The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The life-science and health care research environments offer an abundance of new opportunities for improvement of their efficiency and productivity using big data in collaborative research processes. A key component of this development is e-Science analytics, which is typically supported by Cloud computing nowadays. However, the state-of-the-art Cloud technology does not provide an appropriate support...
Constant changes are inherent to information technology, the proof of which can be found in many challenges, such as the business sector's cloud computing. Because of the recent economic and financial crisis companies are forced to provide as best results as possible with the least amount of costs. The main issue of cloud computing are the computer resources (i.e. compute power). Due to their less...
The aim of the study is to develop tools of increasing a problem solving reliability in a heterogeneous distributed computing environment by applying a diagnostics of computing resources components and using an analysis of problem solving schemes. A scheme (a plan) is an abstract program for a problem solving. A special attention is paid to the calculation of a problem solving scheme reliability on...
Data Mining is the process of identifying new patterns, insights in data and knowledge discovery, and is at the intersection of multiple research areas, including Machine Learning, Statistics, Pattern Recognition, Databases, and Visualization. With the maturity of databases and constant improvements in computational speed, data mining algorithms that were too expensive to execute are now within reach...
Croatian curriculum reform started in February 2015 as one of measures in Strategy for education, science and technology. During first phase of curriculum reform 55 documents were created — for all levels of pre-tertiary education, all subjects, cross curricular topics and frameworks for assessment, special education and gifted education. One of subject curriculum document is for subject Informatics...
This paper presents results of the research of students at the Faculty of humanities and social sciences in Zagreb, Croatia about their attitudes and perceptions of digital scientific information landscape. The results of the research show that use of digital scientific information resources including use of open access information resources has become a constant activity among students in their daily...
Tremendous progress in semiconductor technology enabled broad proliferation of computer-based solutions in almost all fields, from medical instrumentation up to spacecraft technology. This development opened the question about a new engineering profile being able to act in research and development of embedded systems. In this paper a contribution to the structuring of undergraduate embedded engineering...
In today's modern education, distance learning methods and tools provide an effective way to offer instructions remotely, particularly when instructions in person cannot be provided. Delivering technology-rich courses that engage students in different group activities such as working on group projects, as well as laboratory and in-class exercises, create new challenges that need to be addressed. This...
Modern programming paradigms have brought many different challenges for visually impaired programmers. Graphical interfaces have become one of the biggest obstacles for visually impaired programming professionals. The same problems that relate to visually impaired programmers also apply to programming education in which it is very challenging to make educational interfaces accessible for visually...
By going digital photography becomes very popular in general and more and more special photography courses are introduced at Croatian schools of applied arts and design. In this article different computer programs for optimizing photographs, which are actually used in class, will be presented and their advantages and eventual disadvantages will be discussed and statistically evaluated by using average...
The development of e-learning in higher education institutions depends on teachers' adoption and their levels of acceptance of e-learning technologies in the teaching process. Understanding the factors that influence teachers' intention to use e-learning technologies may help explain the barriers to their adoption of e-learning in hybrid environments. This paper investigates the relationship between...
Technology enhanced education has been recently established as a new approach for all stages of education in developing countries, especially in Macedonia. Although computer games are often given little attention we believe that within the vast amount of technologies and instruments used to achieve the needed improvements it is computer games that are playing the central role in delivering the desired...
Since the delivery of the first A320 airliner with a Fly-by-Wire Flight Control System (FCS) in 1988, aircraft avionics architecture evolved significantly. Federated Architecture applied in the A320 family of aircraft presumed one computer per function. Limits regarding weight and space availability were reached and new generation of aircraft designed in early 2000s were equipped with Distributed...
This study utilizes a simple model for constructing sensor nodes — master controller combinations in the Internet of Things. The model combines hardware and software for embedded systems which measure a predefined set of parameters. The master controller manages several sensor nodes, collects data from them and provides data for clients. The paper introduces a proof-of-concept implementation based...
In this paper, we present a survey of different CAPTCHA types. Then we address the problem of the CAPTCHA userability. In the experiment, the Internet user response to solve different types of CAPTCHA is tested. The obtained results are given and statistically processed. They are discussed leading to the conclusion different types of CAPTCHA usability and suitability for Internet users.
Large-scale multi-agent systems (LSMAS) development methods are becoming a necessity in a world of ever growing numbers of computer agents incorporated in various devices and services used by people in all areas of life. Organization in such large-scale systems, becomes therefore a very relevant concept in research on LSMAS, as the mentioned agents are expected to cooperate, compete, and share information,...
Aim of this research was to examine familiarity of students in Croatia with threats in form of social engineering and phishing attacks. To obtain our research data, a practical assessment of student's capabilities to identify phishing attacks against them was conducted with the help of a graphical questionnaire that presented real phishing messages that tried to identify what kind of scams or attacks...
Despite being the most widely used method of authentication, passwords still pose a significant threat to an information system's security. This threat is mostly attributed to the human factor, as users tend to select passwords that are easy to remember, but are not resilient to brute force or dictionary attacks. Worse yet, when not prompted to change their passwords on a regular basis the users tend...
Measuring strength of passwords is important in order to ensure the security of password-based authentication. Since passwords are still the most widely used method for authentication, there has been a considerable research on passwords and password strength. Yet, studies related to password still lack of access to plaintext passwords that are created under a specific password policy. Our research...
Acquisition of volatile data for further forensic analysis still represents a challenge to both practitioners and researchers. The current tools used for acquisition of such data are focused exclusively on a way to capture content. However, the development of forensic science, in particular in the area of digital evidence in terms of the admissibility in court, has introduced additional elements to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.