The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hybrid forms of simulation using `serious games' are a growing part of healthcare education. OpenLabyrinth is an open source toolset that allows its users to create, run and analyze a wide range of different pathway-based educational activities.
Non-text user generated content (UGC), such as videos and images, is usually searched by metadata. Metadata, such as title, tags, and description, is created by users whenever content is uploaded. However, in many cases metadata can have multiple meanings. This requires users to spend time sifting through a long list of search results until they can find all the content for which they were actually...
Studying eye movement has proven to be useful in the study of users and interfaces. Cognitive processing can be inferred by the length of time a user fixates on certain elements of the screen as well as the number of fixations on each element of the display. Our research looks to expand on this with the addition of neurophysiological measurements to quantify cognitive processing and ascertain whether...
Probabilistic modal logic has been used for knowledge management and especially for managing uncertain knowledge. In this paper the logical roots of probabilistic modal logic is analyzed. It is shown that probabilistic modal logic has its roots in a qualitative view of probability. It has been discussed the necessary conditions that such a qualitative relation should have in order to construct a probability...
Text based pictures called text art are often used in Web pages, email text and so on. They enrich expression in text data, but they can be noise for handling the text data. For example, they can be obstacle for text-to-speech software and natural language processing. Text art extraction methods, which detects the area of text art in a given text data, help to solve such problems. Previously proposed...
The mining of sequential patterns has been studied for several years, however, to our best knowledge, no study has considered the mining of sequential association rules despite such rules also providing valuable knowledge about many real applications. The sequential association rule represent that a set of items usually occur after a specific order sequence. In this paper, the concept of sequential...
Community Coordinated Multimedia (CCM) empowers users' experiences through providing services of multimedia aggregation, delivery, sharing, and viewing within a community via the Internet. This paper approaches the CCM paradigm a step by designing and developing Digital Movie Guide (DMG) service for enhancing user's viewing experience. The DMG service prototype is implemented and demonstrated.
As touch-screen mobile phones pour into the market, demands for reusing existing mobile applications by adding a touch-screen UI are increasing. Up until this point, the method of defining a single screen keyboard and redirecting touch inputs to key inputs was used. However, this method diminishes the efficiency of touch-screens because a fixed-layout is applied to every application even though different...
A typical software system comprises of several crosscutting concerns (also known as aspects). Code tangling and scattering are two difficulties that occur in current software implementation methodologies which affect software design and development in many ways like, poor traceability, lower productivity, less code reuse and poor code quality. Aspect Oriented Programming (AOP), which allows for modularizing...
Information and Communication Technologies (ICT) have revolutionized the world by facilitating remote learning and education, far distanced social connection, online employment opportunities and marketing products and services online. These and many more benefits leveraged the opportunities for governments to provide integrated services across their internal departments and to citizens. This paper...
Funded as part of the `Network-Enabled Platforms' program, the Health Services Virtual Organization (HSVO) Project has developed a network-enabled platform (NEP) consisting of a messaging specification, a collection of devices, a bus interface architecture and a middleware hub (SAVOIR) that can support the authoring execution and tracking of multiple independent and integrated simulation activities...
High-order functions are the sole elements in a class of recursive functions. The functions are related to each other through application, i.e., applying a function to an argument yields a value where the argument and the value are also functions. Through Froglingo, a language that exactly takes advantage of high-order functions and their properties, we introduce the method of representing business...
In wireless sensor networks (WSNs) the position information of individual nodes is a matter of vital importance because allows the implementation of necessary network functions such as routing, querying and other applications. The objective of this paper is to propose an algorithm of three-dimensional distributed range-free localization for WSNs, using an unmanned aerial vehicle (UAV) equipped with...
The Kernel Support Vector Machine (KSVM) is a powerful nonlinear classification methodology where, the Support Vectors (SVs) fully describe the decision surface by incorporating local information in the Kernel space. On the other hand, the Kernel Fisher Discriminant(KFD) is a non-linear classifier which has proven to be powerful and competitive to several state-of-the-art classifiers. This paper proposes...
This paper presents the findings of the second of two empirical studies conducted in Saudi Arabia. The first highlighted the key factors influencing the adoption by customers of e-commerce in developing countries from their own perspective. This second study covers the suppliers' perspective on factors raised by those consumers. Many issues were highlighted by the first study about consumers' perspectives...
In this paper, we discuss the use of digital circuits in decision support systems. For this, it is first necessary to translate the descriptions of situations and conclusions which are discovered step by step into a suitable Predicate Calculus. Then, a digital implementation for the constructs of Predicate Calculus must be found. So, the main issue is the realization of logically correct inference...
Grid networks take advantage of the resources available by many computers connected within the network to solve large-scale computational problems. To achieve a scalable and reliable Grid network system, the workload needs to be efficiently distributed among the computing resources accessible on the network. Therefore, a distributed and scalable load-balancing scheme for Grid Networks is proposed...
Business Intelligence (BI) market trend is hot for the past few years. According to the results from the Gartner Research 2009, Business Intelligence's market is ranked top of ranking in Business and Technology Priorities in 2009. CMM can be applied into various disciplines such as software field, engineering field or IT field. However, there is limited research of CMM that applied in Enterprise Business...
Hierarchies are very popular in organizing documents and web pages, hence automated hierarchical classification techniques are desired. However, the current dominant hierarchical approach of top-down method suffers accuracy decrease compared with flat classification approaches, because of error propagation and bottom nodes' data sparsity. In this paper we flatten hierarchies to relieve such accuracy...
Availability and reliability from information systems have been threatened by intrusions and Unwanted Internet Traffic (UIT). To protect systems from UIT, it is desirable developing techniques that detect and forecast UIT. Intending to improve intrusion detection, in our earlier work we proposed an approach to cope with UIT in a proactive manner, using forecasting techniques combined with Return on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.