Zoekresultaten
- LLM_use_cases.pdf (808.55 kB, PDF)… 5 2. Use cases ................................................................................................................................... 6 FHML LLM for interactive workshop and PBL activities ..................................................................................... 6 FPN LLM as peacekeeping … decide which approaches fit your education, with these suggestions offering a range of strategies to enhance student learning with or without AI. 2. Use cases The process “Microsoft Copilot (Creative Mode; GPT-4) was used to design activities for workshop directed at staff. But prompt is general and could also be used by students to create workshops/facilitations in a PBL setting.” Other relevant information: Prompt used (For GPT-4 (turbo), Gemini Advanced, Claude 3; Less advanced models won’t … article evaluation LLM for article evaluation LLM for article evaluation LLM for article evaluation LLM for article evaluation LLM for article evaluation 13 ILOs TLAs Assessment Tutorial-level ILOs (only applicable to AI): - Explain the possible risks online media and AI entail for information literacy - Evaluate various sources of information using information literacy tools - Describe and explain the issues with AI when using it in a research context Using GenAI (i.e. ChatGPT 3.5 and Google Bard) …
- LLM_updated_0.pdf (808.55 kB, PDF)… 5 2. Use cases ................................................................................................................................... 6 FHML LLM for interactive workshop and PBL activities ..................................................................................... 6 FPN LLM as peacekeeping … decide which approaches fit your education, with these suggestions offering a range of strategies to enhance student learning with or without AI. 2. Use cases The process “Microsoft Copilot (Creative Mode; GPT-4) was used to design activities for workshop directed at staff. But prompt is general and could also be used by students to create workshops/facilitations in a PBL setting.” Other relevant information: Prompt used (For GPT-4 (turbo), Gemini Advanced, Claude 3; Less advanced models won’t … article evaluation LLM for article evaluation LLM for article evaluation LLM for article evaluation LLM for article evaluation LLM for article evaluation 13 ILOs TLAs Assessment Tutorial-level ILOs (only applicable to AI): - Explain the possible risks online media and AI entail for information literacy - Evaluate various sources of information using information literacy tools - Describe and explain the issues with AI when using it in a research context Using GenAI (i.e. ChatGPT 3.5 and Google Bard) …
- fse-dsai-curriculum-2020-2021.pdf (185.11 kB, PDF)… Science & Knowledge Engineering Introduction to Image & Video Processing Full course description Image and video processing is everywhere around us, in smartphones, robotics, medicine, security systems, microscopy, remote sensing, video games, travel, shopping, environmental management and many other applications. Image and video processing is based on principles of signal processing, extended to multiple dimensions. In this class students will have a short introduction to basic 2D signals and … of human language and machine learning. How can computers acquire, understand and produce language? How can computational methods give us insight into observed human language phenomena? How to make sense of the vast amounts of information available online in free, unstructured form? In this course students will learn how computers can learn useful text/language representations and how different tasks (language modeling, text classification, information extraction, sequence labeling, etc.) can be … become mandatory in the commercial world, coupled with the increased frequency of security incidents, organizations now recognize the need for a comprehensive security strategy. The course will introduce a wide range of topics in computer security and online privacy. The main objective of the course is to cultivate a security mindset by https://www.maastrichtuniversity.nl/rico.mockel https://www.maastrichtuniversity.nl/meta/390674/dke-honours-programme-kework-2-2?print=1 …
- amnesty_io_rapport-verkrachting-studenten-def.pdf (915.61 kB, PDF)… (MOA), maakt deel uit van de Research Keurmerk Groep en onderschrijft de internationale ICC/ESOMAR-gedragscode voor markt- en sociaalwetenschappelijk onderzoek. I&O Research is ISO 9001-, ISO 20252- en ISO 27001- gecertificeerd. Het online onderzoekspanel (I&O Research Panel) is ISO 20252-Annex A gecertificeerd. Dit is de norm voor online en offline access panels. Studenten over verkrachting 13 van 54 Uitnodiging bij en introductie van het onderzoek Respondenten kregen de volgende tekst als uitnodiging: Momenteel voeren wij een onderzoek uit in opdracht van Amnesty Nederland over … die ze net hebben ontmoet (op een feestje, 26%; op een date, 21%). Bij elf procent van de studenten die tijdens hun studententijd penetratie zonder instemming meemaakten, gebeurde dit door een onbekende. Drie procent gebeurde dit door iemand die ze online leerden kennen maar nog niet in het echt hadden gezien. Figuur 23 – Relatie met degene met wie de seksuele penetratie plaatsvond “Zou je kunnen aangeven wie diegene was of waren? Meerdere antwoorden mogelijk.Als het om verschillende …
- aup-employees-um-v2.0-en.pdf (975.39 kB, PDF)… personal data from the Institution on the Internet if it is part of their regular work and has been tested for compliance with the GDPR. 5.3. The following use of the Internet, except for specific, job-related tasks, is prohibited in any case: visiting sites that contain pornographic, racist, discriminatory, abusive or offensive material; using file-sharing or streaming services (e.g., Internet radio or video on demand) that generate excessive data traffic to the extent that it may affect …
- Fem Year Report 23-24_final.pdf (671.02 kB, PDF)… Mathematics, Athena’s Angels, Mothers in Science) who share a similar vision. To realise the goals described above, FEM has delineated five thematic pillars which have been the basis of our activities since 2018: ● Training FEM organises tailored workshops that: (i) build academic skills and leadership qualities; (ii) strengthen communication and promotion (e.g. negotiation skills) and (iii) raise awareness of behaviour-related topics, e.g. implicit bias, bystander intervention techniques. ● … the shadow negotiation. We delve into the moves and turns and the persuasion tactics you may be confronted with during a negotiation. Knowing, and dealing with, your sensitivities that may trigger you in ineffective responses is also part of this workshop. This workshop is a mix of theory, negotiation exercises, video fragments and exchanging experiences and strategies. Bridging the communication gap Within Maastricht University you are expected to work with people from all over the globe. In … Contact FEM would be happy to discuss any of the issues raised in our report in more detail. Any questions or suggestions for any of our activities should be directed to fem@maastrichtuniversity.nl. For more information regarding our activities please visit the FEM website and the FEM social media accounts. X: @FEMMaastricht Facebook: @FEMMaastricht LinkedIn: @FEM Maastricht University Instagram: @fem_maastricht mailto:fem@maastrichtuniversity.nl …
- roa_f_2021_1_factsheet_um.pdf (301.84 kB, PDF)… and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page …
- H1TEVREG_0.pdf (754.25 kB, PDF)… and expiration), signatures, stamps, and visas. National identity cards are not acceptable, as they often lack the required details. The passport should bear your signature and be valid until at least 6 months after your program starts. If you have visited the Netherlands in the past 3 years, all pages of your passport are required. In that case, make sure that the page with the most recent exit stamp from The Netherlands or another Schengen country is legible. Required document: A copy of all …
- F1EUREFREG.pdf (682.15 kB, PDF)… and expiration), signatures, stamps, and visas. National identity cards are not acceptable, as they often lack the required details. The passport should bear your signature and be valid until at least 6 months after your program starts. If you have visited the Netherlands in the past 3 years, all pages of your passport are required. In that case, make sure that the page with the most recent exit stamp from The Netherlands or another Schengen country is legible. Required document: A copy of all …
- F3EUREFPREP_0.pdf (631.34 kB, PDF)… and expiration), signatures, stamps, and visas. National identity cards are not acceptable, as they often lack the required details. The passport should bear your signature and be valid until at least 6 months after your program starts. If you have visited the Netherlands in the past 3 years, all pages of your passport are required. In that case, make sure that the page with the most recent exit stamp from The Netherlands or another Schengen country is legible. Required document: A copy of all …