education Inspection Agency
institution, or an undesirable situation or outcome”. [1] All is part of the government) uses checklists to identify risks
the data above, the researcher's conclusion and position associated with the material environment of secondary
25
schools and kindergartens. Apart from this, no risk studies Uncertain consequences of actions or events related
have been conducted in the education sector. to human values;
A combination of opportunity and loss; [2]
Information on risk theory and methodology is often
sourced from external sources, and government agencies Social risk is defined as “deviation from the norms of
include consulting services from the Institute for Risk basic social indicators for individuals, groups, and society as
Management in the United Kingdom (IRM), the Association a whole, and the basic indicators include unemployment,
of Insurance and Risk Managers (AIRMIC), and the aging, death, disability, orphanhood, and divorce”. The
National Forum for Public Risk Management (ALARM) survey results are:
Organizations. In addition, the ISO GUIDE 73: 2002 Risk Risk is subject to (1) cause-and-effect patterns and
Management - Vocabulary standard issued by the systemic laws, (2) probabilistic in nature;
International Organization for Standardization has been used Risk is a time-dependent continuous phenomenon
as a reference document. The standard (This standard is that takes on a positive, negative or zero value at a
accepted in many countries, especially in all EU countries, given moment;
including Russia, and in the Commonwealth of Independent Social sector risks are considered in relation to basic
States, such as Canada and Australia) states that risk is a social indicators;
combination of both the probability of an event (occurrence) Educational risks in Mongolia are largely
and its consequences, both positive and negative (Risk unexplored.
Management Standard © AIRMIC, ALARM, IRM: 2002,
D. Methodology
translation copyright GDNT: 2007). The social sectors
consider risks depending on the nature of their functions and Research should follow as Colin Robson puts it, "to
activities under the law. For example: build a detials and in-depth knowledge of one or a few
interrelated examples." [5] and exemplified research
In many areas, such as security and the environment,
strategies and system approaches. As the procedure;
“negative” “consequences” are defined as risks
(International standards state that this is only the case 1) Collect examples and analyse evidence related to
in the security sector); output, outcome, and impact in education system;
In the legal field, “the likelihood of an increase in 2) To study the theoretical formulas proposed by
potential adverse effects”; researchers on risk;
In the field of civil law, “damage caused by natural 3) Explain risks in terms of cause-and-effect, systematic
and man-made disasters and dangers, regardless of patterns, and develop a classification model;
human will [3]; 4) Identify educational risks based on the model;
In the public service sector, “risk is the occurrence of 5) Explain and evaluate the education system and the
a situation in which a service cannot be performed or model of personal and social development in terms of risk
is impossible to be fulfilled in accordance with a theory;
planned or obligation”, In the field of state control, 6) Formulate ways and solutions to reduce risks in the
“risk means that the failure to adequately fulfil the education sector.
responsibilities of state control imposed by law will II. RESULTS
lead to social, economic damage and other adverse
From the findings of the survey:
effects”, In the field of environment, it is stated that
“there is a possibility of adverse effects on animals, Causes are the effects of systemic influences;
plants, human health and the environment” The process of cause and effect is continuous;
(Introduction to the United States Agency for The state of the system at the moment is both a cause
International Development (USAID) Economic and a consequence;
Reform Project); It is logical to assume that the process of causation is
In the economic sphere, risk is defined as “risk that subject to the law of transition from quantity to
includes ... events that may or may not occur. When this quality.
happens, there are three economic consequences: negative The above-mentioned philosophical concepts will help
(defeat, loss, failure), zero, positive (win, gain, profit)”. [4] to explain risk in education.
Professor V. V. Razuvaev, a member of the Russian
National Academy of Economics, discusses many aspects in The Internationally Recognized Survey (TIMSS), at the
his book. For instance the risk is: national level, shows that students' academic achievement is
very poor, indicating a risky situation in the education
Percentage of potential losses and losses and sector. The knowledge, skills, and attitudes of learners are
damage; the underlying causes of the quality of life, happiness, and
Probability and extent of unintended consequences; development of a country, as “risk” itself is the cause of
A combination of probabilities and consequences; other consequences. According to researchers, “lack of
A combination of three scenarios, the probability of a knowledge and skills is the cause of poor human resources,
scenario and its consequences; poor human resources are the cause of poor wages, and poor
A two-way combination of "event-consequence" and wages are the cause of poor living conditions, on the other
its associated "uncertainty"; hand, general culture and moral weakness (risk), poor
physical development. The risk of all aspects of human
26
development, these two risks create the risk of not being TABLE 2. RISK CLASSIFICATION MODEL
able to take their rightful place in society” [6]. Effects (output)
Reason Process
(size,
Students' knowledge, skills and attitudes are the (input) (transformation)
amplitude)
(probabilities)
primary cause of civic development on the one hand, and a
means of adapting and communicating with the external Рh
Ro+s Тt
environment (family, school, community) on the other. In Еh
this regard, the theoretical conclusion is that “everything
that exists contains a clear signal about its nature, origin and Тs Рm
environment ...” [7] Every living thing adapts to Rs
endangered environments, whether they exist or not, Еm
develop or perish. Therefore, the evolution (development) of
Тm
any individual (In Buddhism, all living beings are Рl
considered) is determined by its ability to adapt to a risky Ro
Еl
environment. Most of our students have not learned such
Тf
skills. What is the reason for this?
Key factors influencing the outcome of the education
system are teachers, programs, learning technologies, and
budgetary and financial inputs. It is the responsibility of the This includes:
state to compile, develop, allocate, and improve efficiency. Ro- objective reason
The state makes decisions (policies, laws) and fulfills its Rs- subjective reason
responsibilities. Therefore, education policies and decisions Ro+s - combined (objective and subjective) reason
are the starting point and key variable that affects academic Tt - time of the process
achievement. Using these inputs in the education system, the Ts - space of the process
learner undergoes a qualitative transformation, creating the Tm - ability to manage the process
following “consequences” for society. Tf - manifestation of the process
1) Learner's knowledge, skills, and attitudes toward Eh - large amplitude
output. Em- medium amplitude
2) The quality of life of the citizen (family) on the El - small amplitude
outcome. Ph - high probability of occurrence
3) The country's level of development and Pm- medium probability of occurrence
competitiveness on impact. Pl - little probability of occurrence
To summarize:
In this model, educational risk is defined as Ro+s → [Tt +
TABLE 1. EDUCATION SYSTEM MODEL Ts + Tm + Tf] → [Eh] → [Th], expressed in words:
Transformation
1) for a combination of reasons;
Input Output Outcome Impact 2) medium and long-term exposure;
process
Reason Process Effects 3) latent;
The Changes in Changes in Change 4) the magnitude of the consequences is large
Education sector (insurmountable);
student individual the family in society
5) manageable;
When the operation of the system brings positive results 6) Is a high probability social risk.
at every stage, a knowledgeable and capable citizen is As mentioned above, “public policy decision”, which is
developed, the well-being of the citizen is ensured, and thus the starting point of the system, is a subjective cause but a
the well-being of the society is ensured. Otherwise, the decisive one. Let's look at two related facts.
guarantee of the well-being of the "citizen" will be lost and
the country will fall into decline. This correlation suggests 1) In the last 30 years:
that the primary cause of positive and negative Education law 12 times
consequences in any society is the state of education and the 6 times the structure and type of school
education system (risk situation). Therefore, researching and Primary and secondary education standards 4 times
diagnosing sector risks and preventing potential threats is a training program 5 times
policy issue. The education sector is a complex system that the curriculum 11 times have been changed [8]
covers a wide range of social life under the influence of 2) In the field of education:
many external and internal factors. Therefore, a risk Guidelines for government change in the education
identification and classification model has been proposed sector -1
and an attempt has been made to identify industry risks Master plan -1
accordingly. National program - 11
Sub-program - 3
Sector development step-by-step program - 2 was
approved and implemented [14]
27
A sufficient number of policy documents have been IV. CONCLUSION
adopted and a sufficient number of changes have been
1) To establish a professional, independent “institution”
made. But, there is no independent body or human resources
of risk management independent of the executive, which
to analyze these conflicting decisions. “Risk awareness can
exercises national oversight of education, reports to
be performed by external consultants, but a well-
parliament;
communicated, regular, and well-organized internal
2) Establish an independent policy research unit within
approach is likely to be more effective. It is essential that the
the structure of educational research and methodological
risk management process be owned within the
institutions and increase research capacity.
organization”. (Risk Management Standard © AIRMIC,
ALARM, IRM: 2002, translation copyright GDNT: 2007)
Unfortunately, this international principle has not been REFERENCES
implemented. [1] R.A.Rasulya, “Problems of risk research in education”,
III. DISCUSSION Scientific article. vol 3, Kazan RA Federal University, Russia,
Risks in the Mongolian education system have 2016, pp 2.
become one of the real causes of risks for Mongolian [2] V. V. Razuvaev, “Theoretical definition of the concept of risk”
families and Mongolian society; // Modern scientific research and innovation, URL:
http://web.snauka.ru/issues/2016/09/72007.
Loss of continuity of government policy on
education due to political instability; foreign [3] S. Narangerel, “Legal dictionary”, Ulaanbaatar: 1 rd ed, 2007,
pp 626.
education was simply imported; There is reason to
believe that scientific research and undiagnosed risk- [4] B. Tserendorzh, “Risk management” Ulaanbaatar. T&U
making policies and decisions have created a risk printing LLC, 2008, Page 11.
situation in the education sector. There is research [5] Colin Robson, “Real word research”, (1993) Copyright © 2006
evidence to support this. "One-third of the population "Monsudar", Open Society Forum,Ulaanbaatar, pp 42.
is nomadic herders, and one-third is poor and [6] P.E. Shcheglov, N.Sh.Nikitina, “The quality of higher
extremely poor, but much of Mongolia's education education. Risks in the training of specialists”, University
Management. 2003, vol 24, pp 46-59.
reform is based on the experience of a high-income,
sedentary country. Mongolian policymakers are [7] D.Byambasuren,” The wheel of the universe” Ulaanbaatar:
Urlakh erdem LLC, 3rd ed, 2009, pp 30.
actively involved in the policy lending process” [9];
According to the agent's theory (the theory that, the [8] J.Enkhtuvshin, “On the reform of the education management
system” 2017, Institute of Education. Research paper. vol 22.
body that oversees the implementation of
pp 43.
parliamentary decisions is independent of the
[9] Gita Steiner-Khamsi, Ines Stolpe. “Educational Import: Local
government) there is no independent entity to
Encounters with Global Forces in Mongolia”, Ulaanbaatar.
monitor the implementation of decisions on Admon, 2003, pp 2.
education issues in the interests of all citizens;
[10] Minister of Education, Culture and Science, “Concept of
Improving the capacity of Mongolia's policy research quality reform of primary and secondary education”, 2013
institutions on education and establishing and https://www.meds.gov.mn/.
developing a risk management and control system is [11] Educational Evaluation Center under the Ministry of
a pressing issue; Education and Science http://stat.eec.mn/.
Risks in the education sector need to be studied in [12] Centre for Economic Policy and Competitiveness Research.
https://ecrc.mn/.
depth at the institutional level.
[13] Historical study of the development of risk management
concepts. Electronic conference. http://econf.rae.ru/ .
[14] Government of Mongolia, 2010, National Education Program
of Mongolia, 2010, https://www.legalinfo.mn/ .
28
Sample Model for Selecting State Examination
Test Item
Examination test items in Social studies for the 12th grade students of Secondary School
Abstract—The Education Evaluation Center develops assess- A normalization in Mongolian language is not discussed here.
ment to assess the knowledge and skills of secondary school Normalization is consisting of stemming and lemmatization
students and takes state exams every year, and currently it has [1]. You can find it in our previous article on word normal-
a database of 23 subjects and 32000 tests. Select test item from
the test database with expert’s help and takes that year’s state ization published in Mongolian [4], [5].
exam. To select test items that aren’t similar or same as last Normalize source test item by using dictionary will be as
year’s is a very time-consuming process. In addition, a test item follows. Following tasks are reported in Mongolian due to
is not expected to be repeated in two consecutive examinations. usage of mongolian vocabulary:
This paper aims to present the experiment results we obtained
in developing machine models to reduce human participation, D1 = иргэн сурах өмнө хооллох хувцаслах орон-
to determine task similarity and to select different tasks from байр байх ёс
a database and to implement them in item database system of D2 = төр иргэн оронбайр өмчлөх
12th grade social studies students of the Secondary Schools. D3 = иргэн ажилгүйдэл төр багасах үүрэг
Keywords — weight of a term, test item similarity, exper- D4 = нийлүүлэлт багасах бараа үнэ өсөх
iment, vector, evaluation D5 = илүүдэл нийлүүлэлт үнэ багасах
I. D ICTIONARY DEVELOPMENT English translations:
D1 = citizen study before feed clothe apartment be
5 types of tasks in Social studies include. Following tasks
D2 = government citizen apartment owns
are reported in Mongolian due to usage of Mongolian vocab-
D3 = citizen unemployment government decrease re-
ulary [2] . A task is means that a sample question of test unit
sponsibility
except answers. .
D4 = supply decrease commodity price increase
D1 = иргэд суралцахаас өмнө хооллож, хувцас- D5 = excess supply price decrease
лаж, орон байртай байх ёстой
Let’s consider a task as document.
D2 = төрөөс иргэдэд орон сууц өмчлүүлсэн
D3 = иргэдийн ажилгүйдлыг төрөөс багасгах үү- II. D ESCRIBING TASKS AS VECTORS
рэгтэй
The term frequency T F of term t in document d is defined
D4 = нийлүүлэлт багасвал барааны үнэ өсдөг
as the number of times that t occurs in d, (T F > 0) [1].
D5 = илүүдэл нийлүүлэлт үнэ багасгадаг
Construct incidence matrix by term frequency in task (see
English translation: the Table II). DF - is the document frequency, the number
D1 = citizens must fed, clothed and housed before they of documents that t occurs in. IDF - is log weight of term. It
study is found by the following formula [1]:
D2 = the Government has privatized the apartments to
citizens N
IDF = log10
D3 = the Government has to bear the responsibility to DF
reduce unemployment of citizens N is the number of documents in the collection (in our
D4 = when supply decreases, commodity prices will case, collection is a test database or test). After that the log
increase frequency weight of term is found by the formula:
D5 = excess supply will cause price to fall
T F W = 1 + log2 T F (T F W ≥ 1)
A normalization can be used to extract a word stem from a
test unit to create a corresponding word dictionary. Table I See the Table III.
28
29
Table I
D ICTIONARY
Term ID Dictionary term /Mongolian/ Source terms /Mongolian/ Dictionary term /English/ Source terms /English/
T1 Ажилгүйдэл Ажилгүйдлыг unemployment unemployment
T2 Багасах Багасвал, багасдаг decrease reduce, decreases, fall
T3 Байх байх be be
T4 Бараа Барааны Commodity commodity
T5 Ёстой Ёстой be must
T6 Илүүдэл илүүдэл Excess excess
T7 Иргэн Иргэд, иргэдэд,иргэдийн Citizen Citizens, to citizens, of citizens
T8 Нийлүүлэлт Нийлүүлэлт Supply supply
T9 оронбайр Оронбайр, оронбайртай, оронсууц House housed, apartments
T 10 Өмнө өмнө Before before
T 11 Өмчлөх Өмчлүүлсэн own Privatized
T 12 Өсөх Өсдөг increase Increase
T 13 Сурах Суралцахаас study study
T 14 Төр Төрөөс Government government
T 15 Үнэ Үнэ Price prices
T 16 Үүрэгтэй Үүрэгтэй Responsibility Bear the responsibility
T 17 Хооллох Хооллож feed Fed
T 18 Хувцаслах хувцаслаж clothe Clothed
Table II
I NCIDENCE M ATRIX
By finding the weight of a term as IDF is multiplied by
T F W (Table IV) each task is expressed as a real-valued vector
TF d1 d2 d3 d4 d5 DF IDF [3]. Each task is now presented as vector. In a vector space
t1 1 1 0.70
t2 1 1 1 3 0.22 Table IV
t3 1 1 0.70 W EIGHT OF A TASK ’ S T ERM
t4 1 1 0.70
t5 1 1 0.70 TW d1 d2 d3 d4 d5
t6 1 1 0.70 t1 0.00 0.00 0.70 0.00 0.00
t7 1 1 1 3 0.22 t2 0.00 0.00 0.22 0.22 0.22
t8 1 1 2 0.40 t3 0.70 0.00 0.00 0.00 0.00
t9 1 1 2 0.40 t4 0.00 0.00 0.00 0.70 0.00
t10 1 1 0.70 t5 0.70 0.00 0.00 0.00 0.00
t11 1 1 0.70 t6 0.00 0.00 0.00 0.00 0.70
t12 1 1 0.70 t7 0.22 0.22 0.22 0.00 0.00
t13 1 1 0.70 t8 0.00 0.00 0.00 0.40 0.40
t14 1 1 2 0.40 t9 0.40 0.40 0.00 0.00 0.00
t15 1 1 2 0.40 t10 0.70 0.00 0.00 0.00 0.00
t16 1 1 0.70 t11 0.00 0.70 0.00 0.00 0.00
t17 1 1 0.70 t12 0.00 0.00 0.00 0.70 0.00
t18 1 1 0.70 t13 0.70 0.00 0.00 0.00 0.00
a In our case, d is a task. t14 0.00 0.40 0.40 0.00 0.00
t15 0.00 0.00 0.00 0.40 0.40
t16 0.00 0.00 0.70 0.00 0.00
Table III t17 0.70 0.00 0.00 0.00 0.00
log F REQUENCY W EIGHT OF T ERM t18 0.70 0.00 0.00 0.00 0.00
length 1.772 0.924 1.111 1.159 0.924
TFW d1 d2 d3 d4 d5
t1 1
t2 1 1 1 with 18 axes of t1 · · · t18, documents d1 to d5 in Table IV,
t3 1
t4 1 will be the coordinate vector
t5 1 D1 = (0, 0, 0.7, 0, 0.7, 0, 0.22, 0, 0.4, 0.7, 0, 0, 0.7, 0, 0, 0,
t6 1
t7 1 1 1
0.7, 0.7)
t8 1 1 D2 = (0, 0, 0, 0, 0, 0, 0.22, 0, 0.4, 0, 0.7, 0, 0, 0.4, 0, 0, 0, 0)
t9 1 1 D3 = (0.7, 0.22, 0, 0, 0, 0, 0.22, 0, 0, 0, 0, 0, 0, 0.4, 0, 0.7, 0,
t10 1
t11 1
0)
t12 1 D4 = (0, 0.22, 0, 0.7, 0, 0, 0, 0.4, 0, 0, 0, 0.7, 0, 0, 0.4, 0, 0, 0)
t13 1 D5 = (0, 0.22, 0, 0, 0, 0.7, 0, 0.4, 0, 0, 0, 0, 0, 0, 0.4, 0, 0, 0)
t14 1 1
t15 1 1 In the last row of a Table, there are length of vectors. The task
t16 1 length is found by follow formula
t17 1
t18 1
|Di | = d2i i = 1, 5
29
30
Table V
III. C OMPUTING COSINE SIMILARITY OF TASK C OSINE S IMILARITY OF D OCUMENTS
Since each task is represented by a vector in a vector space
∼ d1 d2 d3 d4 d5 Average
model, cosine similarity is measured by the cosine of the d1 1 0.127 0.025 0 0 0.0379
angle between two vectors. The smaller the angle between d2 0.127 1 0.202 0 0 0.0822
two vectors, the more similar are the vectors, and the less d3 0.025 0.202 1 0.038 0.048 0.0783
d4 0 0 0.038 1 0.342 0.095
similar otherwise. The formula to find the angle between two d5 0 0 0.048 0.342 1 0.0974
vectors is shown below [3]. Average of d1 to d5 0.0782
n
Ai · Bi
cosine similarity = cos(θ) = i=1 least similar compared to d1 and d2. The content of the tasks
n n
also shows the difference. The cosine averages of the given 5
A2 · B2 i i tasks can be ranked in ascending order as follows. (Table VI)
i=1 i=1
Table VI
Where, A, B- different tasks. Ai , Bi - its coordinates R ANK O F D OCUMENTS
Since each document is similar to itself, its cosine similarity
is 1. If the cosine value is closer to 0, the two tasks’ similarity Rank Average Document similarity
1 0.0379 d1 The least similar
will be less. The similarity of documents has been found using 2 0.0822 d2
the cosine formula given below. (See the Table V) 3 0.0783 d3
The three tasks d1 , d2 and d3 with the words t1 and t2 in the 4 0.095 d4
5 0.0974 d5 The most similar
case describe the state exam in vector space, a If the average is close to 1, it is similar to the others.
Conversely, closer to zero is different from others.
30
31
Perception of Lane Curvature Detection for
Situational Awareness
Julkar Nine Shanmugapriyan Manoharan Mohammad Didar Hossain Sagar
Department of Computer Engineering M.Sc.Embedded Systems M.Sc. Automotive Software Engineering
Technische Universität Chemnitz Technische Universität Chemnitz Technische Universität Chemnitz
Chemnitz, Germany Chemnitz, Germany Chemnitz, Germany
julkar.nine shanmugapriyan.manoharan mohammad-didar-hossain.sagar
@informatik.tu-chemnitz.de @s2017.tu-chemnitz.de @mb.tu-chemnitz.de
Abstract—Lane curvature detection from the highway is Traffic light and traffic sign detection, pedestrian detection,
one of the fundamental requirements for both autonomous lane tracking, lane curvature detection, etc. are some
driving and advanced driver assistance (ADAS) based ap- example applications in this area that can be combined
plications. Curvy lane is a crucial factor that plays a
significant role in the increasing number of road fatalities to build a smart application like driving assistance and
worldwide. Detection of the curvature radius of the lane self-driving car. Lane departure is a prime factor for most
and providing a warning message for upcoming curvy road of the highway fatalities that causes loss of lives and
conditions have the potential to improve driving safety. This money every year. Lane departure is the reason for more
paper presents an efficient algorithm for lane curvature than 50% of the total car crashes happens every year in
detection combining multiple image processing techniques.
The proposed algorithm has been implemented in Python and the USA [3]. Not following the curve on the highway
evaluated on a Raspberry Pi 3 B+ environment. It can detect lanes properly is the basic cause for departing from the
and calculate lane curvature as well as provide warning highway. Lane curvature detection has the potential to
messages for curvy road conditions. provide a solution in this aspect. This is what motivates
Index Terms—Raspberry Pi, Binary Thresholding, Gradi- the automotive researchers to research on this topic. An
ent, Bird’s-eye View.
efficient lane curvature detection can bless us with the
solution for road safety. In this paper, an implementation of
I. I NTRODUCTION
an image processing algorithms to detect and recognize the
Car production and purchase have increased to a high Lane Curvature for situation awareness using a monocular
extent in the last few years to satisfy the increasing camera was developed. It focuses on Binary Thresholding,
transportation demand of the world demography. The Bird-Eye view Transformation and Sliding window to
automotive industry is expecting to sell 74 million cars detect the circles of traffic light signs. The implementation
in 2020 worldwide [1]. With this increasing number of was tested on a Raspberry Pi 3B+.
automobiles on the roads and highways, a huge deteriora-
tion of traffic management and safety are being observed. II. LITERATURE REVIEW
Number car crashes and road other fatalities are rising A. Situation Awareness
to a high degree. In 2017 over 21000 fatal car crashes In Mica R. Endsley’s study [4], the three levels of
happened in the USA. Intelligent Transport System (ITS) situation awareness were introduced: perception, compre-
[2] is the modern technology that works for safety and hension, and projection. Where the information from the
traffic perfection by providing automation in vehicular environment perceived by the perception level, compre-
communication. Many countries are planning and devel- hension level understands this information, and projection
oping various ITS applications to improve transportation. projects a future action based on the taken action. In this
Advanced driver assistance system (ADAS) is an example situation, Lane curvature recognition will be a useful case
of ITS which supports drivers in driving, parking, etc. study in the perception level of Situation Awareness.
ADAS also helps drivers by proving warning messages
about rough road conditions, curvy lanes, traffic signs, and B. Lane Curvature Recognition
speed limits, etc. Other than that, the self-driving car is Different methods have been offered in both machine
also being considered as a solution to traffic problems and vision and computer vision. Systems that have been de-
safety issues. But some dependencies must be satisfied veloped so far can perform various tasks such as lane
with the successful development of these applications. mark detection, lane departure warning, lane curvature
32
detection, lane-keeping assistance, etc. Researchers from III. C ONCEPT
Toyota Central Lab proposed a lane detection method This paper presents the concept and implementation
for highway lane departure warning using an extended process of Lane Curvature Detection using Image Pro-
Hough Transform [5]. Extended Hough transform helped cessing. The monocular camera feeds the input to the
to improve the robustness in lane detection. Hardware cost image processing algorithm to detect the lane curvature.
is reduced because they used a wide-angle camera and The proposed method of lane curvature detection consists
an embedded CPU available in the market. Lee J.W. [6], of several steps that include image processing techniques,
presents a machine vision lane departure detection system as shown in the flow diagram (Fig. 1). The proposed
using a unique edge distribution system. Noise effect algorithm is a pipeline with several steps such as Binary
and localization error are minimized with this function. Thresholding, Bird’s-eye View Transformation, Sliding
Edge related information and lane related information is Window to Locate Lanes, and Lane Curvature Detection.
collected and combined by edge detection function (EDF)
to identify the traveling direction. Park J.W. et al. [7],
proposed an algorithm for lane curve detection using
a Lane Curve Function (LCF). The proposed algorithm
was tested on a video of a Korean superhighway and
showed excellent results even in noisy frames. It is worth
mentioning that, a robust lane curvature detection method
has been proposed comparing the lane line’s slope with
the desired slope in [8]. Their target is to support driver
assistance and autonomous driving. The proposed method
works well in adverse conditions such as noise, lane mark
discontinuity, and disturbances. It performs shadow and
illumination correction and differentiates between different
curves. The algorithm can be used in autonomous vehicles
for lane detection as well as on normal vehicles for a speed
control system. Jeon Y.W. [9], offers an image processing
method for preventing lane deviation. By processing and
compressing the captured image from the road, slope, and
curvature of the lane can be determined in this method.
Driving direction and can also be detected. Our internship
also focuses on lane curvature detection using image pro-
cessing without any learning algorithm. From a conceptual
point of view, their goal is partially related to ours. Both
Goldbeck J. et al. [10] and McCall J.C. [11], focus on
lane detection and tracking. The system in [10] uses a
highly dynamic CMOS video camera for real-time lane
detection with high accuracy. It can adapt to any weather
condition and road type without external adjustment. In Fig. 1: Flow Chart of Lane Curvature Algorithm
[11] on the other hand, works for lane mark detection
using a steerable later. It shows robustness to lighting The proposed algorithm is implemented on the Rasp-
changes and shadow effects. This method performs with berry Pi 3B+. The operating system used in the Raspberry
accuracy in detecting circular reflector road marks as well Pi is Raspbian Stretch. The libraries such as OpenCV,
as painted lane marks. Zou Q. et al. [12] proposes a Numpy are installed on Raspberry Pi with Python depen-
hybrid deep architecture by combining the convolutional dencies for performing image processing tasks. OpenCV’s
neural network (CNN) and the recurrent neural network getPerspectiveTransform function is used to transform the
(RNN) by investigating frames from a continuous driving image into the bird’s eye view. NumPy’s polyfit function
scene. Apart from these, there are other researches related fits a second-order polynomial and returns the coefficients.
to our work. Jung C.R. et al. [13], is a linear parabolic
method for lane following. Jung C.R. et al. [14], is a IV. IMPLEMENTATION
similar but improved approach by the same researchers. This work focused on the recognition of lane curvature
which includes curve detection as well. A lane detection from sequences of frames captured from a monocular
method to support the lane-keeping system is offered camera mounted on the vehicle. Firstly, the threshold-
in [15] by estimating the lane configuration and vehicle ing techniques such as color thresholding and gradient
attitude. Tsogas M. et al. [16], supports the lane-keeping thresholding are applied to the input frame, to get the
systems using the digital map. In this study, we focus binary image. The lane lines are visible in the binary
on a combination of Binary Thresholding, Bird-Eye view image. In color thresholding, the S-Channel from the HLS
Transformation and Sliding window for recognizing Lane color channel makes the lane line more visible. Using the
Curvature. gradient thresholding steep edges can be detected which
is most probably indicates lanes. The Sobel filter and
thresholding applied to the pixel value that falls inside the
33
range of minimum and maximum range. Then, the output The equation can be simplified as below:
of the color and gradient thresholding are combined to
[1 + (2ay + b)2 ]3/2
obtain the binary image. Rcurvature = (3)
|2a|
Furthermore, a warning message will be generated
based on the lane curvature. If the curve is inclined to
the direction left, the warning message should be ‘Curve
to the left’. If the curve is inclined to the right message
should be ‘Curve to the right’. The value of the polynomial
coefficients analyzed such that a relational pattern is ob-
served to decide whether the curvature is inclined towards
left or right.
V. R ESULTS
The proposed algorithm achieves the goals of this
Fig. 2: Lane Curvature Recogntion Algorithm
internship. The algorithm is implemented in Python3 and
Secondly, using OpenCV’s getPerspectiveTransform, tested on a Raspberry Pi environment. It can detect the
the binary image is transformed into a bird’s eye view. lane curvature from a highway video. It shows a warning
getPerspectiveTransform function accepts four sources and message while there is a curvy lane moving to the right
four destination points. In general, lane lines are parallel or left. Fig. 3 shows the result for both ‘curve to the left’
lines and they meet at a vanishing point that forms like and ‘curve to the right’ respectively.
a triangular shape. The tuning is applied to get the four
source points for the Region of Interest (ROI) which avoids
the region other than lane. Similarly, the destination points
also selected to form a rectangle shape. The getPerspec-
tiveTransform takes the source and destination points as
input and provides the bird’s eye view image of the region
of interest polygon.
Thirdly, plotting a histogram will give two peaks on two
different positions for left and right lane lines. These two
peak points are the starting points for a sliding window
search to locate both left and right lanes. Sliding windows
are rectangles drawn over the pixel points of the left
and right lanes. The size and number of the window are
selected manually according to the shape of the image. The Fig. 3: Lane Curvature Recognition: Left Curvature → Radius
two windows are set at the bottom of the image on the two to left and right lane curvature is 217m and 201m; curve to
x-coordinate positions indicating to the left and right lanes. the left (top), Right Curvature → Radius to left and right lane
That means, two x-coordinates of the histogram peaks are curvature is 392m and 245m; curve to the right (bottom)
two centers for two base windows. If the number of pixels
inside a previous window (left or right) is greater than Blue text on the result frames shows the radius of
a fixed threshold the base position for the next window curvature for the left lane and the red text shows the radius
(x-axis) is updated on their mean position. If it does not of curvature for the right lane. The green text refers to
exceed the threshold windows are not recentered. This way the warning message. Since the first original frame in the
window on both the left and right sides follows the left figure has a curvy lane moving to the left, our system is
and right lane lines respectively. Connecting the centers showing the warning message ‘Curve to the left’. On the
of these windows on both sides provides two curves that other, the second frame has a curve in the right direction,
refer to the left and right lane. so the message says, ‘Curve to the right’. This algorithm
Finally, the lane coordinates are stored in the list of can detect lane curvature accurately even in shadow, noise,
python programming. The lane lines from the bird’s eye and less lighting conditions. Video frames were converted
view image are near vertical. It is more likely to have the to the binary image before other processing techniques are
same x-coordinate for multiple y-coordinate. In this case, applied. Applying HLS S-Channel helps with this situation
it is a better idea to fit a 2nd order polynomial for f(y): by making the binary image less affected by the lightness
and shadow. This algorithm works best on a 480p video.
x = f (y) = ay 2 + by + c (1) The proposed algorithm can process a 480p video with 25
NumPy polyfit function fitts a 2nd polynomial and FPS in an average on a windows platform. On the other
returns the polynomial coefficients a, b, and c. The radius hand, raspberry can process the video with a speed of
of curvature at any point x of the function x = f(y) is 15-20FPS. The algorithm shows similarly accurate results
calculated from the equation below: for 720p video but the processing is lower. The algorithm
dx 2 3/2
calculates the radius of curvature accurately. In some rare
[1 + dy ] cases, it shows a false positive decision for ‘Curve to the
Rcurvature = d2 x
(2)
dy 2
left’. Thresholding on the value of polynomial coefficients
34
(a, b, and c) is tried to x the problem. It lowers the error [5] A. Takahashi, Y. Ninomiya, M. Ohta, M. Nishida, M. Takayama:
rate but cannot solve it entirely. Rear View Lane Detection by Wide Angle Camera. In: Intelligent
Vehicle Symposium, 2002. IEEE. vol. 1, pp. 148-153. IEEE (2002).
Our algorithm fails to detect lane curvature in some [6] J.W. Lee: A Machine Vision System for Lane-Departure Detection.
special cases such as multi-lane conditions, dividing one Computer vision and image understanding 86(1), 52-78 (2002).
lane into two or more, sudden narrow or wide lanes [7] J.W. Park, J.W. Lee, K.Y. Jhang: A Lane-Curve Detection based
on an LCF. Pattern Recognition Letters 24(14), 2301-2313 (2003).
appearance, etc. In such cases, sometimes neighboring [8] A. Dubey, K. Bhurchandi: Robust and Real time Detection of Curvy
lanes are detected which is not the desired outcome. To Lanes (curves) with Desired Slopes for Driving Assistance and
handle this problem our system can take a pause when the Autonomous Vehicles. arXiv preprint arXiv:1501.03124 (2015).
[9] Y.W. Jeon: Image Processing Method for Preventing Lane Devia-
road condition is critical to detect lane and resume it after tion (Feb 1 2005), uS Patent 6,850,629.
a few frames. [10] J. Goldbeck, B. Huertgen: Lane Detection and Tracking by Video
Sensors. In: Proceedings 199 IEEE/IEEJ/JSAI International Confer-
ence on Intelligent Transportation Systems (Cat. No. 99TH8383).
pp. 74-79. IEEE (1999).
[11] J.C. McCall, M.M. Trivedi: An Integrated, Robust Approach to
Lane Marking Detection and Lane Tracking. In: IEEE Intelligent
Vehicles Symposium, 2004. pp. 533-537. IEEE (2004).
[12] Q. Zou, H.Jiang, Q. Dai, Y. Yue, L. Chen, Q. Wang: Robust Lane
Detection from Continuous Driving Scenes using Deep Neural
Fig. 4: Lane Curvature Detection in Low Light Condition → Networks. IEEE Transactions on Vehicular Technology (2019).
Radius to left and right lane curvature is 3702m and 3796m; [13] C.R. Jung, C.R. Kelber: A Robust Linear-Parabolic Model for
curve to the right Lane Following. In: Proceedings. 17th Brazilian Symposium on
Computer Graphics and Image Processing. pp. 72-79. IEEE (2004).
[14] C.R. Jung, C.R. Kelber: An Improved Linear-Parabolic Model
for Lane Following and Curve Detection. In: XVIII Brazilian
Symposium on Computer Graphics and Image Processing (SIB-
GRAPI’05). pp. 131-138. IEEE (2005).
[15] Tsuji, M., Shirato, R., Furusho, H., Akutagawa, K.: Estimation of
Road Configuration and Vehicle Attitude by Lane Detection for a
Lane-Keeping System. SAE transactions pp. 420-426 (2001).
[16] M. Tsogas, A. Polychronopoulos, A. Amditis: Using Digital Maps
to Enhance Lane Keeping Support Systems. In: 2007 IEEE Intel-
ligent Vehicles Symposium. pp. 148-153. IEEE (2007).
Fig. 5: Lane Curvature Detection in Critical Road Condition:
Radius to left and right lane curvature is 330m and 493m; curve
to the right (left), Radius to left and right lane curvature is 818m
and 943m (right)
R EFERENCES
[1] Statista-Research-Department: Global-car-sales-1990-2019 (June
2020), https://www.statista.com/statistics/200002/ international-car-
sales-since-1990/
[2] I. Wagner: U.s. fatal passenger car crashes 2017 (April
2020), https://www.statista.com/statistics/191530/ fatal-passenger-
car-crashes-in-the-us/
[3] G. Lu: A Lane Detection, Tracking and Recognition System for
Smart Vehicles. Ph.D. thesis, University of Ottawa (2015).
[4] M. R. Endsley “Toward a Theory of Situation Awareness in
Dynamic Systems”, Human Factors Journal 37(1), 32-64, 1995.
35
MRI Rendering with EEG Sensors Projection
Klementev Dmitrii
Computer Engineering Department
Novosibirsk State Technical University
Novosibirsk, Russia
[email protected]
36
In the end, we have a row of nuclei with the same
frequency and each nucleus has its phase.
An MRI image is a three-dimensional digital field,
each of its cells represents an averaged nuclei response in
the corresponding physical space as a scalar value [1]. Such
cells are called “voxels” like “pixels” for a two-dimensional
space. Values in those voxels will be called as “scalar data”
in this paper.
III. MRI VISUALIZATION
Fig. 2. (a) is cube rendering with back polygons only and (b) is cube
Direct Volume Ray-Casting Rendering rendering with front polygons only
Direct Volume Rendering is a ray-casting method High performance of rendering is in demand. The
for calculating the color of a screen pixel by casting a ray imaging can be calculated on CPU and GPU, but GPU is
from the pixel through a three-dimensional texture, such as much more effective due to architecture for parallel
an MRI image [2]. In a simple implementation, each voxel calculating and a possibility to calculate pixels color in
has color and opacity parameters. By these parameters, the SIMD style. For that purpose, DirectX11 can be used. It
color of the screen pixel can be calculated (1,2) [2]. includes pixel and computes shaders, each of these can be
used for calculations.
(1) To improve sensitivity, it is possible to shade
opacity tissues. In general, normals can be represented as a
(2) normalized minus gradient of scalar data. So it can be
calculated with the formula below (1):
Where C is the color and A is the opacity. The
opacity value is used for color blending between the volume
and other objects. The opacity number is between 0 and 1
and the strength of the opacity is higher at 1.
But using these equations requires to be careful
with choosing the color because color values with low (4)
opacity can make render white like in Fig. 1 because of the
excess of color value. Where grad is the gradient of scalar data, gradi is
the i-component of the gradient, h is the distance between
the voxels along the i axis, n is the normal.
This calculation is expensive due to six sample
calls. The good practice is to save calculated normals into an
additional texture before the main render loop. It will
discard additional sample operators and leave only one. In
shading calculations, it can be important to set threshold
value, because of high noises, the difference between an
image with and without threshold value is represented in
Fig. 3.
Fig. 1. MRI rendering with a 1D transfer function. In (a) skin has low
opacity and not shifted color value. In (b) all colors have been divided by
its opacity.
37
the simplest way is to assign different colors and We can use a 2D or 3D transfer function, based on
transparencies to different densities. A look-up table is used scalar data, first and second derivatives along the gradient
for that. In DirectX and other graphic API, the look-up table [3, 4]. 2D histogram includes two axes, the first is the scalar
usually is a texture, which stores, in this particular case, data, the second is the first derivative along with gradient
optical parameters in pixels and scalar data along the axis. magnitude and red intensity is a number of combinations.
By this, we can assign optical properties to the field of MRI The 3D histogram, in addition, includes a second derivative
data directly and render it. Note that for sampling from an along the gradient. Example of the 2D histogram, based on
MRI texture it can be important to turn off interpolation artificial data, is presented on Fig. 5 (b). As can be seen, the
between voxels because interpolation between max value boundaries are represented by a few solo points. It happened
and zero can return randomly optical properties. due to the digital nature of using data (Fig. 5(a)).
The way described above is good. Nonetheless, this For better results, there is a need to apply Gaussian
way isn’t the best due to disturbances in MRI data. Another blur to an MRI texture. The result is shown in the next
way is to use methods from computer vision and underline figures: in Fig. 6(b) boundaries are represented by arcs, in
only boundaries between materials [3]. It increases the Fig. 6(c) as waves. In Fig. 7 2D histogram based on a real
quality of rendering because tissues are described by a MRI texture is represented.
single scalar value, but boundaries are described by a set of
two scalar values and it provides more combinations,
allowing more detail to be emphasized. It also increases
performance because modern shader models or modern
GPUs can pass calculations in if-body operators for empty
voxels in a few cases. Besides, it allows you to take the next
step in transfer-function generation, by expanding a transfer
function dimensional.
Boundaries can be detected by calculating the first
derivative along the gradient of scalar data. The example of
this is presented in figure 3. As can be seen, boundaries are
distinguishable.
Fig. 6. (a) is blurred by Gaussian with sigma = 3 and core size = 7 artificial
volume texture. (b) and (c) are the histograms of this texture
(5)
38
Where C is an output color, C0 is an initial color, ex is an
exposition.
Fig. 10. (a) constant transfer function. (b) linear transfer function. (c) linear
transfer function after compression
REFERENCES
[1] Lars G. Hanson. Introduction to Magnetic Resonance Imaging
Techniques. Danish Research Centre for Magnetic Resonance
(DRCMR), Copenhagen University Hospital Hvidovre. 2009.
[2] Milan Ikits, Joe Kniss, Aaron Lefohn, Charles Hansen. GPU Gems.
2007.
[3] Gordon Kindlman and James W. Durkin. Semi-Automatic Generation
Fig. 8. Positions of bone voxels in the local space of MRI texture. XYZ of Transfer Functions for Direct Volume Rendering. In IEEE
Symposium On Volume Visualization, pages 79-86, 1998.
coordinates are displayed in RGB.
[4] Joe Kniss and Gordon Kindlman. Multidimensional Transfer
Function for Volume Rendering. In IEEE Transaction on
Visualization and Computer Graphics, August 2002.
V. FUTURE WORK [5] Taosong He, Lichan Hong, Arie Kaufman, and Hanspeter Pfister.
Generation of Transfer Functions with Stochastic Search Techniques.
One of the problems of generating transfer In Proceedings Visualization ’96, pages 227–234, 1996.
[6] Jonathan Thaler. Deferred Rendering. TU Wein.
functions is the fact that scalar data depend on radio wave [7] Salman UI Hassan Dar, Muzaffer Ozbey, Ahmet Burak Catli, Tolga
response. It doesn't distinguish all tissue and the result of Cukur. A transfer-Learning Approach for Accelerated MRI using
Deep Neural Networks.
visualization very relies on the parameters of the MRI [8] Ljung P., Krueger J., Groeller E., Hadwiger M., Hansen C.,
process and disturbances. Ynnerman A.. State of the Art in Transfer Function for Direct
Volume Rendering. Computer graphic forum, 35(3), 669-691, June
The example of bad MRI data is represented by the 2016
2D histogram in Fig. 9. There are few arcs, which represent [9] Jia-Wan Zhang and Ji-Zhou Sun, Adaptive transfer function design
for volume rendering by using a general regression neural network.
the boundary between air and all tissues, which have the Proceedings of the 2003 International Conference on Machine
same scalar value. Learning and Cybernetics, 2003.
[10] J. Hesser, R. Männer, D. F. Braus, G. Ende & F. A. Henn. Real-time
The example of a problem with weakly direct volume rendering in functional magnetic resonance imaging.
distinguishable tissues is shown in Fig. 10. All tissues have Magnetic Resonance Materials in Physics, Biology and Medicine
volume 5, 1997
similar scalar value and it became identify only after tonal
compression (5)
(5)
39
Analyses on Physics Textbooks for Secondary
Schools
40
II. MAJOR PART After having analyzed two textbooks together at level
This time we have analyzed the named textbooks of of basic education, we found out that training of physics was
physics for secondary schools composed by national conducted at two stages by imitating foreign country. We
authors, having definitely considered the compliance with consider it would be better, much clear and accessible if
program and standards, compatibility to students’ interests, fundamental regulations, laws and facts of physics are
needs and feature of training environment, design, sufficiently studied in high schools; and integrated
pedagogical solution, optimal application of teaching knowledge of natural sciences are taught in the grades VI
methods, aids and tools, light and hard exercises and tasks and VII with physical and other natural phenomena.
for independent accomplishment by students. Then we have PHYSICS-VII. Physical basis of mechanics was clearly
divided textbooks of physics into four main categories in the provided according to the program of subject physics at that
followings: period. Besides that, it is appreciated that the most important
A. Textbooks of physics in 1961-1979 things for each chapter were taught in manner of
B. Textbooks of physics in 1984-1986 conclusions. But there were too many formulae with and
C. Textbooks of physics in 1997-2001 without extraction in sections §12, 22, 42, 43, 50, 52, 53, 64,
D. Textbook of physics in 2014 that was prepared and 69. It seems that §5-7 and §41-43 can be integrated.
under core program. PHYSICS-IX. There was a preface for beginning parts
I. PHYSICS–VII. Each topic of this textbook has of this textbook but there was no introduction for ending
tests, pictures, explanation of terms, Mongolian names and parts. It seems that its editors might not review some
nomenclatures and is in good order. For instance, it subjects of this textbook. Conceptual theory was wrongly
mentioned about solar energy and jet engine. But tables of explained in §18 and §24; the level of material science on
physical constants were not numbered. electricity in vacuum and semi-conductor in chapter X
PHYSICS-X. Besides aiming at showing physical “Electricity in various environments” is too weak.
fundamentals of any phenomenon and developing Moreover, volume of the textbook became thick since some
independent skills of students, it sets goal to show scientific topics (§31, 32, 33) were written too detailed. So it may
achievements and discoveries at that periods. Thus, for the integrate the too-detailed things and make conclusion, then
first time the chapter “Fundamentals of Relativity Theory” make up other concepts, content and structure in manner of
was provided in this textbook and prepared in excellent interpreting laws.
order. But it observed that order of group topics was lost. PHYSICS-X. The content of this textbook fully
PHYSICS-VIII. It is consisted of two main parts: complied with the program and it might adhere an ideology
mechanics (1-11 chapters) and molecular physics (12-16 of the Russian Federation too much. It didn’t apply the
chapters). It clearly explained theoretical materials with opportunity to densify energy of mechanical and
experiences, practices, pictures and graphs, made derivation electromagnetic wave in huge amount; spectrum was
of formulae and mentioned in details about how to apply classified and some of them were explained in details even
them in practices. For instances, it became advantageous by there is no reference of spectrum (chapter 7). In our views, it
teaching relativity of movement, equations of smooth may be optimal and clear if this chapter would have been
acceleration and deceleration, body weight, weight gain, written with method of deduction.
weightlessness, centrifugal force, body movement on a Questions conform to texts in textbooks for the 7 th
sloping plane, conservation law in mechanics, work and grade. 20% of questions could be answered after getting
energy with tests and formulae, and resolving relevant information from other books, teacher or taking additional
problems. information. Its level and content are conformed, it is
PHYSICS-IX. The crew composing of 5 members difficult for children to understand hydraulic equipment,
such as lecturers and researchers from Mongolian State pressure measuring device and pumps, there is no reference
University of Education, National University of Mongolia on mechanism. Although mechanic movement is written
and Institute of Pedagogy wrote it. Its content was there, thermal movement is not provided. So it bought the
comprised of theory, methodology to solve problem, tasks reason that the textbook of physics for the 7 th grade is too
and exercises, lab works; its terms were clear and smooth, thick. Some teachers couldn’t teach the content in time.
mostly it paid more attention to explain theories by Since numbers of some pictures are not mentioned in texts,
experiences and practices, describe by pictures and graphs, they are incomprehensible for students; principle of colorful
and to apply in practices. Additionally, it provided new textbook was broken even though theoretical and practical
chapters such as magnetic properties of matters, alternative comparison was chosen well. However, there are many
current. But some pictures were not clear as follows: picture things to show and design are good, pictures are placed in
84 – aluminum purification furnace, picture 115 – deviation right location, questions and exercises are optimal for
of a set of electronics in magnetic field, picture 182 – students.
scheme for long-distance transmission of electricity, picture In the textbook for the 8th grade, many questions on
182 - thermal phenomena requires students to read other sources
PHYSICS-VII. The most contents of this textbook and books and to have logical thoughts. There are not few
(topics or articles 1, 3, 10, 16, 32, 33, 56, 65) coincided with questions to answer by reading textbooks of high school.
briefed contents of corresponding topics in textbooks for the This textbook could respond to questions about
grades IX and X; its concepts were not completely electromagnetic, light, astronomic topics. Materials for the
identified; main values were bypassed and explained in poor 7th grade were written on the first three chapters. Standards
orders. We don’t agree such manner of educating of electromagnetic ad light content meet appropriate
knowledge of physics with periodical coincidence. Many requirements. But the introduction about properties of the
topics were not clear for the 7th grade students and it didn’t sun and stars in astronomy exceeded from appropriate
express physical value of the content; and much standards. Design, composition, question, test and tasks
simplification might give false concepts for students. were included appropriately. In picture 30, lessons such as
41
temperature at the bottom of lake in summer and winter, Mechanic movement and Mechanic energy, Electricity and
magnetization by influence, projection of celestial bodies in Magnetics, Energy supply” in the textbook for the 8 th grade
the sky are difficult for students, especially in picture 10.4, have completely met the relevant requirements. Except that,
students are not able to work on it by looking at its annex. tasks designed for students’ knowledge and to resolve
The design of the textbook is excellent, especially its problems have been optimal. Instead of stating that current
background color of table and graphs are much suitable, run on diode, engine and bulb on the pages 88 and 89, it
many real pictures make it believable. Unfortunately, some would be more understandable to state that current would
mistakes were found in it as editors didn’t review, detect run through diode, engine and bulb. It needs to rectify
and rectify mistakes. percentage of heat loss more than 100% in the picture on the
In the textbook for the 9th grade, there are many tasks page 142.
for students to make conclusion and answer after making Since the physics textbook for the 9th grade is the last
discussion even too little information. Teachers don’t textbook for students to acquire basic education of physics,
believe that the 9th grade students would answer 128 it is appreciable that authors focused on giving orderly
questions (which occupy 30% of the textbook). In order to knowledge and concepts to students. To do that, it was
answer these questions, they need to read and know many written well for students to have universal concepts, skills
things. How many such kind of materials do we have? In and knowledge about thermal movement, energy, magnetic
picture 198, it didn’t mention with which kinds of materials and electric fields, electric circuit and light based on
glass and plastic sticks were rubbed; it put electroscope accumulated experiences and knowledge in the 7th and 8th
exclamation mark was put in picture 195; in pictures 272- grades. In order to express these concepts, authors have
276 exactly what materials of semi-conductor were optimally chosen pictures in texts.
described in text; it didn’t mention what was marked by the The 10th grade textbook for secondary education is
circle with arrow in picture 291; it didn’t concern about how consisted of main chapters such as mechanics, heat, wave,
to use picture 321. Authors didn’t predict and imagine how sound, electromagnetism, problems for processing
students could answer such questions. Furthermore, editors measurement results and letting students solving those
didn’t observe that pictures 233 and 243 were wrong. problems. It was written good in manner that students could
Unfortunately, it was published that way. Although the enrich and study matters such as description of body
content of this physics textbook meets standards and levels, position, displacement, movement and forces by vectors;
several things such as Cavendish experiment one of main description of weight and center of gravity by torque /
experiment, experiment to determine coefficient of friction, moments of force; use of thermal process phenomena in
electric statics coincided with the 7th and 8th grade practices; wave and sound by expressions of wave
textbooks. Choice of pictures is good and composition is refractions; electromagnetic field by modern electronic
affordable. But we would like to say it is extra vintage that system, circuit, elements and logic functions respectively
there is each title of chapter 23 and phrase that “this chapter based on the acquired knowledge and competence about
shall study those matters”. mechanics at level of basic education. It is very appreciable
It is impossible to answer question after student reads that another feature of this textbook is to make definite
information in the textbook for the 10th grade. It is similar to measurement on precedent theoretical knowledge, to make
the 9th grade’s. For example, pictures 39, 40, 41 describing conclusion of its results based on digital processing, and to
rule for establishment of body shapes in mirror and lenses, solve problems (on pages 126-148) relating to the said
interference, interpretation about electromagnetic waves by topics. The content and level of these problems have met
generation and distribution, picture 113 for polarization of concepts and conclusions of texts.
the light. Its content and level complied with appropriate The 11th grade textbook stating that the movement
standards. Students don’t have any chances to practice using quantity and impulse in the chapter “mechanics” by
picture of sky with stars on the pages 125-126 in chapter 13 Bernoulli’s equation; fundamentals of ideal gas equation
and characteristics of some sharp stars. Even though design and molecular genetic theory in the chapter “Molecular
and composition are generally affordable, first six chapters physics” were enriched by the second law of
have similar conceptual design. Design is good, but we thermodynamics and its applications respectively; was
deliberately note that pictures 116, 118, 153, 164, 184 and written understandable for students. The topics “Electric and
205 should be colored for pedagogical requirements. Magnetic fields” were mostly interpreted and explained by
The students who have taken information from the pictures without hard formulae. It was excitingly explained
textbook for the 7th grade written under new program can about electricity in semi-conductor and Ohm’s law for
answer questions and carry out tasks after reading it well. complete circuit based on applicable examples. Also this
But at the beginning of chapter 1 “general properties of textbook has excellent attractive experiences and
body”, it writes about how to measure length, weight and experiments. For instance, much clear expression of
density of the body without explaining the term “body”. Its mechanic and harmonic fluctuations, interactions of their
content duly complied with the program. The chapter parameters; shutdown and forced fluctuations, and specific
“Astronomy” is the most difficult part for students to read explanation about transverse wave propagation mechanism
punctually and work hard. Some concepts don’t conform to based on Huygens-Fresnel principle. It is understandable
titles and preface. For instance, current and electric that changes in frequency on the Doppler effect were
magnetic properties are not included in texts. Since it didn’t described by picture. It is available for teachers to use it for
clearly distinguish the difference between two concepts teaching other waves.
“magnet” and “magnetic”, page 17 was explained by spring Nowadays, in order to make contents understandable
scale and three rings on the page 60 interpreted with word and accessible for students except than main content of the
“five”. program, it created electronic textbook with CVDs / CDs by
We would like deliberately note that the contents and entering data, establishing diagram, scheme, graphic
program in four chapters “Forces and Interactions, descriptions, with studying materials for micro lab works,
42
modern and future technology, information receivable and letting teachers sharing and discussing their views. We
affordable film by answering questions of students, real trial considered that, as results of such trial, the content of
and experiment, games, brief history, interviews, video physics textbook and all subjects would be stabilized and
recording and discussion, electronic tasks, assessment qualified, it would make strong contribution to development
mission and tests. It requires to creatively and effectively of general education system in our country by determining
apply them for training of physics. demands of the subjects (student, author, teacher, policy
The issue for the training of physics that is waiting for maker / developer, methodologist, researcher, employer,
solution is how to completely and optimally insert problems professional association, unions) that involve in educational
in the textbooks for students of that class. Since such issue relations.
have not been fully resolved till today, it requires some 6. If electronic textbook is invented and distributed
authors to include problems at the end of each chapter / teachers and disciples at all stages of schools, we may not
topic, every teacher to choose problems based on his / her reach the desired approaches but we could achieve certain
own methods and experiences. Finally, it needs to create, results. The experiences of electronic training during the
compose and publish new core program, content, structure outbreak of pandemic disease Covid-19 has showed and
and directions of physics textbooks for “Compilation of warned us it is time for us to get to such work. So it needs to
Physics Problems” at the levels of basic and secondary restore and renew the precedent experience (composition
education. and regulation for such non-staff council have been ratified
under order No.163 by chairman of State Committee of
III. CONCLUSION AND POINT OF VIEW Science, Technique and Higher Education from Jun 10,
As for 18 physics textbooks for general education 1989; order No.426 by Minister of Education dated from
schools that we have studied, the textbooks that were used Nov 04, 1991; annex of order No. 03 dated from Jan 05,
by us till 1951 were directly translated from textbooks of the 1993) to establish Training Methodology Classified
Soviet Union. As the program belonged to the Soviet Union, Councils with authority to make assessment and publish
its content had the same meaning. Since 1951, physics training program and textbooks of general education schools
textbooks for the 6-10th grades used in the Soviet Union and to employ chairman, deputy chairman, and secretary
were translated and applied under order by Minister of under order by minister. Finally, we consider that the said
Enlightment of Mongolia. measure would enhance quality of textbooks, level of
1. In the textbooks in 1961-1979 written by national training program, relationship between secondary, higher
authors, it paid more attention to provide polytechnic education and continuity of classes would be improved.
education for students based on definite goal of the country,
to introduce scientific inventions in production and practices REFERENCES
and to show their applications. [1] Ya. Lyernyera, N. M. Shakhmayeva, “What a textbook should be:
2. The textbooks written in 1984-1986 imitated didactic principles of construction, in sequence,” Part I-II, M, 1992.
foreign countries. During organizing and conducting [2] V. P. Bespalko, “Theory of a textbook: Didactic aspects,” M, 1988.
trainings of physics at two stages (incomplete and complete [3] A. Sokhor, “About the didactic processing of science materials in
textbooks (taking examples of physics), problems of school
secondary education), it has shortage in features of textbooks,” M., 1978.
Mongolian national thoughts, accumulated teaching
[4] J. Gombojav, S. Batkhuyag, J. Battseren, D.Ragchaa, “PHYSICS-
methods and experiences of teachers, introducing new VI,” Z. Badamsambuu and Ts. Nyamdorj, Eds. 1985.
technique and technological inventions, focused little on [5] L. Damba, Ts. Ragchaa, E. Radnaa E, “PHYSICS-VII,” S. Batkhuyag
integrating content of physics training. and J. Battseren, Eds. 1984.
3. The physics textbooks in 1997 – 2001 were written [6] Ts. Nyandag, Ochirbat, S. Doyoddorj, “PHYSICS-VIII,” G. Byambaa
according to educational standards of physics and and L. Damba, Eds. 1985.
astronomy for the first time. Their term and formulae were [7] N. Altangerel, G. Byambaa, D. Khaltar, “PHYSICS-IX,” D. Chultem
official, been taken into consideration of Mongolian and G. Gombojav, Eds. 1985.
household and living conditions fully suited for students, [8] D. Dambasuren, D. Gurdorj, N. Zundui, D. Tseren, “PHYSICS-X,” ),
contained traditional and new content of astronomy. D. Chultem and Z. Badamsambuu, Eds. 1986.
4. Physics textbook of basic education according to [9] B. Burmaa, M. Ganbat, B. Jadambaa, “PHYSICS-VII,” S. Batkhuyag
newly approved core program are advantageous than and S. Danzan, Eds.1997.
previous old textbooks that their design and expressing [10] M. Ganbat, B. Burmaa, D. Batbold, R. Maabazar, “PHYSICS-VIII,”
M. Ganbat, Ed. 1999.
methods are suitable for age and mental characteristics of
students. After having studied these, we have made [11] G. Gombojav, O. Lkhagva, G. Batbyamba, “PHYSICS-IX,” B.
Jadambaa and G. Bold, Eds. 2001.
conclusion that ground to study physics at level of complete
[12] G. Gombojav, O. Lkhagva, G. Batbyamba, “PHYSICS-X,” B.
secondary education was set up. The physics textbooks for Jadambaa and R. Maabazar, Eds. 2001.
the 10th and 11th grades have carried out its obligations to [13] M.Gongor, Ts. Sodov, Kh. Khovd-Aba, N. Tugjsuren, Ts.
provide systematic knowledge to students at high schools Erdenechuluun, “About textbooks and manuals which have been used
and to make them be interesting in physics. for training of physics,” Professional Education, vol. 10, pp 76-81,
5. Since we have had standards of basic and 1992.
secondary education, it would be better to compose and [14] N. Khajidsuren, Ts. Sodov, “Textbook – important pedagogical tools,
publish textbooks at such two levels. That would bring us scientific materials,” vol. 01, pp. 87-93, 1998.
opportunities to get away from the economic pressure in [15] Ts. Sodov, J. Baigalmaa, “Technology to develop students' general
and experimental learning skills in physical education,” Education
manner that contents of textbooks would not be changed Research, vol. 3, pp 30-36, 2004.
every year, not publishing each year, uncertainty of content
[16] A.V. Khutorskii, “Place of the textbook in the didactic system,”
for teachers, students and parents, to eliminate delayed Pedagogy, vol. 4, pp. 10-18, 2005.
delivery of textbook, to enhance sufficiency by completely [17] “Mongolian Agency of Standard and Metrology (MASM): Physics
testing results of contents in the published textbooks and by and Astronomy in basic and secondary education standards,” 1998.
43
[18] I. Tuya, “ Textbook analysis modeling,” Education research, vol. [32] E. Damdinsuren, S. Batkhuyag, Ts. Sodov, “PHYSICS,” A.Samdan
4(50), pp. 31-35, 2009. and P. Zuzaan, Eds. 1992.
[19] UNESCO “Guidebook on textbook research and textbook revision”, [33] E. Damdinsuren, S. Batkhuyag, Ts. Sodov, “PHYSICS,” A.Samdan
guideline for enhancing quality education, 2010. and P. Zuzaan, Eds. 2013.
[20] J. Narantuya, “Issue for assessing quality of secondary education [34] R. Jigjidsuren, D. Khaltar, J. Gombojav, “PHYSICS-VII,” D.
textbook,” Studies on education, vol. 9, pp. 51-57, 2011. Ragchaa, Ed. 1963.
[21] J. Narantuya, “Textbook: What a dream should be?” Education [35] G. Byambaa,G. Dodon, Ts. Nyandag, “PHYSICS-VIII,” G. Dodon,
research , vol. 4, pp. 31-36,2012. Ed. 1975.
[22] B. Bayarmaa, “Textbook development: at level of some foreign [36] G. Byambaa, D. Gurdorj, D. Tseren, “PHYSICS-X,” G. Dodon, Ed.
countries,” Education Research, vol. 10(98), pp. 17-22, 2013, 1975.
[23] R. Jigjiddorj, “Pedagogical issues of physics”, 1996. [37] G. Byambaa, G. Dodon, D. Khaltar, Ts. Ragchaa, Ts. Nyandag
[24] M. Nasanbuyan, G.S. Manyeev, “Some issues in teaching of physics “PHYSICS-IX, ” G. Dodon, Ed. 1975.
at secondary schools,” Gombojav , Ed. 1962. [38] M. Ganbat, B. Burmaa, Ts. Amartaivan, J. Dulguun, Ya.
[25] Ts. Sodov, M. Gongor, L. Udval, “Fundamentals of physics Munkhsaikhan, S. Gendenjamts, N. Sainbayar, A. Buyandelger,
teaching,” B. Jadambaa and Kh. Dondog, Eds. 2018. “PHYSICS-VII,” N. Tugsjsuren, Ed. 2019.
[26] B. Purev, B. Orgoi, “MECHANICS-VIII, Learning of physics as an [39] M. Ganbat, B. Burmaa, B. Badam, J. Dulguun, Ya. Munkhsaikhan, S.
elective subject,” 1979. Gendenjamts, B. Purevjalm, “PHYSICS-VIII,” N. Altangerel, Ed.
2019.
[27] S. Batkhuyag, Ts. Sodov, L. Jamts, “ Learning of physics as an
elective subject: grades IX-X,” N. Altangerel, Ed. [40] M. Ganbat, Ts. Amartaivan, Kh. Batbold, J. Dulguun, Ya.
Munkhsaikha, B. Purevjal, “PHYSICS-IX,” E. Damdinsuren, Ed.
[28] U. Bolormaa, Kh. Dondog, Yo. Jantsan, R. Maabazar, D. Oyun, D. 2019.
Oyunchimeg, Ts. Sodov, “PHYSICS-ASTRONOMY (dedicated for
basic education learners),” Ts. Sodov, Ed. 2004. [41] M. Ganbat, B. Burmaa, Ts. Amartaivan, B. Bat-Otgon, G. Zorigt, Ya.
Munkhsaikhan, D. Uurintuya, B. Tuvdendorj, “ PHYSICS-X,” Sh.
[29] N. Amarjargal, J. Baigalmaa, I. Batmunkh, M. Gongor, R. Jargalsuren, Ed. 2019.
Darkhijav, Ch. Dashnyam, L. Dolgormaa, D. Demchigsuren, D.
Otgonbayar, B. Ulziikhutag, Ts. Sodov, N. Tugjsuren, B. [42] M. Ganbat, Sh. Chadraabal, O. Altangoo, Balt-Erdene, Bavuudorj, D.
Tsedenbal, L. Tsedendamba, “ PHYSICS-ASTRONOMY (dedicated Uurintuya, Ch. Gonchigdorj, “PHYSICS-XI,” Sh. Jargalsuren, Ed.
for high school pupils or pupils are expected to admit 2019.
colleges/universities),” Ts. Sodov, Ed .2004. [43] “PHYSICS – Core academic program of basic education (grades VI-
[30] E. Damdinsuren, S. Batkhuyag, Ts. Sodov, “PHYSICS,” A.Samdan IX) compiled by Ministry of Education, Science and Sports”, 2015.
and P. Zuzaan, Eds. 1977. [44] “PHYSICS – Core academic program of secondary education (grades
[31] E. Damdinsuren, S. Batkhuyag, Ts. Sodov, “PHYSICS,” A.Samdan X-XII) compiled by Ministry of Education, Science and Sports”,
and P. Zuzaan, Eds. 1985. 2016.
44
Autonomous Unmanned Aerial Vehicle
Development: MAVLink Abstraction Layer
Marco Stephan Batbayar Battseren Uranchimeg Tudevdagva
Professorship of Computer Engineering Professorship of Computer Engineering Professorship of Computer Engineering
Chemnitz University of Technology Chemnitz University of Technology Chemnitz University of Technology
Chemnitz, Germany Chemnitz, Germany Chemnitz, Germany
[email protected] [email protected] [email protected]
chemnitz.de
Abstract—In the domain of Unmanned Aerial Vehicle modular software components running on the on-board
(UAV), the autonomy is getting more important. In order to computer to execute the autonomous mission. Some of these
reach a higher autonomy level, certain key software components components are the Camera Gimbal Controller (GCC), which
have to be implemented. One of that is a middle layer, which lies controls the UAV’s gimbal, the Feature Point Detection (FPD)
between the decision-making higher-level and hardware- which detects objects that are to be inspected, as well as the
controlling lower-level components. This study aims to abstract Expert System (EXS) which chooses appropriate flight paths
the UAV control process by conceptualizing an abstraction layer and makes real-time decisions. A separate component, the
for the UAV communication protocol. Control Handler (CTH), manages the communication and data
conversion between the GCG, the FPD, and the EXS. In
In the context of the APOLI project, a MAVLink
Abstraction Layer has been implemented to control and
addition to the ODROID-XU4, a second board, the so-called
communicate with the UAV flight controller. Our proposed Flight Controller (FLC), controls the individual actuators and
solution simplifies the usage of the MAVLink protocol sensors of the UAV on a lower level.
significantly for the higher-level components. Also, the result The protocol used for the communication between the
indicates that an abstraction layer does have an advantage over FLC and the ODROID-XU4 is Micro Air Vehicle Link, or
existing APIs. MAVLink [5]. As this protocol is too complex to be handled
by the Control Handler itself, and the existing MAVLink APIs
Keywords—unmanned aerial vehicle, UAV, autonomous
mission, abstraction layer, MAVLink protocol
are not compatible and not supporting our system, the
MAVLink Abstraction Layer (MAL) software component is
I. INTRODUCTION proposed. The reason why these existing APIs are not the best
solution is explained in detail in the Literature Review
Automated Power Line Inspection [1]-[3], also referred to
chapter.
as APOLI, is a research project carried out by the
Professorship of Computer Engineering at the Chemnitz The MAL abstracts the MAVLink protocol to be usable on
University of Technology. It aims to develop an Unmanned a higher level and allows the companion computer to issue the
Aerial System (UAS) able to autonomously inspect power flight commands on a high abstraction level. Furthermore,
lines and detect damages of them. In the context of this requested UAV data, e.g. GPS position or flight mode, can
project, we are developing an Adaptive Research Multicopter also be provided in a ready-to-use format.
Platform (AREIOM) [2], which is a modular layered
architecture, that can be used in any autonomous UAS. II. RESEARCH QUESTION AND REQUIRMENTS
In this study, we will answer the question of how to
abstract the MAVLink protocol for an autonomous UAS,
considering the given requirements. Our main objective is to
separate the decision-making layer of the autonomous system
from the hardware or low-level software layers by
implementing a MAVLink abstraction API.
The requirements are, firstly, and most importantly, it
must be able to communicate with the FLC via a serial port so
it can send data to and receive data from the Flight Controller.
Additional communication interfaces that are to be supported
for the communication between the MAL and the FLC are
UDP as well as TCP sockets. These socket connections are
necessary for integration into a software-in-the-loop
simulation in which the FLC is running as a software
component.
Fig. 1. APOLI Software Architecture [2].
Furthermore, the MAL must provide a communication
In our autonomous system, the UAS is controlled by a interface for the CTH-MAL communication. However, at the
single on-board computer, namely an ODROID-XU4 [4], time of this article’s publication, the CTH has not been fully
being directly mounted on the Unmanned Aerial Vehicle developed yet. Therefore, the MAL also mimics some basic
(UAV). As illustrated in Figure 1, there are a number of logic of the CTH itself and provides a connection with the
45
Expert System. Communication with the Expert System is UAV is armed using a loop or ignore a potential failure of this
realized via file I/O. To issue a flight command, the software command altogether.
component, i.e. CTH or EXS, writes an encoding of the
command into the corresponding connection. The MAL then IV. IMPLEMENTATION
needs to read this command, decodes it, and eventually As declared before, the MAL should be implemented
executes it. If there is any response to this command provided using a compiled programming language to be more efficient
by the UAV, e.g. the GPS position, it may then be written back in comparison to an interpreted language. For this, the C
into the connection by the MAL. After this, the CTH or EXS language is feasible, because of the availability of the
will read and evaluate this response. MAVLink C library. To further improve maintainability and
In addition to these functional requirements, the MAL code readability, the MAL is implemented in C++.
must also be efficient so UAV commands are executed as soon TestVehicle CTHVehicle EXSVehicle
as they are issued. Furthermore, the MAL also has to fulfill
high-reliability requirements. A failure of this component, Vehicle
while the UAV is flying, is disastrous and may result in +VehicleRoutine()
crashes of the vehicle. Last but not least, the MAL must
provide a cross-platform solution. While the APOLI’s MavlinkAbstraction
1 1
C2Handler
-currentRequest : Request
+Arm(ResponseArm*)
ODROID-XU4 runs on a Linux distribution, the simulation …
1
+HandleRequest(Request*, Response*)
loop runs on a Windows machine. +TakeOff(ResponseTakeOff*) +OnMAVLinkMessageReceived(mavlink_ message_t*)
1
MAVLinkConnection 1 1 MAVLinkConnectionReadingThread
III. LITERATURE REVIEW #connect()
Currently, there are several MAVLink APIs available. The #onMessageReceived()
#disconnect()
1 1 MAVLinkConnectionHandlingThread
most popular MAVLink abstraction API is DroneKit [6]. It +OnMAVLinkMessageReceived(mavlink_ message_t*) 1 1 MAVLinkConnectionWritingThread
+SendMAVLinkMessage(mavlink_message_t*)
provides interfaces to control any UAV using high-level
functions. Using this, flight commands like arming or a take- Request Response
off are easily issued and handled by the DroneKit API itself. +Execute(Response*, …)
+OnMAVLinkMessageReceived(mavlink_ message_t*)
However, this API is not feasible for use in the MAL of the
ResponseArm
APOLI project. This is because DroneKit only provides an RequestArm +success : bool
API for the Python programming language [7]. As Python is ⋮ ⋮
an interpreted language, the interpretation of the MAL itself RequestTakeOff ResponseTakeOff
requires additional resources that are to be avoided. Instead, a -altitude : float +success : bool
46
The lower level implementation of the communication to EXS MAL FLC
the FLC is implemented in the MAVLinkConnection
class. This abstract class provides functions to send and Request Flight Data
receive MAVLink messages provided as the low-level Request Flight Data
message structure of the MAVLink C library. The abstract Send Flight Data
component of this class is the connection to the FLC itself.
Because this connection must be establishable via a serial port, Send Flight Data
a UDP socket, or a TCP socket, there are three child classes of Send Flight Command (if any)
MAVLinkConnection. Each of these classes overloads the Execute Flight Command
abstract function to open and close the connection. In addition
to this, MAVLinkConnection also consists of three
Fig. 4. Sequence Diagram showing the EXS-MAL-FLC Interaction.
threads.
x Reading Thread: Permanently reads bytes from the The second vehicle is the EXS Vehicle. This class is used
connection, builds a MAVLink message using these for communication with the Expert System. Figure 4 shows
read bytes, and add it to a queue. the communication sequence of this interaction. The Expert
System first requests the UAV’s flight data from the MAL
x Handling Thread: Unblocks, dequeues the received which it provides by using its abstraction functions. After the
MAVLink message, and evaluates it by executing the MAL received the flight data, it sends it to the EXS. Then, the
appropriate function of the C2Handler. EXS evaluates this flight data and, if appropriate, sends a
x Writing Thread: Writes queued MAVLink messages flight command to be executed to the MAL. This flight
to the connection. command is then executed by the MAL by using the
corresponding abstraction function. Currently, however, the
The Reading Thread exists because the reading from the EXS does not exist in a state in which it is useable in such a
connection is implemented as a synchronous operation. This manner and therefore the EXS Vehicle does not implement
means that reading blocks until data could be read. This is to this sequence. Instead, the EXS Vehicle first requests the
avoid busy-loops. Furthermore, writing to the connection may UAV’s flight data itself. Upon receiving it, it is being written
also block. This is especially true if a TCP socket is being into the input file used for the communication with the Expert
used. To avoid blocking while sending a MAVLink message System. The EXS Vehicle then executes the Expert System
on a higher level, they are therefore queued for sending and itself once which modifies the output file. This output file then
sent to the Writing Thread. Lastly, the handling of received contains rules on how to handle the UAV data, i.e. the flight
MAVLink messages is also outsourced to the Handling command to execute.
Thread. This is so the Reading Thread immediately returns to
reading from the connection. Therefore, the chance of losing The last vehicle is the CTH Vehicle. This vehicle provides
any data sent from the FLC is minimized. a basic loop intended to be used for the CTH communication.
For the connection with the CTH, shared memory is chosen as
B. Vehicles it provides the lowest overhead and arbitrary data access is
Figure 3 illustrates the architecture of the implemented easily performed. More specifically, it permanently reads the
MAL. In the architecture, the specific use cases of the MAL shared memory block’s command and, if there was one
are implemented in so-called Vehicle classes. Here, a provided, executes it. In the future, the MAL shall also write
vehicle denotes a specialization of the all of the UAV flight data into the shared memory.
MAVLinkAbstraction class itself. Currently, there are V. EVALUATION
three such classes.
The MAL has been tested in several environments. More
EXS
MAL UDP or specifically, the Test Vehicle has been used to evaluate the
File TCP or
EXS Vehicle MAVLinkAbstraction
Serial abstraction functions of the MavlinkAbstraction, e.g.
FLC
Shared Test Vehicle
C2Handler MAVLinkConnection
arming. These commands have been tested in three phases. As
CTH Memory
CTH Vehicle a first phase, they were being evaluated in the simulation loop
of the APOLI project. For this, the MAL has been built on a
Fig. 3. Simplified Architecture of the MAL . Windows machine. The MAL then has been started with
command-line arguments specifying the address and the port
Firstly, the Test Vehicle is primarily created for testing and of the simulated FLC (more precisely, these arguments are
development purposes. It takes input from the console and being passed to the MavlinkAbstraction class which
executes the given command. If appropriate, additional then creates an object of the appropriate sub-class of
parameters are also read. The execution of the command then, MAVLinkConnection). All fifteen abstraction functions
as described above, may block until the corresponding have been evaluated over a number of times. This includes the
response has been received. For example, there exists a check whether the actual sent byte stream represents the
command that retrieves all relevant UAV flight data such as correct command, which has been done by logging these
the GPS position. This command, which itself consists of streams into a file, as well as the evaluation of the received
multiple individual commands, blocks until all flight data is response data. These response data had to match their
received. That data is then output to the console. expected data in the corresponding flight environment. One
issue that came up in this evaluation step was that several
MAVLink commands were not supported by the FLC used.
After the corresponding abstraction functions have been
evaluated, the other two vehicles, i.e. the EXS and the CTH
47
Vehicle, have been evaluated as a whole. These tests VI. CONCLUSION AND FUTURE SCOPE
succeeded, apart from some issues with the connection to the All in all, an abstraction of the MAVLink protocol
corresponding software component, right away. More simplifies the usage of this protocol drastically. Using the
specifically, the MAL executed the issued commands as well MAL, a user can easily write a MAVLink command sequence
as provided the requested data in a fast manner. without the need to understand the underlying MAVLink
commands executed or the need to evaluate responses from
TABLE I. IMPLEMENTED ABSTRACT COMMANDS
the FLC on their own. Lower level changes can also be applied
Commands Description more easily. While in the absence of a MAVLink abstraction,
№ such changes have to potentially be applied several times, the
1 Alt Hold Change the flight mode to ALTHOLD MAL only needs to be changed once. For example, if the
2 Guided Change the flight mode to GUIDED command to move the UAV had to be changed so a different
3 Land Change the flight mode to LAND underlying MAVLink message is to be used, only little
4 Pos Hold Change the flight mode to POSHOLD changes need to be applied to the MavlinkAbstraction
5 RTL Change the flight mode to RTL (or specifically to the move request). For the user, the
6 Stabilize Change the flight mode to STABLIZE abstraction interface does not change in any way. That being
7 Arm Start the motors said, the biggest disadvantage of the MAL is the added
8 Disarm Disarm the motors complexity, both with respect to efficiency and maintenance.
9 Kill Force disarm the motors Using the MAVLink protocol directly to issue commands and
10 Take-off Take the UAV from GROUND to AIR request data is, if done correctly, more efficient than using a
11 Beep Emit a sound
complex abstraction interface. This is because the user then
12 Move To Move to a target location (latitude, longitude, altitude
has more control over the request made. Furthermore, the user
then may only evaluate the responses necessary to be
13 Move By Move by an offset (forward, rightward, upward)
evaluated. Additionally, there is no overhead added by the
14 Get Device Data Retrieve the flight data of the UAV
abstraction classes and threads.
15 Pixhawk Reboot Reboot the Pixhawk
While the fifteen implemented abstraction functions were
enough for the simple Expert System provided, in the future
After a MAVLink command has passed the simulation further abstraction functions are desired. For example, a
phase, it then has been tested in an indoor environment. More function to circle around a specified point may be useful.
specifically, a UAV has been placed in a cage approximately Furthermore, the move commands implemented do not
the size of 4x4x3 meters. Most of the time if a MAVLink provide movement speed parameters so the exact speed cannot
command passed the simulation phase, it also passed the be controlled. However, this was mostly because the FLC
indoor test without any problem. In cases where the indoor test currently does not support such arguments. In addition to these
has failed, the parameters of the indoor UAV differed from the functionality aspects, another issue of the implemented
simulated UAV. For example, the indoor UAV had its safety MAVLink abstraction should be addressed in the future,
checks enabled while some of these were turned off for the especially if it is expanded upon. The
simulated UAV. Therefore, arming sometimes failed the MavlinkAbstraction class provides the user, if
indoor test. This however does not represent an issue with the requested, with the flight data of the UAV. At the moment,
MAL and was therefore disregarded. this is done via a single abstraction function. However, this
abstraction function internally requests several messages from
the FLC in sequence. While this is done so the user receives
all flight data at once, this also leads to the issue that all of
these requests must be handled by the FLC regardless of if the
user actually uses the corresponding data. A single flight data
request may approximately take around 40ms to be
completed. In the future, this flight data request should be
separated so the user has more control of which data he
requests and therefore is able to limit the amount of data the
Fig. 5. Test environments. FLC has to process.
As the last step, the MAL has also been tested in an REFERENCES
outdoor environment once. Here, only the Test Vehicle has
been used. Because the abstraction commands were already [1] U. Tudevdagva, B. Battseren, W. Hardt, S. Blokzyl, and M. Lippmann,
validated in the indoor environment, they worked as expected “UAV-based Fully Automated Inspection System for High Voltage
in the outdoor environment, too. It is worth mentioning though Transmission Lines.”
that the used thresholds to check whether a flight command, [2] H. Ariane, H. Reda, B. Battseren, and W. Hardt, “AREIOM: Adaptive
Research Multicopter Platform,” IFOST, pp. 219–223, 2019.
e.g. a take-off or a move command, has been successfully
[3] B. Battseren, U. Tudevdagva, and W. Hardt, “A Finite State Machine
executed had to be adjusted. In the indoor environments, these Based Adaptive Mission Control of Mini Aerial Vehicle,” Embed.
commands were executed precisely, meaning that there was Selforgan. Syst., vol. 5, no. 1, pp. 14–18, 2018, doi:
only little noise in the resulting UAV data. However, because 10.14464/ess51225.
of external influences in the outdoor environment, for [4] Hardkernel co. Ltd., “ODROID-XU4: User Manual.” 2015, Accessed:
example wind, the UAV’s position temporarily had a larger Aug. 05, 2020. [Online]. Available: https://magazine.odroid.com/wp-
distance to the expected position than expected. content/uploads/odroid-xu4-user-manual.pdf.
[5] MAVLink, “MAVLink Developer Guide.” https://mavlink.io/en/
(accessed Aug. 05, 2020).
48
[6] “DroneKit.” https://dronekit.io/ (accessed Aug. 06, 2020). [8] V. Ermakov, “mavros - ROS Wiki.” http://wiki.ros.org/mavros
[7] Python Software Foundation, “Python Language Reference.” 2020, (accessed Aug. 08, 2020).
Accessed: Aug. 08, 2020. [Online]. Available: [9] MAVLink, “C (mavgen) - MAVLink Developer Guide.”
https://docs.python.org/3/reference/. https://mavlink.io/en/mavgen_c/ (accessed Aug. 06, 2020).
49
Comprehensive Professional Competence Study of
Legal University Professors
Narantuya Lkhundev Sodov Tsedendamba
Department Law of the Orkhon University Development center of Orkhon University.
Ulaanbaatar, Mongolia Ulaanbaatar, Mongolia
[email protected] [email protected]
50
x Cognitive - to reflect the knowledge, skills and professors and law enforcement experts is very important in
activities of educational institutions in teaching the developing new teaching methods and taking into account the
subject in accordance with the law norms, and to needs of students.
link the training with the profession. The professional description of a law teacher
x Psychological-pedagogical - basic knowledge of includes the psychological norms and professional
psychology and pedagogy of higher education, requirements for his/her professional activities, the essential
ability to work with students individually, ability to nature of the profession shall include the content of the
conduct educational activities based on their activities that define his/her professional goals. However, the
diagnosis model shows the comprehensive professional competence of
x Management - the ability to manage social processes law teacher by reflecting the type of professional activity and
and educational systems, processes, and to analyze qualification of the teacher in the qualification as shown in
and organize the learning process Figure 1 [6].
x Problem solving - proposing and solving problems
in planning professional activities and evaluating
results
x Information - the ability to search, process and use Comprehensive professional
various information in modern information competence of a law teacher
technology tools in professional activities
x Communication - knowledge and skills of written
communication, speaking and pedagogical
Objective Subjective Psychological
communication. indicators of indicators incompatibility
pedagogical
At the same time, self-directed learning, humanization of work
education, democratization, competitiveness, intellectual and performance Quality of
moral freedom to grow as a professional teacher, Professional indicators psychological
independence from others, intellectual strength to overcome target activity
life's challenges, law and educational changes. Nowadays,
students are required to have a high level of intellectual and Knowledge Psychological
cultural awareness, to teach their research skills in the field of Professional quality
duties Skill
law, and to constantly improve their pedagogical,
psychological and pedagogical skills. Professional
We have included a total of 68 teachers from the Law The result Habits estate
of
Enforcement University, the Law School of the National educational
University of Mongolia, the Law School of the University of work Axiological
Mongolia, the Law School of the University of Ulaanbaatar, invariants
the Law School of the Ikh Zasag, and the Law School of the
Mongolian National University; in the research for Fig 1. Comprehensive professional competence of a law teacher
information acquisition, processing, training, vocational
training, and self-analysis. Table 1 shows the self-assessment According to our many years of research, there is a need
of these skills by professors [4]. to ensure the effectiveness of pedagogical activities in tertiary
law education in front of the universities of our country, and
there is no system for objectively evaluating the activities of
TABLE I. ASSESSMENT OF ONE'S ABILITIES BY LAW TEACHERS
professors and teachers; there is also a conflict between the
А. Have you mastered these skills? need for their professional development and the ability to
Question Б. Did you develop these skills during the provide a level of expertise. The results of our research show
law research?
В. What skills do you need to prepare to
that there is a need to improve the teaching methodology by
teach? identifying ways to improve it based on a detailed study and
Ability Г. Note your underdeveloped or mandatory analysis.
skills?
А Б В Г Actual indicators of law professional teacher training
Communicate 40.4% 20.6% 4.4% 2.2% (professional goals, responsibilities, teaching results);
Obtain, process and use subjective indicators (performance indicators, knowledge,
33.8% 22.8% 4.2% 6.6%
information. skills, habits, psychological characteristics, estate); There is a
Training 33.4% 22.4% 8.8% 2.4% psychological assessment that is necessary to achieve these
Professional 35.5% 21.5% 7.5% 2.8%
Examine herself 41.0% 18.4% 4.4% 4.0%
goals. Some researchers [3] teach law teachers
methodological skills (giving students the ability to
Explanation: Number in the table shows average percentage of the answer.
summarize and analyze law phenomena); ethical (related to
This assessment shows that law teachers are well- accountability for professional and social actions);
versed in these skills, and that they have sufficient training, communication skills (stabilizes law relations based on verbal
professional training, and skills to be more mature and useful and non-verbal communication); We are pleased that the
when preparing for law research and teaching. However, the ability to work with sources of information (training in the
ability to obtain and process information in common foreign use and efficient organization of information resources in the
languages using modern information and communication field of law relations) should be provided through additional
tools is underdeveloped or needs to be further developed. training.
The study of how to build the basic competencies of law The Law professor of the University must have at least a
professionals has shown that the cooperation of universities, master’s degree in Law, mu have theoretical knowledge and
51
practice in teaching the subject, mastered research was that the cooperation of universities, professors and law
methodologies, possess knowledge of any common foreign enforcement specialists is very important in developing new
language at a level of using professional books and literature teaching methods [5].
and as well as skills and capabilities to develop methods to In order to eliminate the discrepancy between the need to
teach the materials, must have abilities to use communication ensure the effectiveness of pedagogical activities in
technologies and tools, must be able to follow the ethics of a Mongolian universities, the lack of a realistic system for
lawyer and a professor, and have professional and polite evaluating the activities of professors and teachers, the need
communication skills. In addition, the following knowledge, for their professional development and the possibility of
skills, competencies, and characteristics are required. ensuring the level of professional evaluation, professors of
Including: some Russian universities - Developed a standard for
Knowledge: Science-based foreign language, cyber teaching professors and a standard of bachelor's degree in law
information and communication technology curriculum approved by the Bachelor of Law Standards and Metrology in
design, development of new methods for technology, Resolution No. 36 of 2007, and developed a standard for
pedagogy, general information and culture. university professors and teachers, and the average number of
Skills: Communication, public speaking, creativity, civil servants for senior lecturers. It is recommended that a
collaboration, research, methodological, correct and effective salary commensurate with the salary be based on a credit hour
expression of ideas, independence, patient acceptance of system.
what students say and write, discernment.
Competence: Responsibility, ability to withstand
pressure from critics, independent research, basic ACKNOWLEDGMENT
professional competence of subject research, critical We would like to thank the members of the Symposium
approach to the work of others and oneself, abstract thinking, Organizing Committee and all those who provided in-depth
identification of key issues in disputes, accurate assessment assistance in conducting the research and writing the
of phenomena, an appropriate use of cultural, ethical, and presentation.
scientific research methods and results in teaching.
Characteristics: Emotional self control, observant, REFERENCES
exploratory, humane, principled, interest in the profession, [1] N.V.Korniechenko, “Competitiveness of the future specialist in the
personal discipline, self-confidence, curiosity, sociable, legal labor market conditions”, Higher education today, 2008. vol.10, pp.72-
awareness. 74.
[2] V.A.Devisilov “Competence-based Higher Professional Educational
Education Standards: Structure and Content Issues”, Higher education
III. CONCLUSION today, 2010. vol.9, pp.18-22.
[3] V.D.Shadrikov “New specialist model: innovative training and
The law teachers of the surveyed universities have good competence-based approach”, Higher education today, 2004. vol.8,
communication, information skills, self-examination, pp.26-31.
professional training and teaching skills, and sufficient [4] L.Narantuya, Ts.Sodov, “Implementation, objectives, requirements of
training skills, professional training and skills are better than law teacher”, 2019. vol.08/156, pp.28-37.
when conducting law research and teaching; mature and [5] L.Narantuya, “Some issues of university professor-teacher evaluation”,
useful. However, the ability to obtain and process information Research conference of ОU, 2010. vol.11 pp.165-175.
in common foreign languages using modern information and [6] L.Narantuya, Ts.Sodov “Basic Competence Study of Law Students and
Teachers”, “Challenges of Didactics in Preschool, Primary, Secondary
communication tools is underdeveloped or needs to be further and Higher Education” Proceedings of international scientific
developed. conferences, 2015. pp.144-150.
During the research on how to build the basic
competencies of law professionals, one of our observations
52
Assessing the Progress of Children’s Competencies
I. INTRODUCTION
53
TABLE 1. Research data
III. METHODOLOGY
(3)
54
1. Children with good comprehension and performance
2. Children with good comprehension, but slow
performance
3. Children with slow comprehension, but good
performance
4. Children with both slow comprehension and
performance
If we mark as cx and cy according to the coordinates of
the centroid, the above 4 categories are defined as follows:
55
[6] S. B. Kotsiantis, Supervised Machine Learning: A Review of [9] Ts. Ganbat, D, Sarangerel, “Human and Computer Interaction”,
Classification Techniques, pp. 249-268, 2007. Ulaanbaatar, Mongolia, 2018,
[7] Аnry Vallon, “Formation of characters”, 1934. [10] Law on preschool education, Laws of Mongolia. 2008.
[8] J. Batdelger, “A test to determine the general level of mental [11] Order # A/327, Policy on preschool education, 2013 .
development of a child”, Ulaanbaatar, 1996в
56
Analysis of User Interface design methods
Nikolai Gervas
Computer Engineering department
Novosibirsk State Technical University
Novosibirsk, Russia
[email protected]
I. INTRODUCTION
Actual problem for any web-application is the design of an
effective interface, where efficiency is understood as
simplicity of development, ease of maintenance and working
with the program. There are enough standard methodologies Fig. 1. Scheme of GOMS methodology.
and recommendations for UI design. However, most of the
research is on the ergonomic aspect. The important point in UI Due to the fact that Machine-Centered approach to
design is the functional aspect. The user interface design interface design is focused on the functional characteristics of
process and its relationship to systems analysis (requirements the program, the user working with it is forced to “think like a
analysis) should be investigated. The research began with the developer”.
development of its own web-application “Fireproof Human-Centered approach, which replaced algorithmic
Corporation”. During the development, several design modeling, considers the user as the central figure in the
oversights were made, which were corrected and analyzed. In process of interacting with the system. Orientation to the
the article, it will also be considered from the point of view of characteristics of the user, the study of perceptual and
the functional aspect. cognitive capabilities and limitations of a person made it
II. ANALYSIS OF UI DESIGN APPROACHES AND possible to identify patterns of human interaction with an
METHODOLOGIES
automated system. Considering the processes and patterns of
perception, information processing and decision-making,
First of all, when analyzing UI design methodologies, cognitive psychology identified the factors that determine the
design approaches should be considered. There are two success of the operator's task. And these turned out to be not
approaches to UI design: Machine-Centered and Human- the functional characteristics of the system, as it was assumed
Centered [1]. These two approaches, in fact, represent an by engineers earlier, but the quality of the provision and
automated system at the highest level of detail ("human || management of information in terms of human capabilities
computer") and consider the interface development process and limitations.
either from the standpoint of a human operator or from the
side of the functionality of a computer. However, as it turned out, the analysis of only the
processes of perception and processing of information by a
Machine-Centered approach to creating a UI is based on person is not enough to design an ergonomic interface, since
the assumption that a person works with a computer like the it does not allow determining the composition and sequence
computer itself, i.e., according to a certain algorithm. of information displayed on the screen. This has led to the
The algorithmic modeling technique GOMS ("Goals - emergence of a number of cognitive-based UI design
Operators - Methods – Selection rules"), representing this methodologies.
approach, assumes that the result obtained when the user Activity-Centered Design. This methodology considers
performs a certain task is a goal. To achieve it, the user can the "man-computer" system as a complex of related activity
perform elementary actions - operators. A sequence of concepts and representations. The theory of activity
statements that allows you to achieve a goal is called a underlying this approach presents the computer as a tool with
method. Selection rules based on the "if-then" principle allow which a person solves various problems and it is human
changing the control flow. The structural scheme of this activity that affects the interface [1, 2].
technique is shown in Fig. 1.
According to the principles of activity theory, the entire
stream of user activity can be decomposed into a sequence of
related tasks and subtasks, logical stages. This allows to
analyze goals, external and internal tasks, the order and type
of user operations performed to achieve the final result, and
57
based on the results of the analysis, develop an interface that forms of the interface and the sequence of manipulations with
is most suitable for this type of activity them. It is difficult to talk about the quality of the interface
functionality regardless of the subject area, for example, to
Goal-oriented design. This user interface design formulate the "guidelines for the functionality" of the user
methodology, which Alan Cooper is the ideologist of, is based interface. Formally, it can be associated with the degree of “fit
on the premise that a careful study of the user's goals and for purpose” [4]. This is described in the ISO 9241-10-1996
understanding of what they are aiming for can solve the Ergonomic requirements for office work with visual display
problem of "cognitive friction" [1, 3]. Cognitive friction is a terminals (VDTs), p. 10, Dialogue principles. Referring to this
concept introduced by A. Cooper and characterizes a person's same standard, p. 11, Guidance on usability specification and
attitude to a complex thing (for example, to a computer) as to measures, we can assess the quality of the UI using three broad
another person. This attitude arises in situations where a criteria:
person cannot understand how and why this thing works (or
does not work). x effectiveness - the effect of the interface on the
completeness and accuracy of the user's achievement
User-Centered Design. The methodology has gained
of the target results.
justified popularity and is applied not only in software
development. Its essence boils down to studying the needs and x efficiency or the effect of the interface on user
capabilities of end users and adapting the product to their productivity.
needs. In other words, it is the concept of creating products,
including software, that people would like to use. x the degree of subjective satisfaction of the user with
this interface.
All the considered methodologies have a design process
similar to each other. User interface design usually consists of Efficiency is the criterion for the functionality of the
several main consecutive steps [7-8] shown in Fig. 2: interface, and the degree of satisfaction and, indirectly,
productivity is the criterion for ergonomics.
When talking about the functional aspect of UI design, we
need to consider such an important detail as requirements
analysis. As described in the ISO 13407:1999 (Human-
centered design processes for interactive systems) standard,
user-centered design begins with a deep understanding of the
needs and requirements of users. Methods for collecting
requirements are not considered in this article, as it has been
Fig. 2. UI design process structure. extensively researched. The main interest is processing
requirements and functional interface design based on it.
x Research - collecting data about users of the product.
Scenarios. All functional requirements are presented as
x Modeling - behavioral patterns identified through scenarios. A scenario is a description of actions performed by
analysis are collected in the form of domain models. a user in the framework of solving a specific task on the way
x Development of requirements - analysis of data to achieving his goal. Different types of scenarios are used at
associated with characters, their functional needs and different stages of goal-oriented design, and at each
interaction with other characters in various contexts. subsequent stage more attention is paid to interface features
than at the previous one. The first type of scenarios are
x Definition of infrastructure - the creation of a common contextual scenarios created during the initial design stage,
product concept, a concept of behavior, graphic design written from the point of view of the character, and focusing
and physical form. on human actions, impressions, and desires. Next comes the
development of key path scenarios that focus on the most
x Detailing - similar to the infrastructure stage, but more important moments of the interaction, without losing sight of
focused on implementation details. Completion of how the character uses the product to achieve his goals.
design work. Throughout the process, the design team uses test scenarios to
x Development support - adjustment of design decisions. test design solutions in various situations. Based on the
identified scenarios, the structure of screens is developed, the
For the purposes of this article, we are interested in the number of screens, the functionality of each of them,
requirements analysis process and its relationship to UI navigation links between them is determined, the structure of
design. the menu and other navigation elements is formed [6].
III. ANALYSIS OF REQUIREMENTS. FUNCTIONAL ASPECT For clarity, it is necessary to consider an example scenario.
It has already been discussed in the article that in the The article will look here and further on examples from my
methodologies for designing the UI, ergonomic standards are own developed web-application “Fireproof Corporation”. It
mainly described. In software design methodologies (e.g. should be said that the system is quite complex and contains
Unified Process), UI development is a secondary activity. It is many business entities related to each other. Therefore,
believed that if the functionality is sufficiently developed in scenarios usually involve the use of several core entities. Let's
the form of requirements and scenarios, then UI problems are consider a simple scenario for adding basic information for the
limited by the features of graphic design, ergonomics, etc. [5, “object” business-entity. Fig. 3 shows the main panel of this
6]. This is not entirely correct, because the functional aspect business-entity, which contains basic information about the
also plays an important role in UI design. The functionality of entity.
a software system should be considered the semantics of its
UI. In this case, the role of syntax is played by expressive
58
positioning. The interface of the “contracts” page in the web-
application is shown in Fig. 5.
The administrator manually fills in all the fields with The design of the general structure consists of two parallel
information: name, address, counterparty, etc., which is a processes: the allocation of independent blocks and the
painstaking process. It should be noted that both business- determination of the relationship between them. The
entities "object" and " counterparty" have a specific address. allocation of independent blocks is performed based on the list
We know from the system requirements that the addresses are of individual functions identified using user scenarios. In the
most often the same. Thus, we can get rid of an unnecessary application, a function is represented by a function block with
action - the constant filling of the object address. It is enough a corresponding screen form. Typically, several functions are
to implement the interface in such a way that when the combined into one function block. On the ergonomic side,
appropriate counterparty is selected, the address will be set functional blocks on the page should be visually separated
automatically. With some exceptions, when the addresses of from each other. This is done using colored rectangular
counterparties and objects do not match, the address can be blocks.
manually changed. Fig. 3 shows that when the appropriate Navigation. The navigation process should be designed to
counterparty (1) is selected, the address (2) is automatically help users determine where they are, where they have been,
set for the object. With the help of such scenarios and and where they can go in the future. It is difficult to give any
requirements analysis, we can get rid of unnecessary steps in specific recommendations for this work, since a lot depends
the early stages of UI design. on the designed system.
General structure design. Once we have defined the
scenarios, we move on to designing the overall structure of the
system. To do this, it is necessary to highlight individual
functional blocks and determine how exactly these blocks are
connected to each other. A separate functional block will
mean a function or a group of functions related by purpose or
scope.
Fig. 4 shows typical structures of common sites and
complex technical systems. While sites are usually forked, in
the sense that functions are usually placed on separate screens,
then complex applications usually have only one changing
screen, in which almost all functions are called.
The implemented web-application “Fireproof Fig. 6. Positioning from the “object” page to the selected application.
Corporation” has the structure of a complex application shown
in Fig. 4 on the right. This UI model was named “The
cockpit”, because a large number of functionalities is located In the developed application, navigation is implemented in
as compactly as possible on one page. Also, the advantage of the simplest way in the site header. Each page (large
this interface is the use of context-sensitive elements and functional block) has a corresponding tab. Based on the fact
59
that the system interacts with a large number of related requirements analysis that the created applications are usually
business entities, a mechanism for positioning the business distributed immediately. Therefore, when saving the
entity of interest to us is implemented (shown in Fig. 6). application (2), we automatically position ourselves on the
Suppose we are on the “object” business-entity page (1) and page of the calendar planner. We also keep the context and
want to view one of its “application”. Choosing one among all the applications the one that we just created is
application from the list, we automatically go to the page of selected (3). Everything is automatically ready for
the “application” business-entity (2) and can view the already distribution.
selected information about this application.
СONCLUSION
Without the implementation of such a positioning
mechanism, the user would have to independently go to the As a result of the work, the main approaches and
“application” page and look for the application of interest in methodologies used in UI design were considered. The
the list. methodologies deal mainly with the ergonomic aspect,
although the analysis of requirements and user needs is also
Chains of scenarios to execute. In a complex technical taken into account in all the methodologies discussed. Despite
system, positioning between pages can be performed within a this, not enough attention is paid to the functional aspect in UI
complex scenario. Requirements analysis identifies which design. In the software design methodology, UI development
scenarios are typically executed sequentially. When you is a secondary task, it is considered that it is enough to work
combine these scenarios, you can understand that some steps out the functionality. The article reviewed the process of
are unnecessary and will complicate the use of the program. requirements analysis, scenario development, the role of the
Consider a typical scenario: we have an object in the functional aspect in UI design. Using examples from the own
maintenance where repair work is to be carried out. Therefore, developed web-application “Fireproof Corporation”, the
we have the following sequence of actions: features of functional design identified during the analysis of
requirements were considered. It is difficult to talk about some
x creating an object in the system. fundamental rules when designing the functional part of the
x creating an application for this object. UI, it is necessary to start from a specific subject area. Despite
this, the developed set of rules and recommendations can help
x distributing an application using a calendar-scheduler. designers avoid obvious mistakes.
It is necessary to simplify this process with automatic The next step towards developing own methodology is to
positioning. A visual representation of the chain of action is consider the relationship of UI design with the main
depicted in Fig. 7 as the corresponding business entity pages. architectural patterns of the MVC / MVP / MVVM.
Information can be found about the functional aspect in
various methodologies, but the consideration of the
relationship between architectural patterns and specific types
of UI is not given in the methodologies, therefore this is a new
research and approach. Certain types of UI should not be
implemented using certain patterns, this will lead to system
complexity and possible errors. This study contains an
engineering approach and is aimed at helping software
developers directly.
REFERENCES
[1] A. Anatolyev, “Design of human-machine interfaces,” 2014. [online].
Available: http://www.4stud.info/user-interfaces/
[2] D. Holmes, “Activity Centred Design,” 2018. [online]. Available:
https://medium.com/dermot-holmes/activity-centred-design-
dd28ed1eec59
[3] Qubstudio, Design Agency, “How to Design Products with Goal-
Centered Design,” 2018. [online]. Available:
https://qubstudio.com/blog/how-to-design-useful-products-with-goal-
centered-design/
Fig. 7. Scenario for creating an application for an object. [4] E. Volchenkov, “User interface standardization,” 2002. [online].
Available: https://www.osp.ru/os/2002/04/181312
First of all, we fill in the newly created object with [5] E.L. Romanov, G.V. Troshina, A.A. Yakimenko, “Teaching Software
information and click on the "Add application" button (1). Engineering. A glance from the code,” vol. 8, no. 5, 2016. [online].
After that, we automatically position ourselves on the page Available: http://naukovedenie.ru/PDF/66TVN516.pdf
with applications, where we have an application that is already [6] Brusentsova, T. P, Designing user interfaces: a guide for students of
automatically created and filled with information (about the specialty 1-47 01 02 "Design of electronic and web publications".
Minsk: BSTU, pp. 172, 2019.
object, time of creation, etc.). Such functional design greatly
facilitates the user's work, since he would have to do all the [7] V.V. Golovach, User Interface Design. Russia, pp. 762, 2000.
automatic work manually. We also know from the [8] S. Krug, Do not make me think. Web Usability and Common Sense.
Moscow, Russia: Eksmo, pp. 229, 2014.
60
Developing an Information Culture for Teachers
Nyamsuren Аmsarvaa Tsedendamba Sodov
Science section Teacher development center
Orkhon Khasu secondary school Orkhon university
Ulaanbaatar, Mongolia Ulaanbaatar, Mongolia
[email protected] [email protected]
a. Explain the learning process using ICT a) Teacher knowledge of the pedagogical opportunities
and features of ICT implementation;
b. Analyze existing ICTs
b) The teacher's ability to determine the course of action;
c. Introduce ICT in certain pedagogical and
psychological contexts c) The methodology for using ICT in professional
practice is considered at the following three levels.
d. By creating and modeling ICTs on their own, it is
possible to enrich and develop the methodology for their use After learning to do such activities, a teacher can become
(to provide a pedagogical basis for studying the realities of an ICT trainer, caregiver, and consultant. In addition, the
pedagogy). teacher becomes motivated and creative in all of these
activities. In other words, a teacher with an information
Taking this into account, teachers need to consider the culture logically connects all the stages of modeling,
relationship between content, purpose, principles, methods, planning, implementing, evaluating, diagnosing, forecasting,
activities of educational subjects, and diagnosing and correcting, and motivating learning activities in a logical
monitoring the learning process when developing a sequence to the specific characteristics of their students, the
methodology for using ICT in the classroom. According to educational environment, and the current state of ICT.
I.M.Bogdanovskaya and others [2], the role of ICT in Students will be able to plan and implement lessons
solving professional goals in the activities of educators- according to their abilities.
62
Fig. 1. A functional model of pedagogy to develop a methodology for using ICT in the learning process
63
conduct activities, to manage their joint activities, to
One of the key factors in informing the learning process organize administrative work), motivator (to encourage
is the teacher's level of information culture, which students to be creative and to acquire knowledge
determines the following unique and important indicators of independently), planner (to plan and organize the learning
the profession: process in the most effective way), can be a facilitator
(facilitator of learning).
x Interest in improving the educational process using
information technology and the need to constantly 2. Create and use an open educational media system
update their knowledge in the field (educational site, Moodle system, ...) related to the psycho-
physiological characteristics of the student-subject studying
x Cautious and humane approach to news and online, living environment, employer's order, and national
information objects on the Internet, critical analysis development prospects. The challenge is to communicate
of information use results and share experiences.
x Ethical, realistic and patient approach to computer- 3. Always keep in mind that students have the right to
network communication develop their curriculum. In addition to the exercises and
assignments given online, the content of the lectures should
x Democratic, ethical and ethical aspects of be changed to suit their interests and needs, and the views of
pedagogical communication and interaction with parents, the media, and other stakeholders should be
others in a virtual environment explored. The challenge for the education sector is to
develop ICT methodologies and technologies in the
curricula of teacher training colleges and in-service teacher
x They will be able to adapt to the information society
training programs, to organize a wide-ranging discussion of
and have professional energy.
teachers' results and to implement them as a matter of
urgency.
Due to the Covid-19 pandemic in 2020, all countries
around the world are conducting online training and taking
IV. REFERENCES
exams at all levels. In this regard, we are conducting some
research and experiments to develop a methodology for [1] T. P. Zaichenko “Information culture as a psychological and
preparing computer presentations and video lectures for pedagogical factor in the development of universal educational
teachers in the field of information culture. activities of students”, 2015.
[2] I. M. Bogdanovskaya, T. P. Zaichenko, Yu. L. Project “Information
technologies in pedagogy and psychology”, Saint Petersburg, 2015.
III. CONCLUSION
[3] I. N. Semenova, A. V. Slepukhin “Methods of using information and
communication technologies in the educational process” Part 2,
1. A teacher working with students can only play the Yekaterinburg, 2013.
role of disseminator of information culture only if he or she [4] M. Delgerjav, A. Adiyasuren, B. Bolormaa “Teacher training problem
constantly develops himself or herself [4]. By cultivating all (survey review)”, Ulaanbaatar, 2020.
the qualities of a teacher, we become a teacher (a source of [5] Ts. Sodov, B. Purevjal “Research on the use of information
technology tools in physics teaching”, Educational research, №5,
professional knowledge, skills, practices, and experience), a Ulaanbaatar, 2020.
counselor (a student who completes assignments online, a [6] L. N. Denisova, L. N. Chernova “Information culture of a teacher and
counselor in accessing Internet resources, and answers renewal of professional education”, Successes of modern natural
questions), and a facilitator in the learning process (to science, No.5, 2011, p133-136.
64
“Mathshop” E-Learning Mathematics Program -
Experiments And Opportunities For Future
Development
Otgontugs Bayarrintsen Erdenebat Dashtseren Lhagvasuren Purev
Foundation for Education Loan, School of Mathematics and Natural Sciences, Mongolian Institute of Educational Research
University of Finanace and Economics Mongolian State University of Education Ulaanbaatar, Mongolia
Ulaanbaatar, Mongolia Ulaanbaatar, Mongolia [email protected]
[email protected] [email protected]
Bilguunbaatar Tumurkhuyag
Baganuur joint stock company,
University of Finanace and Economics
Ulaanbaatar, Mongolia
[email protected]
65
PROGRAM PROFILE that they may have with the program developers.
Such two way communications were instrumental
Meant for school children through Kindergarten to 12th to improve the program.
grades. 0-7 grades have beginner, intermediate and advanced
levels.
IV. RESULTS
а. To familiarize with the basic concepts
Ninety percent of the participants have responded that the
b. To connect with previous knowledge and solve “MATHSHOP” is the new tool and program that enabled
complex problem individual learning techniques, skills and experiences,
provided new knowledge while saving time. It was definitely
c. To solve critical thinking and complex problem by
interesting for students to solve math problem by using
using basic concepts
computer program, even more so, finding out whether they
9-12 grades have only 1 standard level for each. A student is solved it correctly or not at the moment was a rewarding and
considered to be meeting the criteria of each level when is motivating. Students were able to work on more problems
able to solve all problems and tasks. Grade 12 program within less days proved that it was a worthwhile. 14,023 is
features various problems covering 75 different topics and the total number of math problems solved by the participants
most of them can be randomly assigned which makes it during the experiment.
unrepeatable. It also has a section on General admission test.
This interactive program features multiple functions such as A. Total of 263 students’ math skills were tested in
fill-in-the-blank, choose, paint and draw, when solving Baganuur district and their average scaled score1 was
problems. 524.99 (initial score2 32.14). This ranked them in the
1st place, nationwide.
III. METHODOLOGY OF THE EXPERIMENT AND Student B.Batsugar, one of the experiment participants
EVALUATION from “Education” complex school, got the highest score
Total of 10 interviews were conducted among students while student B.Altan-Ochir, out of “Gun Galuutai”
during the experimental period. Such qualitative data complex school took the 2nd place. The Fig. 1 shows the
collection processes were supported by essential steps such comparison of average scores. The average scaled score
as taking notes, making analyses on weekly statistical results among all participants was 604.71 (79.72 score higher than
of solving problems and overall performances of the the district average which was already ranked on top of the
General admission test. nation). The Fig. 2 shows comparison of initial score scores.
The initial score of participant group was 45.33 (13.19 score
A. Collaborating partners higher than the district average). There were 3 students who
have scored over 700, 8 students with over 600, 12 students
Education Department of Baganuur district of with over 500, only 1 student with below 500 scores (484
Ulaanbaatar city, “GUN GALUUTAI” complex school, scores), respectively. The Fig. 3 and Table I show the
“Education” complex school, “OYUNII ERIN” complex comparative results from the last two years.
school, 24 randomly selected students from “Sod” secondary
school (who have expressed their interest to participate and
had prepared, accordingly), their parents/guardians, masters
students from Non-profit organization’s management
program of Finance and Economics University,
“MATHSHOP” Program developers and Senior executives
of MOSS LLC.
B. Duration: 2020.4.1-2020.6.14
66
O.Mungunbayar students from Baganuur districts’
participating schools.
67
Collision Warning Based on Multi-Object
Detection and Distance Estimation
Abstract— Road accidents are a leading cause of non-natural close. Integrating Distance Estimation with Object Detection
deaths around the world. Traffic safety is of utmost priority in could play a significant role in efficient Collision Avoidance
the modern age. This problem can be reduced by implementing Systems[4] and can support a wide range of applications [5].
a collision warning system that tells the driver when a vehicle is
too close. However, assisting the driver in real-time is a
However, this task has been extensively investigated using
challenging task. Traditionally, it requires high-end hardware traditional Computer Vision (CV) methods. Nowadays,
and different and sophisticated algorithms for different integrating Object Detection and Distance Estimation based
environments. These algorithms require high expertise, to on visual sensors have gained much attraction and
create and deploy inside a vehicle. In this paper, we discuss deep outstanding outcomes since the introduction of Deep
learning-based approaches to solve the problem at hand. Deep Learning [6]. A Deep Learning approach has proven its
Neural Networks are notorious for their high computational
costs and latency while performing object detection. Two
outstanding performance in high-level perceptual and
approaches with low inference time and reduced complexity are cognitive tasks such as detection, recognition, and
discussed here to create a setup to perform real-time object understanding of scenery. Neural networks are much more
detection with acceptable accuracy. A system is created such suited to such tasks than traditional CV methods, as they [7]:
that a camera can be mounted onto a car that captures the scene x Have higher accuracy when used for tasks such as image
in front of it. Then the Deep Neural Network detects and
classification and object recognition.
classifies the objects in the scene and estimates their distance
from the host vehicle. A warning is then displayed when the x Require less problem-specific expertise.
distance is low to avoid a collision. The warning can be in the x Provide more flexibility: the same neural network could be
form of a visual cue, to alert the driver in advance. retrained for a different problem.
Deep Neural Networks such as RCNNs[8], YOLO[2], and
Index Terms—, DNN- Deep Neural Network, SSD- Single Shot SSD MultiBox[8] can be deployed for the vehicle detection
Detector, TensorRT, YOLO- You Only Look Once.
task.
I. INTRODUCTION The remainder of this study is organized as follows: in the
next section stating the goals of the study. In section III,
Road traffic accidents, otherwise known as, “The
former work concerning object detection and related fields is
Neglected Epidemic” are a leading cause of non-natural
reviewed. Gaps in those works are examined briefly here.
deaths around the world. According to WHO, 20-50 million
Next, the methodology of our proposed methods is shortly
people suffer non-fatal injuries every year in traffic accidents
described in section IV. Afterward, in section V, a
[1]. Vehicle-to-vehicle crashes are the most common
comparison between existing approaches and our approach
amongst road traffic mishaps. Smart vehicle systems such as
alongside results is provided. Section VI concludes the paper
Vehicle detection and Collision warning can be used to
and states the next steps of the proposed research.
improve traffic safety. Humans need only glance once and
immediately know what is in front of them, how they behave II. RESEARCH OBJECTIVE
[2]. Computers and automation systems, on the other hand,
Our main objective is to predict to estimate a light
do not perceive the surrounding environment in the same way
paradigm/model of object detection and distance estimation
as humans do. “Object Detection” is spotting an object of
with minimal space and power consumption requirements as
interest in the scene, then, localizing it by drawing a bounding
well as real-time capability. Nowadays, a variety of neural
box around it and classifying it into one of many different
network architectures are available for object detection.
classes [3] e.g. Human, Car, or Bus, etc. “Distance
However, due to different performance parameters such as
Estimation” is approximating the distance between the
inference time, mAP (mean Average Precision), etc. not
detected object, normally another vehicle or target object, and
every neural architecture can be employed for our purpose. In
the host vehicle. “Collision Warning” is alerting the driver of
this paper, we investigate models that are appropriate for
an impending collision in advance if the detected object is too
inference on embedded GPUs.
68
A. Why is this important? detection without specific feature definition. They are based
Deep Neural Networks are computationally expensive. on the Convolutional Neural Network (CNN). There are
This is primarily because millions of parameters need to be mainly 2 types of deep learning networks, i.e. region proposal
calculated and tuning for performing inference on even a networks and 1-level networks [13]:
single frame of a video. Thus, high-performance hardware, Region proposal networks: require 2 stages, one for
such as a desktop-grade computer complete with a discrete generating region proposals, and the next to detect objects in
graphics card, is required to perform object detection (or the proposed region. They include networks like RCNNs and
inference) in real-time. However, the hardware available in a its successors.
vehicle has only limited resources. A solution must, therefore, On the other hand, Single-stage networks include networks
be developed to reduce the computational requirements of like YOLO and SSD. They only require 1 stage/ a single
these DNNs. forward pass of the network to detect multiple objects in an
In this paper, 2 different DNN architectures are examined, image/frame from a video.
namely "Tiny YOLO" and "SSD MobileNet", which are Single-stage networks like YOLO and SSD are faster than
tailor-made for low-performance hardware. These are their region proposal counterparts but have lower accuracy
implemented on a development board with embedded GPU and mean Average Precision (mAP) [14]. Additionally, they
to emulate the type of hardware inside a vehicle. The board have some problems detecting smaller objects. From the table
used here is NVIDIA Jetson Nano. A monocular camera is above, single-stage networks have significantly higher
utilized to capture the scene in real-time and provide input to inference speed (FPS) while not much trade-off in terms of
the models. accuracy (mAP).
69
Fig. 4 MobileNet V2 Layers as used in MobileNet-SSD-V2
Fig. 6 Relation between Width of the bounding box and frame width
70
SSD
91 Jetson Nano +
MobileNet 28-30 Poor detection
(COCO) Webcam
v1
Jetson Nano +
Pednet 1 9-10 Poor detection
Webcam
91 Poor Detections
YOLOv3 Jetson Nano 4-5
(COCO) and very slow
Tiny
9
YOLOv3 Laptop 32-35 Good Detection
(KITTI)
on PC
V. EVALUATION
In the Fig.7 are the screenshots of results from models
MobileNet-SSD-V2 (a) and Tiny YOLOv3 (b) respectively
running on the same video with the resolution 640 x 480 on
Jetson Nano. Tiny YOLOv3 was able to achieve 18-19
during the run of the video. MobileNet-SSD-V2 was able to
achieve 24-25 FPS on the same video. The differences were
primarily due to TensorRT’s memory optimizations. Both
models had very similar performance otherwise. In Fig.8 and
9 are the outputs of MobileNet-SSD-V2 and Tiny YOLOv3
on an image. Both the original images are provided for
reference on the left. In Table 2 below, are the results from Fig. 11 FPS/Cost metric compared with different models on Jetson Nano as
different models run on Jetson Nano as well as on a laptop. well as PC
The laptop used to run the test was equipped with Core i7-
Fig.10 and Fig. 11 illustrate the relationship between the
9750H CPU, 16GB DDR4-2666 RAM, and NVIDIA
FPS/Wattage and FPS/Cost metrics which can be used to
GeForce GTX 1660 Ti GPU with 6GB GDDR6 VRAM. For
compare the performance of the models used in this study and
consistency, most of the tests were performed on live webcam
other candidate models for a similar purpose. The higher
at the resolution 640 x 480.
these metrics, the better the model is on an embedded device
Table 2 COMPARISON OF DIFFERENT TECHNIQUE ON JETSON like Jetson Nano. Here, it can be seen SSD MobileNet v1 has
NANO AS WELL AS PC the highest FPS/Cost as well as FPS/Wattage metrics.
However, detections were poor. For a good balance,
No. of Deployment MobileNet-SSD-V2 and Tiny YOLOv3 were chosen. They
Model FPS Performance
classes Hardware
Good detections had good detections without compromising much in terms of
SSD
7 Jetson Nano +
23-25
but worse than inference times or FPS (See Table 2). YOLOv3 on Jetson
MobileNet
(COCO) Webcam SSD Inception Nano had very poor detections and slow inference time
v2
v2
Slightly better
around 250 milliseconds, thus making it unusable for real-
Tiny 9 Jetson Nano + detections than time applications.
19-20
YOLOv3 (KITTI) Webcam SSD MobileNet Thus, the models in this research outperformed the full-
v2
scale YOLOv3 on Jetson Nano by about 5 times in
SSD Very good and
91 Jetson Nano + FPS/Wattage Metric and 3.5 times in FPS/Cost metric.
Inception 18-20 precise
(COCO) Webcam
v2 detections Additionally, Tiny YOLOv3 on PC is also proven to be a lot
less efficient than when deployed on Jetson Nano. It offers
similar performance on limited hardware as well.
71
VI. CONCLUSION AND FUTURE SCOPES [6] S. Saleh, S. Manoharan, and W. Hardt, “Real-time 3D Perception of
Scenes with Monocular Camera”, Embedded Self Organizing Systems
Technology has come a long way. Compact devices and (Vol 7. No 2. 2020). (accepted).
edge computing hardware are getting more powerful and [7] N. O’Mahony, S. Campbell, A. Carvalho, S. Harapanahalli, G. V.
powerful devices are getting more compact. Driver assistance Hernandez, L. Krpalkova, et al., "Deep learning vs. traditional
computer vision", Proc. Sci. Inf. Conf., pp. 128-144, 2019.
with the help of vehicle detection in real-time is no longer a
[8] Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.Y. and
distant dream. Notably, the complete setup used in the study Berg, A.C., 2016, October. SSD: Single shot multibox detector.
for implementation is a Jetson Nano and a CSI Camera, which In European conference on computer vision (pp. 21-37). Springer,
in total costs about 150€! Besides, it only requires a 20W Cham.
[9] Huang, S.S., Chen, C.J., Hsiao, P.Y. and Fu, L.C., 2004, April. On-
power supply to perform the complete calculations in real- board vision system for lane recognition and front-vehicle detection to
time. enhance driver's awareness. In IEEE International Conference on
Overall, it can be concluded that nowadays, there is no Robotics and Automation, 2004. Proceedings. ICRA'04. 2004 (Vol. 3,
pp. 2456-2461). IEEE.
need for more expensive and powerful hardware for such
[10] Seenouvong, N., Watchareeruetai, U., Nuthong, C., Khongsomboon,
tasks. These improvements could and will certainly be K. and Ohnishi, N., 2016, February. A computer vision-based vehicle
successfully implemented to improve road safety and ADAS detection and counting system. In 2016 8th International Conference
applications. A good example is a robust collision warning on Knowledge and Smart Technology (KST) (pp. 224-227). IEEE.
system based on the detection of multiple objects and the [11] J. Redmon and A. Farhadi, YOLO9000: Better faster stronger, 2016,
estimation of distance, which is presented in this study. [12] Singh, K.B. and Arat, M.A, “Deep Learning in the Automotive
Industry: Recent Advances and Application Examples,” arXiv preprint
As part of the future aspect of this study, a precise approach arXiv:1906.08834, 2019.
for collision warning should include more features and [13] Z. Zhao, P. Zheng, S. Xu and X. Wu, "Object Detection With Deep
additional optimizations, such as the integration of depth Learning: A Review," in IEEE Transactions on Neural Networks and
Learning Systems, vol. 30, no. 11, pp. 3212-3232, Nov. 2019, doi:
estimation with the object detection architecture. 10.1109/TNNLS.2018.2876865.
Furthermore, using the TensorRT engine with Tiny YOLOv3 [14] P. Adarsh, P. Rathi and M. Kumar, "YOLO v3-Tiny: Object Detection
will improve performance and allow better inference to be and Recognition using one stage improved model," 2020 6th
achieved. However, this should be considered and optimized International Conference on Advanced Computing and
Communication Systems (ICACCS), Coimbatore, India, 2020, pp.
in future work. Also, Hybrid Data processing: To improve 687-694, doi: 10.1109/ICACCS48705.2020.9074315.
detection in complex environments, combining and [15] D. Xiao, F. Shan, Z. Li, B. T. Le, X. Liu and X. Li, "A Target Detection
processing data from different sensors like LIDAR, IR, etc. Model Based on Improved Tiny-Yolov3 Under the Environment of
can prove to be useful. [21]. Mining Truck," in IEEE Access, vol. 7, pp. 123757-123764, 2019, doi:
10.1109/ACCESS.2019.2928603.
REFERENCES [16] Arabi, S., Haghighat, A. and Sharma, A. (2019). A deep learning based
solution for construction equipment detection: from development to
[1] Global status report on road safety 2018. Geneva: World Health deployment. arXiv preprint arXiv:1904.09021.
Organization; 2018. License: CC BYNC-SA 3.0 IGO.
[17] Geiger, A., Lenz, P., Stiller, C. and Urtasun, R., “Vision meets
[2] J. Redmon, S. Divvala, R. Girshick and A. Farhadi, "You Only Look Robotics: The KITTI Dataset,” International Journal of Robotics
Once: Unified, Real-Time Object Detection," 2016 IEEE Conference Research (IJRR), 2013.
on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV,
[18] Lin, T.Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D.,
2016, pp. 779-788, doi: 10.1109/CVPR.2016.91.
Dollár, P. and Zitnick, C.L., “Microsoft coco: Common objects in
[3] Phillips, Derek J., et al. "Real-time Prediction of Automotive Collision context,” European conference on computer vision, pp. 740--755,
Risk from Monocular Video." arXiv preprint 2014.
arXiv:1902.01293 (2019).
[19] Howard, A.G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W.,
[4] Saleh, S., Khwandah, S., Heller, A., Mumtaz, A. and Hardt, W. (2019). Weyand, T., Andreetto, M. and Adam, H., “Mobilenets: Efficient
Traffic Signs Recognition and Distance Estimation Using a Monocular convolutional neural networks for mobile vision applications,” arXiv
Camera. In: 6th International Conference Actual Problems of System preprint arXiv:1704.04861, 2017.
and Software Engineering. [online] Moscow: IEEE, pp.407-418.
[20] “NVIDIA TensorRT: Programmable Inference Accelerator,” NVIDIA,
Available at: http://ceur-ws.org/Vol-2514/.
[Online]. Available: https://developer.nvidia.com/tensorrt. [Accessed
[5] Saleh, S., Hadi, S., M., Amin Nazari, and Hardt, W. (2019). Outdoor 10 08 2020].
Navigation for Visually Impaired Based on Deep Learning. In: 6th
[21] T. Gandhi and M. M. Trivedi, "Pedestrian collision avoidance systems:
International Conference Actual Problems of System and Software
a survey of computer vision based recent studies," 2006 IEEE
Engineering. [online] Moscow: IEEE, pp.397-406. Available at:
Intelligent Transportation Systems Conference, Toronto, Ont., 2006,
http://ceur-ws.org/Vol-2514/.
pp. 976-981, doi: 10.1109/ITSC.2006.1706871.
72
The Study to Determine the Required Product
Identification System
Sod-Od Batzorig Gundsambuu Bold
Department of Computer Science, Department of Computer Science,
School of Information and Communication Technology, School of Information and Communication Technology,
Mongolian University of Science and Technology Mongolian University of Science and Technology
Ulaanbaatar, Mongolia Ulaanbaatar, Mongolia
[email protected] [email protected]
Abstract— Demand and publication of commodities is a key 4. Organizations' information technology maintenance and
factor in the trade sector. It is possible to predict random demand assistance costs will decrease.
from consumers and find an optimal amount of resources.
Therefore, we examine the methodology for estimating the optimal 5. When large surveys and calculations are needed which
quantity of resources using data which recorded on the database required to estimate for a few years on the average
in the inventory of the commodity (stock) demand. The cloud computer will be able to run fast enough for multiple
computing will be used to estimate the optimal quantify and servers to compile.
calculation section uses mathematical techniques.
I. INTRODUCTION
It is a good idea to implement the programming and
technology solutions for development of the system is based on
cloud-based technology solutions. With the rapidly updating of
information technology around the world, the latest information
technology has been developing in our country. An example of
this is cloud computing technology and its products. Cloud
computing is a technology development has brought big changes
to the information technology industry. Fig. 1. Cloud computing [3]
As a programming solution, we use PHP which is the world's For this development system, cloud computing is based web
most widely used programming language [1] [2] and MySQL platforms [4] [5] and also allow to use their mobile phones to
for databases. Developing a program based on cloud-based manage their full-featured system. From all this, there are many
solutions provides the following advantages. advantages.
1. The user will be able to access their information and II. RESEARCH
applications wherever they are and it is enough to
connect to the Internet. The information is not available If the resource amount is random, its demand is a random
on the user's computer and is not restricted to the user's quantity. The following values are used to find the optimal
computer memory. quantities of demand for randomly generated demand [6]. These
includes:
2. The cost of hardware of organization which is receiving
services is reduced. Because the high-performance x Real and practical quantities of demand (these values are
computers will be running the service provider side. regarded as registered in a database.);
Therefore, the user who receive the cloud service is x If the required resource exceeds the demand, the cost of
enough that will have average performance computer to unit surplus is c1;
connect to the Cloud system.
x If the required resources less than demand, the cost per
3. Some organizations are temporarily borrowed data
unit depletion is c2;
storage memory from other organizations because they
lack memory. Therefore, they will not have to worry The demand for resources is a random quantity ∈
about data storage memory problems. { , , ⋯ , , ⋯ } and if the resource is x then total cost will
be
73
( )= ∑ ( − ) ( )+ ∑ ( − ) ( ) (1) program getStartingValues
Do i = 0 to k + 1
Here, ( ) is probability that the demand for . The minimum
point of the function ( ) is the optimal amount of resource. set Ti = Xmin - h/2 + i*h
1 1 − set Pi + 1 = Pi + (Mi+1)/n
( )= + ∙Ф (3)
2 2 if Pi < r and r <= Pi + 1
then
In the above equation, Ф( ) is a function of Laplace and the
function looks like this: set print Ti
2 /
end do
Ф( ) = (4)
√2 B. Implementation
Test data are shown below.
The optimal size of the product is the following equation and
calculate this equation, use the Laplace function table. TABLE I. EXAMPLES OF TEST DATA
74
x c2 or the cost per unit depletion is 50; The key issue of efficient resource management is
The following figure shows sales of goods and estimated x Resource accounting for inventory is need to determine
outcome is 5.7142857142857 (optimal amount of clearance). how much resources are available;
This result is an optimal amount of random demand for goods
clearance. In other words, it is to ensure that the surplus or x Based on the resource accounting, we can determine the
depletion of the goods is minimal. amount and timing of what resources to order or receive.
2. Inventory registration system
35 23 22 Inventory is the array of finished goods or goods used in
19
30 production held by a company [9]. Inventory is classified as a
current asset on a company's balance sheet, and it serves as a
25
19 17 15 15 buffer between manufacturing and order fulfillment.
20 14
12
11 5 1 x Assets held for sale during normal business operations;
15
10
10 x Items in the production stages for sale;
9
5 x Materials or supplies to be allocated or used for the
services;
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 Inventories constitute a major part of the working capital of
business and trade directives, and are the main source of
Fig. 2. Sales of goods business income. There are two systems for inventory
registering.
It is also possible to use the system to link the system with
the resource management then the data will add the database, it x Perpetual system - Each movement of the revenue and
can be automatically displayed at exactly one hour. This is expenditure of inventory recorded inventory accounts
especially suitable for organizations that hold permanent goods. and the inventory balance can be obtained from the
information in the registry. If the amount determined in
C. Inventory and resource system the inventory record is different from the amount of
In order to determine the optimal amount of product and physical count, make the correction record of the
production, the first thing we need is the notes of recorded on inventory.
inventory paper and data stored on the electronic records system. x Periodic system - It is impossible to determine the
1. The need for inventory to reserve balance of inventory from the information in the record
so the physical inventory will be made. There is no
There are several reasons why resources are reserved in the indication of a comparison with the physical count, so
industry. Below are listed a few important reasons. there is no surplus. Surplus and depletion are initially
x Back up stock to keep the production constant; contained in the cost of the goods, so correction is not
required.
x Backup to meet expected demand;
x Furthermore, the system can be incorporated into the
x Resources are stored to connect production, allocation enterprise resource planning system and it can be
systems and production phases. upgraded to software development.
x Protect against imbalance. Therefore, supply of
industrial resources does not break down or when it
comes to increased demand when resources are depleted.
x Use the order cycle advantages. Resources are reserved
for purchasing and subscription costs which are limited
to a certain amount.
x Sometimes resources are reserved for avoiding price
increases and probability of resource depletion is likely
to occur.
x Operations require a certain amount of time, and during
this period certain resources exist in the production
process.
The main objective of resource control is to provide
consumers with the desired demand, at the desired time and with
quality products that meet the needs and on the other hand to Fig. 3. An optimized system is in the ERP system [10]
minimize the cost of the process.
75
D. Screenshots of our development system In practice, the problem occurs in a widely that
Screenshots of software developed by the research work will determination of optimal quantity of resources with random
be demonstrated in the following. The figure 4 is the general demand. Based on the study of the state of demand for resources
display of our development system. The next figure shows a or demand distribution, the total cost is expressed by demand
section of the estimation. and other costs. Therefore, we consider the methodology for
finding the optimal value. The developed system can be fully
implemented in practice and implementation objects can be
retail stores and product manufacturers.
In the future, resource allocation is not uniform, in particular
when the expenditure is time-consuming, this research could be
expanded.
IV. REFERENCES
[1] R. Sandler, "The 14 most popular programming languages, according to
a study of 100,000 developers," Business Insider, 20 4 2018. [Online].
Available: https://www.businessinsider.com/14-most-popular-
programming-languages-stack-overflow-developer-survey-2018-4#8-c-
this-language-pronounced-c-sharp-was-developed-by-microsoft-its-a-
rival-to-the-even-more-popular-java-and-largely-used-by-business-
software-de.
Fig. 4. General view of our development system
[2] L. Welling and L. Thomson, PHP and MySQL Web Development.
[3] U. Marndi, "Disadvantages are addressed by cloud computing," Zeb Info
Tech, 22 6 2018. [Online]. Available:
https://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&
cd=&ved=2ahUKEwjL9OyC0qDdAhUJfbwKHeD2CoQQjhx6BAgBE
AM&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Fwww.zebinfotech.com%2F2018%2F06%2F
22%2Fdisadvantages-are-addressed-by-cloud-
computing%2F&psig=AOvVaw2wgRCAv5iIULonvztXKk7B&.
[Accessed 15 8 2018].
[4] D. C. Marinesci, "Cloud Computing: Theory and Practice," p. 416, 2013.
[5] "Cloud Computing," Free Book Centre, [Online]. Available:
http://www.freebookcentre.net/Networking/Cloud-Computing-
Books.html.
[6] Takha, Introduction to Operations Research, 2005.
[7] "Distribution functions," PennState Eberly College of Science, 2018.
[Online]. Available:
https://onlinecourses.science.psu.edu/stat414/node/98/.
[8] "Sampling Distributions and Hypothesis Testing," Department of
Psychology University of Toronto, 2018. [Online]. Available:
Fig. 5. Estimation part of our development system http://www.psych.utoronto.ca/courses/c1/Baby_howl/Chap8/chap4b.htm
l.
III. CONCLUSION [9] "Inventory," Investopedia, [Online]. Available:
https://www.investopedia.com/terms/i/inventory.asp.
Within this research work, we have developed a [10] "Enterprise Resource Planning," IBI, [Online]. Available:
mathematical modeling methodology with programming and https://www.ibi.mn/news/201309091105265634.
technology and a cloud-based system to find the optimal amount
of product.
76
Comparison of Photogrammetric Approaches for
Estimating Motion Parameters from a Monocular
Sequence
Tserennadmid Tumurbaatar
Department of Information and Computer Science
National University of Mongolia
Ulaanbaatar, Mongolia
[email protected]
Abstract—The techniques of measuring position and In this paper, we investigate methods for estimating 3D
orientation of the object using image correspondences are based motion of a moving object in image sequences taken by
on the principles of epipolar geometry in photogrammetric field. monocular camera in real-time. We have used a monocular
In this study, we aim to evaluate the main differences of web camera instead of other specialized magnetic devices to
approaches for estimating motion parameters, characterized by sense 3D motion since it is widely available. The aim of this
3D rotation and 3D translation. The estimation methods paper is analyze and compare the photogrammetric
developed in photogrammetric field were carried out. This approaches. We have used two estimation methods for
paper describes the mathematical motion model for the determining 3D motion parameters based on tracked feature
proposed approaches and comparison of their results, indicated
correspondences. They were developed in photogrammetric
the differences between the estimations in terms of accuracy and
test dataset. We showed that relative orientation based
approach. Firstly, we will introduce mathematical
approach produced accurate results for image sequences of 3D formulations for the proposed approaches. Secondly, we will
objects but homography based relative orientation approach explain implementation steps of 3D motion estimations
produced accurate results for image sequences of planar objects. regarding image sequences from single camera. Thirdly, we
will point out their practical differences in case of test datasets
Keywords—motion estimation, correspondence point, moving and analyze comparison results.
object
This paper is organized as follows. Mathematical
formulations of the motion models in photogrammetry will be
I. INTRODUCTION
described in Section 2. Methodology to implement 3D motion
Recovering position and orientation of the object from estimations and test datasets are presented in Section 3.
images is becoming important task in the fields of the Comparison results will be discussed in Section 4.
computer vision and photogrammetry. In photogrammetry,
the position and orientation (exterior orientation parameters) II. MOTION MODELS
between right image frame relative to left image frame in a We review the basic geometry of the proposed motion
sequence can be estimated by collinearity or coplanarity models. The relative motion of a moving object in image
equations [1]-[5] with a sufficient set of corresponding points. sequences is determined once the correspondence points have
In previous study, comparative study of motion estimations been established. We have assumed that a camera is
from image sequences in photogrammetry and computer stationary. Consider X ∈ ℝ object space coordinates of a
vision has been published, introducing their accuracy to point P on a rigid object moves to X ∈ ℝ object space
different datasets [6]-[8]. In computer vision, automatic coordinate of a point P with respect to a camera coordinate
relative orientation of image sequences has been widely system. Using a perspective projection model, the points
investigated with assumption of a calibrated camera. Relative P , i = 1,2 are projected at x ∈ ℝ image space coordinates
motion parameters of the perspective two views are computed of a point p at time t and at x ∈ ℝ image space
by decomposing an essential matrix through eight point coordinates of a point p at time t on the image plane as
correspondences in the image pair [9][10]. Essential matrix is shown in Fig. 1.
defined up to a scale factor for translations as set of linear
homogeneous equations by establishing feature
correspondences. The estimation methods of relative camera
motion from image point correspondences [11] and from less
than eight point correspondences [12]-[15] in various
applications such as visual servoing and control were
developed. Moreover, motion parameters of a camera relative
to a planar object can be estimated by decomposing a
homography matrix through point correspondences. The
numerical and analytical methods for 3D motion from
homography decomposition were introduced in detail [16].
The authors [17]-[22] also introduced efficient solutions to 3D
motion estimation based on homography matrix through point
correspondences for planar targets in augmented reality and
robot control applications. Moreover, an additional Fig. 1. Geometry of object in image sequences.
investigation of the photogrammetric techniques that estimate
the motion parameters.
77
Due to the rigidity constraint of the object motion [23], Here, = [ , , ] is the unit normal vector to the 2D
P and P are related by rotation matrix R and translational plane , and is the distance from the plane to the optical
vector T: center of the camera as shown in Fig. 2. The five parameters
( , , , , ) of the relative motion and three parameters
x TRx = 0 (1) ( , , ) of the plane in object space can be estimated from
This is called coplanarity or epipolar constraint written in this equation by a non-linear least squares solution.
triple product of vectors from Eq. (1).
III. THE IMPLEMENTATION OF THE PROPOSED METHODS
A. Motion model from on relative orientation In this section, we explain implementation steps for
Non-linear equations in coplanarity condition can be performing the two estimations as shown in Fig. 4. Firstly, we
written as following: capture an initial frame at time and extract a template region
from it as shown in Fig. 3 (A). Then SIFT feature points as
yellow dots in Fig. 3 (B) are computed for the template. Here,
= , = (
we assume N extracted feature points that are automatically
tracked to the next each F frames. Secondly, when a new
where frame at time of a moving object is captured, feature points
are extracted for the new frame. After matching feature points
= cosφ ∗ cosκ;
of the new frame with the feature points of the template
= −cosφ ∗ sinκ; region, the best matches (corresponding points) are found by
= sinφ; a Brute Force matcher.
= sinω ∗ sinφ ∗ cosκ + cosω ∗ sinκ;
= −sinω ∗ sinφ ∗ sinκ + cosω ∗ cosκ;
= −sinω ∗ cosφ;
= −cosω ∗ sinφ ∗ cosκ + sinω ∗ sinκ;
= cosω ∗ sinφ ∗ sinκ + sinω ∗ cosκ;
= cosω ∗ cosφ;
Then triple-scalar product of the three vectors as Fig. 3. (A) Template region as light green rectangle extracted in a frame, (B)
Extracted features to be matched as yellow points in the template region.
following:
Before estimation of the motion parameters, outliers
∙( − )+ ∙( − )+ ∙( − among the best matches are eliminated by RANSAC [24]
) = 0. (3) method. Thirdly, when all processing steps of two consecutive
frames are accumulated as mentioned above, the proposed
Here, ω, φ, and κ are rotations about the axis, axis, estimations defined in the Section 2 are used to estimate
and axis, respectively. , , and are translations about motion parameters.
the axis, axis, and axis, respectively. The three
parameters of the rotation matrix R and the two components
of the translation as unknowns can be determined by a non-
linear least squares solution from Eq. (3).
78
Studio programming tool and OpenCV 2.4.9 library on a PC,
Intel(R) Core(TM) i7-9700. We used a Microsoft LifeCam
with known calibration parameters. We experimentally
Fig. 5. Rotation of the object around axis for dataset of real scene.
compared results from the two proposed estimations by for both of the datasets. Particularly, PM_H produced more
preparing different test datasets such as real and simulated accurate results for image sequences of the moving planar
datasets. Video sequences for a moving object are captured object since planar pattern is dominating in test dataset. On the
with 640 × 360 pixel resolution. We used thousands of other hand, the motion parameters estimated from PM_RO are
image sequences of the different textured 3D and planar the most accurate than PM_H for dataset of 3D object with
objects to check estimation accuracy of the motion noisy point correspondences. But PM_H and PM_RO still
parameters. have produced comparable errors. Success rate of estimations
stay in range of large motion of the moving object.
For creation of the real dataset, we created video
sequences while translating object position along each axis up TABLE II. ERROR ANALYSIS FOR ROTATIONS AROUND , AND
to 200 mm and rotating around each axis up to 90 degrees in AXES FOR SIMULATED DATASET
the front of static camera. The number of feature point for real
Error comparison of simulated datasets for 3D object
dataset was around 150. One of the prepared datasets for real
/degrees/
scene of the moving object rotated in 0o-30o degrees around PM_H PM_RO
axis is shown in Fig. 5 as an example. Estimation of motion Max 1.647 1.589
parameters can be performed between an initial frame as Min 0.015 0.003
shown in the first frame of the Fig. 5 and the next frames as Mean 0.549 0.461
shown in the second to last frame of the Fig. 5.
For creation of the simulated dataset, 3D object was CONCLUSION
translated by up to 15 units along , and axes and rotated
by up to 90 degrees around , and axes in Euclidean In this study, we compared the approaches for estimating
space. The number of feature point for simulated dataset was 3D motion in photogrammetry with different datasets. We
around 25. The feature points from image sequences were checked estimation errors for the approaches by using
measured with 2-4 pixel noisy for the both dataset cases. corresponding points between template region and subsequent
frames. The results of estimations were accurate in change of
We notated the estimation methods for experiment as translation and rotation under noisy correspondences.
PM_RO and PM_H for relative orientation and homography Specially, the homography based approach was more accurate
based relative orientation, respectively. For these estimations, for estimating motion of the planar object, and relative
we checked accuracy of the estimated rotation parameters orientation based approach was more accurate for estimating
with comparing true (known) rotation parameters. For motion of the 3D object. This means that the accuracy of the
reference true value, we manually measured corresponding estimation approaches is depending on test dataset.
points from the image sequences, and estimated their precise
3D motion. We analyzed mean, maximum (Max) and ACKNOWLEDGMENT
minimum (Min) errors for results from two estimations for all The work in this paper was supported by the grant of
datasets as summarized in Table 1 and Table 2. National University of Mongolia (No. P2019-3714 ).
TABLE I. ERROR ANALYSIS FOR ROTATIONS AROUND , AND REFERENCES
AXES FOR REAL SCENE
[1] B. K. P. Horn, “Relative Orientation,” Int J Comput Vision, vol. 4, pp.
Error comparison of real Error comparison of real 59-78, 1990.
datasets for 3D object datasets for planar object [2] T. Schenk, “Digital Photogrammetry,” Terra Science: Laurelville,
/degrees/ /degrees/ USA, 1999.
PM_H PM_RO PM_H PM_RO [3] P. Wolf, B. DeWitt, B.E. Wilkinson, “Elements of Photogrammetry
Max 1.867 1.863 1.828 1.983 with Applications in GIS,” 4th ed. McGraw-Hill Science, USA, 2014.
Min 0.0004 0.0004 0.0001 0.0009 [4] J. Kim, H. Kim, T. Lee, T. Kim, “Photogrammetric Approach for
Mean 0.538 0.527 0.312 0.408 Precise Correction of Camera Misalignment for 3D Image
Generation.,” Proceedings of the IEEE International Conference on
Consumer Electronics, pp. 396–397, 2012.
As we see in Table 1 and Table 2 that the errors of the
rotation results are small and accurate for each two approaches
79
[5] J.C. McGlone, E.M. Mikhail, J. Bethel, “Manual of Photogrammetry,” [15] G. Chesi and K. Hashimoto, “Camera pose estimation from less than
5th ed. American Society of Photogrammetry and Remote Sensing, eigth points in visual servoing,” IEEE, International Conference on
USA, 2004. Robotics and Automation, 2004.
[6] T. Tumurbaatar, T. Kim, “Comparison of computer vision and [16] E. Malis and M. Vargas, “Deeper understanding of the homography
photogrammetric approaches for motion estimation of object in an decomposition for vision-based control,” Research Report 6303,
image sequence,” Proceedings of the IEEE International Conference INRIA, 2007.
on Image, Vision and Computing, Chongqing, China, 2018. [17] K. Kim, V. Lepetit, W. Woo, “Scalable real-time planar targets
[7] T. Tumurbaatar, T. Kim, “Comparative study of relative pose tracking for digilog books,” Vis Comput, vol. 26, pp. 1145–1154, 2010.
estimations from a monocular image sequence in computer vision and [18] H. Bazargani, O. Bilaniuk, R. Laganie`re, “A fast and robust
photogrammetry,” Sensors, 19(8), 2019. homography scheme for real-time planar target detection,” J Real-Time
[8] T. Tumurbaatar, D. Terbish, E. Adiya, “Computer vision approaches Image Proc, pp. 1-20, 2015.
for motion estimation of object in image sequences,” Proceedings of [19] Y. Mae, J. Choi, H. Takahashi, K. Ohara, T. Takubo, T. Arai,
International Conference on Frontiers of Information Technology, “Interoperable vision component for object detection and 3D pose
Applications and Tools (FITAT), Hong Kong, 2018. estimation for modularized robot control,” Mechatronics, vol. 21 pp.
[9] J. Weng, T.S. Huang, N. Ahuja, “Motion and Structure from Two 983-992, 2011.
Perspective Views: Algorithms, Error Analysis, and Error Estimation,” [20] E. Marchand, H. Uchiyama, F. Spindler, “Pose Estimation for
IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. Augmented Reality: A Hands-On Survey,” IEEE Transactions on
11(5), May 1989. Visualization and Computer Graphics, vol. 22(12), pp. 2633-2651,
[10] R. Hartley and A. Zisserman, “Multiple view in computer vision,” 2016.
Cambridge University Press, 2000. [21] B. Zhu, “Self-Recalibration of the Camera Pose via Homography,”
[11] G. Chesi, “Estimation of the camera pose from image point IEEE International Conference on Intelligent Computing and
correspondences through the essential matrix and convex Intelligent Systems, 2010.
optimization,” IEEE International Conference on Robotics and [22] C. Pirchheim and G. Reitmayr, “Homography-based planar mapping
Automation, 2009. and tracking for mobile phones,” 10th IEEE International Symposium
[12] K. Fathian and N.R. Gans, “A new approach for solving the five-point on Mixed and Augmented Reality, 2011.
relative pose problem for vision-based estimation and control,” IEEE [23] S. Ullman, “The Interpretation of Visual Motion,” Cambridge, MA:
American Control Conference, 2014. MIT Press, 1979.
[13] M. Sarkis, K. Diepold, K. Huper, ”A Fast and robust solution to the [24] A. Martin, M.A. Fischler, R.C. Bolles, “Random Sample Consensus:
five-point relative pose problem using Gauss-Newton optimization on A Paradigm for Model Fitting with Applications to Image Analysis and
a manifold,” IEEE International Conference on Acoustics, Speech and Automated Cartography,” Commun. ACM, pp. 381–395, 1981.
Signal Processing, 2007.
[14] D. Batra and B. Nabbe, M. Hebert, “An alternative formulation for five
point relative pose problem,” IEEE, Workshop on Motion and Video
Computing, 2007.
80
Studying the Students Information
Technology Use
(On the example of the 2nd course of the Mongolian National Institute of Physical Education)
#1
Tuvshinjargal Radnaa #2Tserengavaa Tserenpurev
Doctor, Researcher MA,Teacher
Studies Programm Sector Theory and Methodology Department
Mongolian Institute for Educational Research Mongolian National Institute of Physical Education
Ulaanbaatar, Mongolia Ulaanbaatar, Mongolia
[email protected] [email protected]
Abstract-In today`s era of rapid development of data and demands or concepts related to the growing knowledge and
digital technology, it is vital for higher education students to skills for learning technology in the data and information
have knowledge and skills about how to learn and use the society we live in today.
information technology, learn to use the devices such as
computers and other hardware. Thus they will be able to work The program means intended for the training purposes
freely in the internet environment to obtain useful information. such as give certain level of computer knowledge to students,
learn to make the optimal decision in real perplexed
Keywords-The needs and use of students’ information conditions, work independently, especially obtaining skills to
technology. process data, control oneself, to correct one’s mistakes and get
the skills of proper use of the information received.
I. BACKGROUND Students who use the information will be able to get and
provide the information they need for their training, use it in
It is impossible to think of the current students separate
their lessons, assignments, tasks and homework, and watch
from the information technology. Therefore, it is much of an
movies and videos they need, in return, it helps to express
importance to equip them to work and live in the information
their views and opinions properly online or on social media.
technology society. The situation with information technology
infrastructure in major cities and rural areas including sums
and smaller units vary a lot. [1]. Therefore, the information Innovative aspects of this research work
technology & science subject has an important role to give the It identifies the level of use of information technology by
knowledge and skills of the information technology students at the School of Physical Education and Sports.
consumption.
Media equipments such as computers, audio, video, CD, Practical significance of the research
VCD, information, and communication networks, are used in As a result, the conclusions and recommendations of this
the process of students` developmet 'self-knowledge, research should have been included in the curriculum of sports
knowledge-based skills, and practical skills, taking into schools, and have their implementation be made a clear
account the specifics of students' mental and information contribution to the improvement of training activities, which
processing and perception. There is a real need to develop of practical importance for this research work.
effective methodologies for the information technology-based
professional training such as the proper use of the Internet,
websites, computer applications and Internet applications. II. STUDY RESULT
Process and results of the information technology
As of the first half of 2013, there had been 609,000
Facebook users registered in Mongolia, that was 22 percent of consumption
the population, but now, after 6 years the number has grown In this study, 36 males and 14 female or total 50 students
by 13 percent or it means that 35 percent of the Mongolian of the Mongolian National Institute of Physical Education
population are Facebook users. According to a survey, 70 participated and the study was made by 8 surveys in selected
percent of all users are young people aged between 18-35. [2]. methods.
In the United States and Spain, students and learners use The answer was given that 88% of the students answered
information technology on a computer to practice, strengthen “yes” and 12% of them said “no” when the question was
knowledge and skills, problem solving and for continuously asked from the students whether they are updated with the
improving their information management and learning skills. information technology enthusiastically. According to the
In many countries around the world, the know how on how to study, it shows that majority of the students receive the
incorporate the latest achievements of information technology information then processed it, interact with others and stay up
into the educational teaching process and the right selection of to date about the news in the society. Nowadays lifestyle
the technology are being continuously conducted through demands them to use the information technology based
various researches with combined experiments and studies. electronic devices and equipment in order to keep up with the
[3]. technology development. Therefore, the students cannot
imagine or limit the information technology only by phones
The use of information technology in education plays a and Facebook.
key role in the process of introducing and developing
information technology in the education sector. The use of When the question was asked “How does information
information technology in education is related to new technology development influence your life?“, 96% replied
81
that it affects them well. However, 4 % replied that it was not
in the level to affect. This is a huge indication that the students
understand that the skills to work on the program use they
need to obtain at the information technology & science subject 0% 12%
are indispensable necessity for today’s students.
4% Yahoo mail
According to the study, it shows that majority of the
2%
students use the Excel program which is designated to
process the table information and to do accounting using the Gmail
mathematics function. It shows that 8% answered that they
use the programs fully and that means the students don`t have Yahoo,
necessary possession of the programs evenly. Therefore, it is gmail
crutial to make the information technology & science subject Facebook
program more progressive [Fig.1] 82%
Others
According to the study, it shows that most students get Ipad Phone
access to the online environment in order to get the news and Notebook 2% Others
2%
information. However 1% of the students answered that they 15% Tablet
do not havea access to internet, because of playing games or Stationary
other reasons. This means it indicates it is a good sign, computer Stationary
although it has been the not enough in this current data 7% computer
society. [Fig.2] Notebook
Tablet Ipad
2%
Others
12% Phone
8% 72%
Word
10% 25%
Excel Fig. 4. What information technology equipment do you use more?
82
to make change to the subject program at the
university for information technology & science
4% subject.
16% From 1 to 3
¾ In the data era, when students want to study
successfully, it is essential to find the information
From 3 to 6 that is necessary for them as well as it is important to
18% be able to use and organize it, to build-up
Over 6 information, to process, to distribute and to evaluate
62% the electronic technology.
No ¾ This research work shows that we do not limit
ourselves to using electronic tools and applications
with only by computer lessons, but also we need to
improve our knowledge and skills by receiving tasks,
homework, getting news and information from
Fig. 5. How many hours a day do you get online electronic environment?
professional sports sites, and to use information
In this survey, through the information technology & technology properly in our daily lives.
science subject, most students obtain the knowledge on how to ¾ In the future, it will be an issue to face us to choose
use the information technological electronic means. It was the most proper ways to use e-learning materials, to
observed that the knowledge and skills to process the have a student-centered teaching methods that are
electronic means were increased. 2 percent answered that appropriate for the age-specific mentality, on the
there was no improvement about the information technology other hand it is important to improve the teaching
knowledge and it shows that the information technology & and learning methodologies in such ways that
science subject could not include and provide needs of some learners have all the opportunities to learn
students when the analysis was made. [Fig.6] independently.
BIBLIOGRAPHY
4% [1] Information and communications technology (ICT), “Information
2%
technology white book”,Ulaanbaatar, pp.185, 2014.(references)
Yes [2] D.Chimgee, J.Erdenechimeg,“Higher education”, Ulaanbaatar, pp. 301,
2018.(references)
No [3] J.Davaa, G.Sarantuya,“University teaching technology”, Ulaanbaatar,
pp. 102-103,2013.(references)
A little [4] D.Chimgee, J.Erdenechimeg,“Higher education”, Ulaanbaatar, pp. 303,
2018.(references)
[5] N.Jargalsaikhan, Ts.Tavkhai “Computer self-study book”.
Ulaanbaatar, 2012.
[6] Ts.Chimedlkham, B.Zolzaya,“Information science-1”, Ulaanbaatar,
2006.
94%
[7] L.Davaasvren, “The beggnner’s guide book to use computer”,
Ulaanbaatar, 2009.
[8] B.Zolzaya., “Computer”, Ulaanbaatar, 2011.
Fig. 6. Was there any improvement to your technology knowledge by [9] Ts.Tserengavaa, ”The importance of recognizing computer
having the computer lessons? specification”, Mongolian National Institute of Physical
Education,“Physical education, sports theory methodology” Magazine
Vol 2017-4 (58), Ulaanbaatar, pp. 37. 2017
III. CONCLUSION [10] D.Nasanjargal.,“Computer studies” manual. Ulaanbaatar, 2013.
[11] “Training manual to improve the Information science lecturers’
¾ The lessons and gains were analyzed and concluded profession”, Mongolian National University of Education, Ulaanbaatar,
on the basis of the summary for the study and 2005.
research results taken from the students about how to [12] www.google.mn
improve and use the information technology [13] www.msue.edu.mn
[14] www.hicheel.mn
knowledge, training on the use of electronic devices
and equipment with greater results. As a result, we
reached the conclusion that it would be appropriate
83
Blended Mentoring in Academic Internship Program
Ummay Ubaida Shegupta René Schmidt Martin Springwald
Department of Computer Engineering Department of Computer Engineering Department of Computer Engineering
Chemnitz University of Technology Chemnitz University of Technology Chemnitz University of Technology
Chemnitz, Germany Chemnitz, Germany Chemnitz, Germany
ummay- [email protected] [email protected]
[email protected] chemnitz.de chemnitz.de
chemnitz.de
Wolfram Hardt
Department of Computer Engineering
Chemnitz University of Technology
Chemnitz, Germany
[email protected]
chemnitz.de
Abstract— Mentoring is considered as one of the best teaching contrast to students' competence gain. For this reason, we are
methods based on the recent scientific evidences. Due to the investigating possibilities to extract feasible data from the
ongoing digitalization in the learning environment, the traditional LMS "OPAL". Furthermore, the state of the art of data
mentoring processes evolved to technology supported blended analytics using artificial intelligence methods needs to be
mentoring. In this paper, it is described how this blended
analyzed compared to standard rule based approaches
mentoring strategy has been integrated into the academic
internship program of computer engineering education with the providing the basis of data usage approaches.
objective of introducing students the scientific way of working.
The students work intensively on their own topic, which in turn is The mentoring objective is to bring students closer to the
a part of a complex system. Throughout the entire duration of the scientific way of working through close cooperation
internship, the students are supported by the mentors in order to supported by technical methods increasing the interactivity
maintain the scientific way of working and to achieve their project and intensifying the mentoring process. This report aims to
goals. Various technical systems are used to support the students explore a blended mentoring approach in context of a
ensuring a lively support flow. The results show the effectiveness workshop in combination with the video conferencing tool
of the method.
Big Blue Button [12] and the team communicator Slack [13]
Keywords—Blended mentoring, communication, virtual to ensure scientific working methodology during the project
support, learning management system, scientific methodology. work of the students.
84
gradual support of consultation, instructions, motivation The six students registered have chosen 5 of the following
along with providing continuous feedback to their learning topics. The voluntary chosen topics are:
activities [7]. Afterwards, the mentoring process steered the 1. Analysis and Implementation of Methods for iCal
students to take over the ownership of their own learning, as Calendar Data Extraction
it is supported by ZPD [8]. 2. Analysis and Implementation of Methods for ONYX
Test Evaluation
B. Blended Mentoring
3. Data Acquisition and Generation of Statistical Data
Upholding the great promise of traditional mentoring, it from Log Files
has been expanded to E-mentoring and blended mentoring 4. Implementation of a GUI for Data Visualization
with the evolution of E-learning and Web 3.0 technology 5. AI for Automatic Test Data Evaluation
[10]. Blended mentoring process has more than one means of Two students with individual solution strategies have chosen
communication including face-to-face mentoring sessions topic 4.
accompanied by communication or mediation through e-
learning tools [10]. Previously, mentoring used the benefit of B. Scaffolding through Blended Mentoring
email to maintain the virtual communication between the In this academic internship program, the higher order
mentor and mentee [1]. The development of various user- learning is facilitated via metacognitive scaffolding
friendly technologies used for communication and as techniques [9]. The phases of planning, monitoring and
teaching aid in e-learning has paved the way to practice and evaluation of this technique [9] were incorporated in the
apply the theoretical knowledge of mentoring [3]. applied blended mentoring approach.
In the planning and monitoring phases, the students got
As scaffolding in the ZPD was followed in this mentoring incremental mentoring support at the beginning of the
process, it had helped to easily realize the blended mentoring internship. Two face to face residential workshop session
support via e-learning tools. This enables the mentee to keep occurred which were respectively three days and five days
track of his or her respective implementation tasks with the long. The aim of these sessions were to provide intensive
minimum possible guidance from the mentors. mentoring support. The students completed the task of
understanding the requirements of the internship, state of the
In the above-mentioned framework, it indicates that the art analysis and developed their first plan of implementation
mentoring process combines traditional and online sessions; it in these sessions. Formal presentations of the mentees in
can be called blended mentoring approach accordingly [8]. these sessions were realized as formative evaluation,
This blended approach has enabled the mentor to provide task rendering the scope of continuous development in their
related continuous feedback and to facilitate the students to respective internship tasks.
sustain their motivation to complete their assigned tasks.
C. Research Objective In between, these sessions and the communication at the
later period of this internship between the mentor and the
Mentoring in internship is defined as the degree to which
students were maintained via Email and SLACK [13].
the supervisor or mentor assigns the challenging tasks to the
Whenever the students needed in-depth support, the online
mentees, and provides proper guidance in accomplishing the
meeting tool Big Blue Button [12] had been used.
tasks and purposefully helps to develop the mentee’s
cognition and skills for real life implication. Reasonably, the
Finally, in the summative evaluation phase, the last
mentees’ view of the applied blended mentoring approach is
official online workshop the students were able to show their
necessary to continue this support in the academic research
implementation individually by themselves. Here they were
internship program. Besides, the student’s task oriented goal,
expected as competent individuals, who could perform the
which will be described in the task description section, the
difficult tasks by their own as stated by the “Zone of Proximal
research objectives are to explore the mentees’ perception
Development”.
about the mentoring support, about their cognitive, affective
and skill development, their preferences of the mentoring C. Internship Task Description
modes, mentor’s roles and the effectiveness of different The objective to bring students closer to the scientific way
consultation media. Along with these, finding out the of working, therefore 6 Tasks in the context of learning data
shortcomings of the mentoring process to improve it in future extraction has been defined, based on working fields
is an underlying objective of this research. identified in cooperation with the ‘tech4comp’ project.
Reasoned by data protection law conditions, the person data
III. RESEARCH METHODOLOGY cannot be made available to students. For this reason an
A. Student Background evaluation course in OPAL has been created, which contains
all necessary course elements. The students can use it freely
There are six students registered to this academic
to generate all necessary data as examples for artificial data
internship. They are all Master students of Chemnitz
generation following the given data structure. This course has
university of Technology (TUC). They are mainly from two
mainly 6 types of elements: Registration-Element, Upload-
faculties – Faculty of Computer Science and Faculty of
Folder- Element for the files from supervisors, 6 types of
Electrical Engineering and Information Technology. The
Calendar-Elements, two types of Blog-Elements, five types
gender ratio can be considered as balanced with 4 men and 2
of Checklists-Elements and five types of ONYX Test-
women. Two of the students are enrolled in first semester
Elements. Log data can be acquired from all course elements
whereas the other students are enrolled within a range of 3 to
and these different types of elements provide different types
7 semesters.
85
of learning experience data of the students. For conducting conditions. On this basis, guidelines should be developed
learning analytics, these data needs to be exported from the enabling AI-based evaluation and feedback generation.
data archiving tool and exported function from the "Course 5) Data Acquisition and Generation of Statistical Data
evaluation" and "Statistics" functions of the course. The data from Log Files
are exported as XLS Files. To perform Learning analytics it For data analytics, it is necessary to automatically read the
is necessary to extract and evaluate the data providing the log data of the course providing the access time and usage
particular task basis. The Task description are as follow: frequency of different course elements and store it in a
1) Analysis and Implementation of Methods for iCal database. Therefore, the learning outcome of this task is that,
Calendar Data Extraction the intern will be able to develop a script or program which
Opal offers the possibility to integrate iCal calendars into reads all information of the exported data file, prepares it and
courses. For data analytics, it is necessary to automatically stores it in a database.
read the data of the calendar and store it in a database. In the first step, the data must be understood and the
Therefore, the learning outcome of this task is that, the intern information that can be extracted has to be identified. On this
will be able to develop a script or program, which reads all basis, the database design is to be jointly defined and
information of the calendar, prepares it and stores it in a implemented in cooperation with the other teams. The data
database. will then be automatically extracted and prepared for
In the first step, the data must be understood and the database storage and statistical analysis. Finally, the data will
information that can be extracted has to be identified. On this automatically be stored in the database.
basis, the database design is to be jointly defined and
D. Basics of Task Completion Strategy
implemented in cooperation with the other team members.
The data will then be automatically extracted and prepared The first step is to recognize the data and filter the
for database storage. Finally, the data will be automatically information. On this basis, the database should be defined and
stored in the database. implemented as team across all members and filled manually
2) Analysis and Implementation of Methods for ONYX with artificial data once. Afterwards, the data has to be
Test Evaluation automatically extracted and prepared for database storage and
Opal offers the possibility to integrate ONYX Tests into statistical evaluation. The exported data has to be visualized
courses. These tests can be extracted by the archive function in the fourth task using the manually data of the database for
from Opal as Excel files. For data analytics, it is necessary to the prototyping process. Subsequently, the data has to be
automatically read this data and store it in a database. presented as components of a website. For this purpose,
Therefore, the learning outcome of this task is that, the intern statistics on the temporal evolution and the current status of
will be able to develop a script or program, which reads all the semester have to be conceptualized in advance.
information of the exported data file, prepares it and stores it Knowledge queries are very important in a mixed learning
in a database. environment, but a lot of data has to be processed. One goal
In the first step, the data has to be analyzed as preparation of data processing is the individual feedback from the pupils.
for information extraction. On this basis, the database design In order to give good feedback, it is necessary to understand
is to be jointly defined and implemented in cooperation with the connection between tasks and draw conclusions about
the other team members. The data will then be automatically possible misunderstandings. Task five required that a
extracted and prepared for database storage. Finally, the data systematic literary survey has to be carried out, with clues for
will automatically be stored in the database. the analysis of concepts that serve to identify
3) Implementation of a GUI for Data Visualization misunderstandings. With the help of the results, it should be
The data exported from task 1 to 4 stored in the database possible to generate ratings and feedback with the help of an
are to be visualized in this task. Therefore, the learning AI.
outcome of this task is that, the intern will be able to design a
database together with the team members. E. Data Collection and Analysis
Afterwards, the data should be presented as web In this study, mentors overall experience has been
components on a website. For this purpose statistics have to captured via unstructured interviews. Whereas, a close ended
be created to visualize the temporal evolution (e.g. by questionnaire is used to gather data of mentees’ overall
semester) and the current state of the semester. experience of blended mentoring support in this academic
4) AI for Automatic Test Data Evaluation internship. Since, the sample size is small (Mentor =3;
Knowledge tests are very important in the blended Mentee/Intern =6), the data has been analyzed as qualitative
learning environment. However, a lot of data has to be data. Narrative analysis is conducted for the unstructured
processed. One goal of such data processing is the generation interview data. The questionnaire responses have been
of individual feedback for the respective pupil/student. To analyzed by the combination of thematic analysis and
create a good feedback it is necessary to understand the descriptive statistics.
connections between tasks and to be able to draw conclusions
about the actual misconceptions. At this point artificial IV. RESULTS & DISCUSSION
intelligence should be used to identify such misconceptions. A. Mentor’s Perspective
Therefore the learning outcome of this task is that, the intern The mentoring process conducted through the mentors
will be able to conduct a systematic literature survey (with has been based on the aspect of sociocultural theory of Zone
evidence), to analyse concepts for the identification of of Proximal Development (ZPD). The interns have been
misconceptions and, if necessary, to extract the required mentored intensively during the first stage of the internship.
86
According to ZPD, the scaffolding techniques have been used
during these intensive consultation sessions. The mentors PLW 33.33%
have tried to model similar examples of their assigned tasks
and answered all the possible queries of the mentees to clarify CS 33%
the confusions of the tasks. The mentees have got frequent CD 33%
direct constructive feedback for the first three months of their
internship. Then they have been working on the theoretical APS 67%
basis and conceptual development of their assigned task, as PS 50%
these are fundamental for the implementation of the technical
part. SC 67.00%
Overall, the mentors are satisfied with the guidance that 0.00% 20.00% 40.00% 60.00% 80.00%
they provided. All the mentee have been able to complete
their internship tasks. Since all the mentee have to works in Fig. 2. Mentee’s improvement via mentoring support with
[SC] Self Confidence
whole groups, it has been found out that all of them are [PS] Presentation skills
supportive to each other. They have been successfully [APS] Analytical/ problem solving skills
worked in the team because of their sound communication [CD] Career development
and social skills. As they have to finish their task with less [CS] Communication skills
[PLW] Personal attitude towards learning and working
possible guidance during the last months of the internship,
there has been a reduction in the role of ‘Instructor’ as
Figure 2 shows their affective and skill development in this
mentor.
whole mentoring process. As one of the mentee stated in the
In course of mentoring, the mentors have realized that
open ended response,
most of the mentees lack in programming experience resulted
in lower quality of the implementation part. The
“I was challenged to discover new horizons in a field I
implementation have been successful though the mentors had
initially knew nothing about, and in this process gained
higher expectation.
profound, non-trivial depth of advantageous knowledge. This
B. Mentee’s Perspective has helped me both on academic and career levels.”
The responses of the mentees from the close-ended
questionnaire about the mentoring support shows diversified This statement indicates the improvement in the self-
prospect about the provided mentoring process. All of them confidence as well as in their problem solving skills of the
reported about being mentored via face-to-face meetings, mentees. However, the mentees have realized the
online synchronous and asynchronous communication differentiated mentor’s roles according to their needs shown
media. in figure 3.
Trainer
BBB
Motivator
Email Networker
Emo. Supp.
SLACK
Instructor
F2F Consultant
Advisor
0.00% 20.00% 40.00% 60.00% 80.00% 100.00%
Fig. 1. Effectiveness of the blended mentoring media for face to face
Teacher
meetings (F2F), Workspace Chatroom Slack (SLACK), E-mail contacts
(Email) and Online meetings via BBB (BBB) 0% 20% 40% 60% 80% 100%
Fig. 3. Roles of Mentor
They have opined that the face-to-face meetings provided the
most effective mentoring support (See Fig.1). Among the Figure 3 above shows that the mentors have been realized
other modes of communication, Slack and online meeting mostly the role of advisor and motivator in all through the
room Big Blue Button have been reported as effective internship period. The other significant roles that the mentors
mentoring tool. Their responses show that they have been have played are consultant and teacher. The mentors have
most benefited by the mentoring support in increasing their also performed the role of networker, emotional supporter
self-confidence. Figure 2 shows their perception that their (Emo.Supp.) and instructor. The role that the mentor have
problem solving skill and presentation skill have been played the least is as the trainer. This supports the theory of
improved following their self-confidence. ZPD in rendering the scaffolding support via mentoring as
motivator and advisor and less as a trainer.
87
They have also been asked about their competency mentors. This finding indicate the role of mentors mostly as
achievement according to the Information Technology motivator and advisor that is in line with previous result.
Competence model (Fig.4).
Another important finding from the recommendation of
the mentees are that they have needed more support in their
technical skill development. This result is in line with the
above mentioned mentor’s perspective that the mentees have
less programming experience.
Above all, the findings of both the task related results and
mentoring questionnaire indicate that the mentees have
received adequate mentoring support. However, some
amendments are needed in the next round in terms of
considering the individual needs of the mentees. Otherwise,
the blended mentoring support has helped the mentees to
complete their assigned tasks.
V. CONCLUSION
In conclusion, the mentoring process has been a success
based on the results. Nonetheless, the insufficient
programming skills of the students, the mentors have been
able to help the students finishing their programming tasks.
The findings indicate that the mentees are introduced with the
scientific way of working in this mentoring process.
Moreover, the mentees’ have realized their inner
Fig. 4. Information Technology Competency Model [14] improvement in analytical thinking. Skills like this represent
the key competences essential to achieve in the field of
The reported responses show an average group-wise gain of
Computer Engineering.
‘Industry-Wide Technical Competencies’ 37.5%, whereas
Due to the small sample size, the findings can not be
the ‘Workplace’ and ‘Academic’ competencies are
generalized for all the internship program in computer
respectively 61% and 40.5%. Most of the mentee’s about
engineering. Even though, this process of blended mentoring
61.9% have reported their ‘Personal Effectiveness
has been successful reasoned by well-chosen technology.
Competencies’ gain. This result shows altogether the
cognitive, affective and skill development from mentee’s
point of view. In addition, it is according to our objective to ACKNOWLEDGMENT
bring the academic working style closer to the students.
The authors gratefully acknowledge the funding by the
BMBF (tech4comp 16DHB2106).
In this process of mentoring, the mentors’ characteristics
have been one of the crucial criteria that was asked to the REFERENCES
mentees. Among those, the following Tab. I shows the most [1] H. Stoeger, X. Duan, S. Schirner, T. Greindl, and A. Ziegler, “The
significant ones from mentee’s responses. effectiveness of a one-year online mentoring rogram for girls in
stem,” Computers & Education, vol. 69, pp. 408–418, 2013.
TABLE I. MENTEE’S OPINION OF THE MENTORS’ CHARACTERISTICS [2] J. McCarthy, “International design collaboration and mentoring
for tertiary students through facebook,” ustralasian Journal of
Mentor’s Characteristics Opinion in Percentage
Educational Technology, vol. 28, no. 5, 2012.
Approachable 83%
Accessible 50% [3] E. H. Trainer, A. Kalyanasundaram, and J. D. Herbsleb, “E-
Supportive 83% mentoring for software engineering: a socio technical
Encouraging 83% perspective,” in 2017 IEEE/ACM 39th International Conference
Provides Constructive feedback 42% on Software Engineering: Software Engineering Education and
Provides guidance 42% Training Track (ICSE-SEET). IEEE, 2017, pp. 107–116.
Provides timely response 33% [4] A. Ziegler, “Mentoring: Conceptual basics and effectiveness
Provides comprehensive response 33% analysis,”Mentoring: Theoretical Background, empirical
Suggests appropriate resources 50% Findings and Practical Applications, pp. 7–29, 2009.
[5] KD Mattingly, MC Rice and JL Berge, "Learning analytics as a
The mentees have responded towards agreement of the tool for closing the assessment loop in higher education,"
statement shown as a summary in Tab. I. The mentors have Knowledge management & e-learning: An international journal,
been accessible whenever they needed and recommended vol. 4, no. 3, pp. 236-47, 2012.
them supplementary resources as stated by 50% of the [6] G. Crisp, I. Cruz, “Mentoring college students: A critical review
mentees. To 83% of the mentees the mentors have been easily of the literature between 1990 and 2007”, Research in higher
approachable, supportive and encouraging while only 42% of education, vol. 50, no. 6, pp. 525-45, 2009.
[7] L. Akin and J. Hilbun, “E-Mentoring in Three Voices,” Online
them reported that their mentors provide guidance and
Journal of Distance Learning Administration, vol. 10, no. 1,
constructive feedback. Lastly, 33% have responded that they 2007. [8] E. Gleibermann, A Pedagogy of Mentoring, 2014.
have had timely and comprehensive response from their
88
[8] W.M. Murphy,“From e-mentoring to blended mentoring: education,” Mentoring & Tutoring: Partnership in Learning, vol.
increasing students' developmental initiation and mentors' 24, no. 5, pp. 399–414, 2016.
satisfaction“, Academy of Management Learning & [12] “BigBlueButton Foundation”,Jul.12,2010.Accessed on:
Education, vol.10, no. 4, pp. 606-622,2011. Aug.14,2020.[Online].Available:https://bigbluebutton.org/2010/
[9] I.Roll, N.G. Holmes, J. Day, and D. Bonn. "Evaluating 07/12/bigbluebutton-foundation/
metacognitive scaffolding in guided invention [13] “SLACK Features”. Accessed on:
activities", Instructional science vol. 40, no. 4, pp. 691-710, Aug.14,2020.[Online].Available:https://slack.com/intl/en-
2012.
de/features
[10] Y. Liu, J. Xu and B. Weitz,“The Role of Emotional Expression
[14] Employment and Training Administration United States
and Mentoring in Internship Learning”, Academy of Management
Department of Labor, “Information technology competency
Learning & Education, vol.10, no. 1, pp. 94-110, 2011.
model,” September 2012. [Online]. Available:
[11] E. Argente-Linares, M. C. P´erez-L´opez, and C. Ord´o˜nez-
www.careeronestop.org/competencymodel/info documents/it-
Solana,“Practical experience of blended mentoring in higher
industry.pdf
89
The Evaluation of Distance Teaching During
COVID Quarantine at MUST
Tsooj Shambaljamts Delgermaa Senden
Uranchimeg Tudevdagva
Department of Mechanical Science Department of Mechanical Science
Faculty of Computer Science
Mongolian University of Science and Mongolian University of Science and
Chemnitz University of Technology
Technology Technology
Chemnitz, Germany
Ulaanbaatar Mongolia Ulaanbaatar Mongolia
[email protected]
[email protected] [email protected]
90
understanding of evaluation process and a corresponding
analysis [6].
91
data processing. Let us do short analyze on calculated
evaluation scores.
x Main result of the evaluation process is 0.97. This is
very high score and by this value we can conclude
that our unplanned distance teaching run almost
excellent. Because highest possible value is 1 and we
have 0.97.
x Next analyze can focus on key goals. How good we
reached our key goals?
B1 = 0.97
B2 = 0.99
B3 = 0.97
B4 = 0.98
B5 = 0.98
Fig. 4. The online calculator of SURE model By evaluation scores we can summarize that all key
x Step 8. Report of evaluation. The result of goals are reached very positive its target. Highest
evaluation process reported to faculties as feedback values received second key goal. Aim of this sub
of unplanned distance teaching period. goal was identify learning environment of distance
learning. Throughout the semester, Unimis Learning
IV. STATISTICS PROCESSING Management System, Teams 365 software, and FB
social networking systems had been used
A. Short Statistics simultaneously to communicate with our students.
The course "Patent studies" offers each semester for x One more deep analyze can do on sub goals
approximately 280-350 freshmen graduate students from evaluation. In total we had 32 sub goals. There are
all of graduate programs of MUST. distributed not linearly by key goals. The fifth key
goal has most many sub goals: 9, that means we did
B. Respoance Data 9 different activities to reach this key goal. In this
Throughout the semester, 68 students were studied in level we can look to detailed result of sub goals.
my group. The checklist was send to all learners. After the Worst evaluation value got sub goal A59. This sub
final exam, approximately 41 students have responded to goal was focused on the Lecturer responsible for
all questions within a week via Google form. distance learning. 30% of total students were
accepted lecturer is not so important the distance
C. Processed Data learning.
Collected data processed by online calculator of SURE
model [7]. Figure 4 shows basic window of online VI. CONCLUSION
calculator. Evaluator should put collected data in CSV The aim of this evaluation was to measure result of
format into the edit field. The online calculator computes distance teaching and learning methodology. The main
all evaluation scores and return results in table (Fig. 5). evaluation score calculated as 0.97. This score shows that
unplanned distance teaching run sacksful in this semester.
All 32 sub goals are evaluated bigger than 70%, means
satisfaction of students are very positive. It gives many
power to faculty to keep and continue distance and online
teaching for our courses.
While the results of the evaluation surveys and the
mean responses of the key goals were obtained from 60%
of total students, it is clear that distance teaching was
significantly influenced students’ ability to learn online
and self-study and digital learning skills. The improvement
confirms the fact that students were adapted online
learning methodology and, thus, learn the self-study by
doing.
In the end we would like to add that to this structure
oriented evaluation checklist we added two open ended
Fig. 5. Part of result screen of online calculator. questions. “What are some ways to increase student
engagement? " and “ What are the first thing you would
like to improve in connection with the lesson?”. We
V. SHORT ANALYZE ON EVALUATION RESULT received interesting different response to these two
questions and actually we are working on reflection and
analyze on those questions. We plan to include analyze and
The advantage of the SURE model is evaluator can comparison of results in our next work.
receive many evaluation scores from evaluation table after
92
REFERENCES [5] U.Tudevdagva, “Structure Oriented Evaluation Model for E-
Learning”, Wissenschaftliche Schriftenreihe Eingebettete
[1] Delgermaa S. "Opportunity to organize a workshop on “Theoretical Selbstorganisierende Systeme, Universitätsverlag Chemnitz, July
mechanics” using “Case study” technology", ICE 2012. 114 p. 2014. pp. 123. ISBN: 978-3-944640-20-4, ISSN: 2196-3932.
Deajeon, Korea, ''Proceedings of The International Conference on
Engineering'' [6] U.Tudevdagva, & W.Hardt, “A new evaluation model for e-
learning programs”, Technical Report CSR-11-03, Chemnitz
[2] Delgermaa S., Tsogzolmaa D. "Study of Opportunity to Check Out University of Technology.
the Student’s attendance Online", ICKI 2011. 349 p, Ulaanbaatar,
Mongolia, ''Proceedings of International Conference on knowledge [7] U.Tudevdagva, “Structure-Oriented Evaluation An Evaluation
Based Industry'' Approach for Complex Processes and Systems”, Gewerbestrasse
11, 6330 Cham, Switzerland, Springer, 2020, pp.92, ISBN 978-3-
[3] Batbayar D., Delgermaa S., Tsooj. "Evaluating the quality of core 030-44805-9 ISBN 978-3-030-44806-6 (eBook),
courses of Mechanical engineering program" National conference https://doi.org/10.1007/978-3-030-44806-6.
on Outcome based education 2019. pp 105. Ulaanbaatar,
Mongolia [8] Online calculator of the SURE mpdel,
http://uranchimeg.com/sure/eva.php
[4] Ganbat D, Delgermaa S “Some experiences of using ICT in
active learning” ISCSET 2017. Berlin, pp 104-110
93