The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose a model to represent and manage affective / emotional feedback. This model represents a set of emotions which is assumed to play a major role for learning processes. The emotions are to be identified during the learning phase. To achieve these objectives, we have considered primarily: i) Methods and techniques to assess and identify affectivity/emotivity in ITS (Intelligent...
Agent-based systems are deployed in distributed data and control environments where resources usage are claimed to be more efficient. Researches have shown that intelligent agents offer excellent performance in distributed environments influenced by their autonomous or semi-autonomous actions with minimal human intervention. Assigned with roles, these agents are thus viewed as human-like societies...
Traditionally software development is concerned with the computer as the sole computational agent. Here both the environment and problem are well understood and thus the emphasis is on the abstract specification. However, there is an increasing awareness of the central importance of sense-making activities throughout the software lifecycle. For this, flexible modeling tools are needed to address the...
Computers are not merely data-processing devices. They are an unlimited vast world that enables virtual life. This paper maintains that humans are paradoxical beings who want private and secret life on one hand, and make their thoughts and actions public and open on the other hand. Coining the notion of the Privacy-Openness (PO) game that humans play, this paper reveals that such paradoxical desire...
This study investigated students' experiences in two types of instructional strategies (i.e., fully-guided and partially guided) and their learning experience patterns from the beginning towards the end of the computer-based interactions. An empirical study was performed on 41 students from a public university in Malaysia using two types of computer-based systems for learning Basic Computer Networks...
The design of automated online security and intrusion tolerance solutions for computer systems and networks is a theoretically achievable objective. However, after two decades of research, this objective has still not yet successfully passed the practicality test to become widely adopted. We believe that the main reason behind this gap lies in the misleading definition of autonomous security that...
Natural selection acts as a culling force that favors highly fit organisms. There are numerous examples ranging from bacteria through humans showing fitness can sometimes improve if individuals cooperate. Yet despite the widespread evidence of cooperation throughout nature, we still do not fully understand how it evolves. Over the past 10–15 years a large number of theoretical (computer) models have...
Safety supervisory systems continue to increase in degree of automation and complexity as operators are decreasing. As a result, each operator must be able to comprehend and respond to an ever increasing amount of available risky status and alert information. They generally have no difficulty in performing their tasks physically but they are stressed by the task of understanding what is going on in...
This paper presents the conceptual and architectural design of a multilayered framework aiming to provide a two handed gesture based visual interactive 3D object oriented environment for software development. We argue that this is a viable, intuitive and attractive approach for software development facilitating natural human computer interaction, thus supporting tasks related to software development...
Ranking of fuzzy numbers is an important procedure for many applications in fuzzy theory, in particular, decision-making. In this paper, we propose a new method for ranking fuzzy numbers based on Dice set theoretic index. The Hurwicz criterion which considers all types of decision makers' perspective is employed in aggregating the fuzzy total evidences. The properties of the proposed method are also...
Advertising on the Internet is a key factor for the success of several businesses nowadays. The Internet has evolved to a point where it has become possible to develop a business model completely based on Web advertising, which is important for the consolidation of such a model and the continuity of the Internet itself. However, it is often observed that some content publishers are dishonest and employ...
There are many arguments for and against the use of autonomous-agents in intelligent environments. Some researchers maintain that it is of utmost importance to give complete control to users, and hence greatly restrict autonomy of agents, whereas, others believe that is it preferable to increase user convenience by allowing agents to operate autonomously on the user's behalf. While both of these approaches...
There are millions of people that regularly play Go in many countries around the world. Played by two players, Black and White, the stones of their colors are placed consecutively on an empty intersection of a square grid. In order to support beginners of Go to enjoy and concentrate on the game, this paper proposes a fuzzy markup language (FML)-based emotional expression system and applies it to computer...
Most of the systems for generating taste sensations are based on blending different chemicals appropriately, and there are less proven approaches to stimulate the sense of taste digitally. In this paper, a method to digitally stimulate the sense of taste is introduced and demonstrated based on electrical and thermal stimulation on human tongue. Thus, two digital control systems are presented to control...
This paper introduces Avatar CAPTCHA, an image based approach to distinguish human users from computer programs (bots). The proposed CAPTCHA asks users to identify avatar faces from a set of 12 grayscale images comprised of a mix of human and avatar faces. Experimental results indicate that it can be solved 62% of the time by human users with an average success time of 24 seconds and a positive user...
One of the major subjects of study in computational biology is finding the similarity between DNA sequences. Several techniques exist that are either based on alignment between sequences or are alignment-free. This paper demonstrates two techniques that are alignment-free. The first one is based on a graphical representation of the difference between DNA sequences, while the other one is based on...
Currently, most authentication system requires users to answer the CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Human Apart) before gaining the system access. CAPTCHA is a standard security technology for distinguish between human and computer program automatically. The problem of using CAPTCHA is the difficulty of reading the text-based presentation, or interpreting the image-based...
Contemporary web browsers do not provide customized recommendations for the users; rather than some suggestions based on cookies or browsing history after content filtering. Usually, most of the users provide some key words to search the contents inside their preferred websites and based on these key words web servers provide the contents. So, it would be an interesting and important idea to provide...
Distance calculation is always one of the most important goals in a digital stereoscopic vision system. In an AER system this goal is very important too, but it cannot be calculated as accurately as we would like. This demonstration shows a first approximation in this field, using a disparity algorithm between both retinas. The system can make a distance approach about a moving object, more specifically,...
Web security has become a critical and challenging issue due to the growth of Internet. BOT is one of the most malicious threats to the web services. It runs automated tasks over the internet and creates problem. One solution for securing web from BOT is to develop CAPTCHA. CAPTCHA is acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. CAPTCHA may be textual or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.