-
Bridging the AI Adoption Gap: Designing an Interactive Pedagogical Agent for Higher Education Instructors
Authors:
Si Chen,
Reid Metoyer,
Khiem Le,
Adam Acunin,
Izzy Molnar,
Alex Ambrose,
James Lang,
Nitesh Chawla,
Ronald Metoyer
Abstract:
Instructors play a pivotal role in integrating AI into education, yet their adoption of AI-powered tools remains inconsistent. Despite this, limited research explores how to design AI tools that support broader instructor adoption. This study applies a human-centered design approach, incorporating qualitative methods, to investigate the design of interactive pedagogical agents that provide instruc…
▽ More
Instructors play a pivotal role in integrating AI into education, yet their adoption of AI-powered tools remains inconsistent. Despite this, limited research explores how to design AI tools that support broader instructor adoption. This study applies a human-centered design approach, incorporating qualitative methods, to investigate the design of interactive pedagogical agents that provide instructional suggestions in response to instructors' questions. We conducted a formative study involving interviews with five pedagogy experts to examine existing strategies for supporting instructors' pedagogical needs. Building on these insights, we facilitated a participatory design session with ten pedagogy experts, where participants reviewed a storyboard depicting a chatbot designed for instructors with varying levels of AI literacy and differing attitudes toward AI. Experts also evaluated the quality of LLM-generated suggestions based on common teaching challenges. Our findings highlight the need for chatbot interactions that foster trust, especially for AI-conservative instructors. Experts emphasized the importance of social transparency (for example, showing how peers use the tool) and allowing instructors to flexibly control how much or how little they engage with the system. We also propose design recommendations to enhance the quality of AI-generated teaching suggestions, such as adapting them to reflect instructors' prior teaching experience. This work underscores the urgent need to support AI-conservative instructors, as AI literacy and attitudes are closely intertwined. Without thoughtful design, there is a risk of widening pedagogical divides and reducing students' learning opportunities.
△ Less
Submitted 6 March, 2025;
originally announced March 2025.
-
Radiative Transfer Simulations of Ly$α$ Intensity Mapping During Cosmic Reionization Including Sources from Galaxies and the Intergalactic Medium
Authors:
Abigail E. Ambrose,
Eli Visbal,
Mihir Kulkarni,
Matthew McQuinn
Abstract:
We present new simulations of Lyman-$α$ (Ly$α$) intensity maps that include Ly$α$ radiative transfer in the intergalactic medium (IGM) and all significant sources of Ly$α$ photons. The sources considered include Ly$α$ directly from galaxies, cooling at the edges of ionized bubbles, recombinations within these bubbles, and reprocessing of galaxy continuum emission in the IGM. We also vary astrophys…
▽ More
We present new simulations of Lyman-$α$ (Ly$α$) intensity maps that include Ly$α$ radiative transfer in the intergalactic medium (IGM) and all significant sources of Ly$α$ photons. The sources considered include Ly$α$ directly from galaxies, cooling at the edges of ionized bubbles, recombinations within these bubbles, and reprocessing of galaxy continuum emission in the IGM. We also vary astrophysical parameters including the average neutral fraction of the IGM, the dust absorption of Ly$α$ in galaxies, and the ionizing escape fraction. Previous work has suggested that Ly$α$ intensity mapping can be used to constrain the neutral fraction of the IGM when accounting for radiative transfer in the IGM. When radiative transfer is ignored, direct Ly$α$ emission from galaxies has the highest amplitude of power on all scales. When we include radiative transfer in our simulations, we find continuum emission reprocessed as Ly$α$ is comparable to the Ly$α$ emission directly from galaxies on large scales. For high neutral fraction in the IGM, emission from recombinations is comparable to galaxies on large scales. We find that the slope of the power spectrum is sensitive to the neutral fraction of the IGM when radiative transfer is included, suggesting that this may be useful for placing constraints on cosmic reionization. In addition, we find the power of galaxies is decreased across all scales due to dust absorption. We also find the escape fraction must be large for recombinations and bubble edges to contribute significantly to the power. We find the cross power is observable between SPHEREx Ly$α$ intensity maps and a hypothetical galaxy survey is observable with a total signal-to-noise of 4 from $k = 0.035$ Mpc$^{-1}$ to $k = 1$ Mpc$^{-1}$.
△ Less
Submitted 16 June, 2025; v1 submitted 25 February, 2025;
originally announced February 2025.
-
SecureD: A Secure Dual Core Embedded Processor
Authors:
Roshan G. Ragel,
Jude A. Ambrose,
Sri Parameswaran
Abstract:
Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-injec…
▽ More
Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-injection and power analysis attacks. In the past, a number of countermeasures, both hardware- and software-based, were proposed individually against these two types of attacks. However, no single system exists to counter both of these two prominent attacks in a processor based embedded system. Therefore, this paper, for the first time, proposes a hardware/software based countermeasure against both code-injection attacks and power analysis based side-channel attacks in a dual core embedded system. The proposed processor, named SecureD, has an area overhead of just 3.80% and an average runtime increase of 20.0% when compared to a standard dual processing system. The overhead were measured using a set of industry standard application benchmarks, with two encryption and five other programs.
△ Less
Submitted 5 November, 2015;
originally announced November 2015.
-
Instruction-set Selection for Multi-application based ASIP Design: An Instruction-level Study
Authors:
R. G. Ragel,
Swarnalatha Radhakrishnan,
Angelo Ambrose
Abstract:
Efficiency in embedded systems is paramount to achieve high performance while consuming less area and power. Processors in embedded systems have to be designed carefully to achieve such design constraints. Application Specific Instruction set Processors (ASIPs) exploit the nature of applications to design an optimal instruction set. Despite being not general to execute any application, ASIPs are h…
▽ More
Efficiency in embedded systems is paramount to achieve high performance while consuming less area and power. Processors in embedded systems have to be designed carefully to achieve such design constraints. Application Specific Instruction set Processors (ASIPs) exploit the nature of applications to design an optimal instruction set. Despite being not general to execute any application, ASIPs are highly preferred in the embedded systems industry where the devices are produced to satisfy a certain type of application domain/s (either intra-domain or inter-domain). Typically, ASIPs are designed from a base-processor and functionalities are added for applications. This paper studies the multi-application ASIPs and their instruction sets, extensively analysing the instructions for inter-domain and intra-domain designs. Metrics analysed are the reusable instructions and the extra cost to add a certain application. A wide range of applications from various application benchmarks (MiBench, MediaBench and SPEC2006) and domains are analysed for two different architectures (ARM-Thumb and PISA). Our study shows that the intra-domain applications contain larger number of common instructions, whereas the inter-domain applications have very less common instructions, regardless of the architecture (and therefore the ISA).
△ Less
Submitted 28 March, 2014;
originally announced March 2014.