Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, a novel handmade clicker and its analysis software are proposed to support active learning. The proposed clicker can offer not only simple assembling but also low cost, because the proposed clicker consists of only nine circuit components. In the proposed analysis software, student's answers are stored in a teacher's computer by an Excel VBA program. By utilizing the learning results,...
Planning of current and future mobile networks is becoming increasingly complex due to the heterogeneity of deployments, which feature not only macrocells, but also an underlying layer of small cells whose deployment is not fully under the control of the operator. In this paper, we focus on selecting the most appropriate Quality of Service (QoS) prediction techniques for assisting network operators...
This paper analyzes the most useful and popular classification algorithms used by the Machine Learning systems, particularly in the artificial intelligent systems. It is focused on the practical applying of classification algorithms, in all three different dataset used throughout this paper. The results of the paper show which algorithm is more convenient for a particular dataset. The common analysis...
This article discusses the factors which prevent secondary school teachers from using Information and Communication Technology (ICT) during their teaching of Mathematics in schools. Five factors have been identified based on literature reviews; 1) Self-confidence, 2) Time constraint, 3) Programs and training, 4) Facilities and resources, 5) Teachers' self-perception and attitude. A set of questionnaire...
This paper concerns with designing a wearable system for prosopagnosia rehabilitation. The system performs a real-time face recognition application that runs on an autonomous embedded platform built on an eyewear. The prototype involves a single system-on-module such as Raspberry Pi Compute Module and the Raspberry Pi Camera attached to a custom designed PCB with HDMI output, power supply input, Raspberry...
The development of computer based systems expands the usage of computer based application in human life. It can be observed that illegal activities such as unauthorized data access, data theft, data modification and various other intrusion activities are rapidly growing during last decade. Hence, deployment and continuous improvement of Intrusion Detection Systems (IDS) are of paramount importance...
This paper proposes an effective training image partitioning technique for vector quantization (VQ) of two-dimensional RGB images. Unlike existing techniques, this method uses hexagonal blocks instead of the traditional rectangular ones, to partition the image. This results in higher image quality and lower perceptual artifacts. Experimentally, for similar compression rates, the use of hexagonal instead...
Malware is a computer program or a piece of software that is designed to penetrate and detriment computers without owner's permission. There are different malware types such as viruses, rootkits, keyloggers, worms, trojans, spywares, ransomware, backdoors, bots, logic bomb, etc. Volume, Variant and speed of propagation of malwares are increasing every year. Antivirus companies are receiving thousands...
Integrating technology in pedagogy is a step for ICT capacity building for higher education to meet its current demands. Therefore, the integration of eLearning systems has been problematic, albeit huge investments in ICT infrastructure. This study investigates teacher adoption of a new upgraded eLearning platform being integrated at University of Rwanda. A six-constructs model related to technology...
The development of e-learning in higher education institutions depends on teachers' adoption and their levels of acceptance of e-learning technologies in the teaching process. Understanding the factors that influence teachers' intention to use e-learning technologies may help explain the barriers to their adoption of e-learning in hybrid environments. This paper investigates the relationship between...
Electronic learning (e-learning) in the health care sector is viewed as the delivery of Continued Professional Development (CPD) material via electronic media such videoconferencing, DVDs, Smartphones and other media. E-learning is recognized as one of the most important supportive practice for learning at work. Thus, an e-learning program allows the busy health care workers to access training and...
Can people use text-entry based brain-computer interface (BCI) systems and start a free spelling mode without any calibration session? Brain activities differ largely across people and across sessions for the same user. Thus, how can the text-entry system classify the desired character among the other characters in the P300-based BCI speller matrix? In this paper, we introduce a new unsupervised classifier...
Automated analysis is useful in anti-malware research because it helps deal with large collections of samples and reduces the human effort. This paper describes an automated system that performs dynamic analysis by running new samples in a controlled environment and analyzing the operations they perform on the filesystem. These operations are used to train a Support Vector Machine classifier that...
The paper presents the results of a comparative study performed between two computational intelligence techniques, artificial neural networks (ANNs) and adaptive neuro-fuzzy inference systems (ANFIS) applied to particulate matter (fraction PM2.5) air pollution forecasting. The experiments were realized on datasets from the Airbase databases with PM2.5 hourly measurements. The main statistical parameters...
This paper proposes a new system of categorization and classification using data mining techniques based on certain criteria/topics. We describe the design and implementation of proposed system that automatically categorizes a restaurant as being good or bad, using data mining techniques, based on users' reviews. For this study we took a data set consisting of approximately 9,000 reviews for 2,355...
When performing the internal audit of computer equipment an important problem is to identify the elf (executable and linkable format) files stored on the investigated hard drive. To solve this problem, we propose a method of identification of unknown elf-ffles based on the metric classification algorithms. The method consists of three stages. On the first stage the preparation of the training sample...
Handwritten character recognition has been one of the most fascinating research among the various researches in field of image processing. In Handwritten character recognition method the input is scanned from images, documents and real time devices like tablets, tabloids, digitizers etc. which are then interpreted into digital text. There are basically two approaches — Online Handwritten recognition...
Crowdsourcing refers to solving large problems by involving human workers that solve component sub-problems or tasks. In data crowdsourcing, the problem involves data acquisition, management, and analysis. In this paper, we provide an overview of data crowdsourcing, giving examples of problems that the authors have tackled, and presenting the key design steps involved in implementing a crowdsourced...
Training for forensic investigations is an important aspect of the overall training procedure in Police Academies around the world. However, the overall complexity of forensic examinations and the sensitive nature of data available in crime scenes limit the possibility of exposing police cadets in different types of real crime scenes. In this paper the plausibility of using dedicated computer games...
Coding (programming) is a skill that nowadays is considered as an important asset. Teaching programming is an activity that becomes more and more popular. In the last few years there are great discussions on inclusion of coding in schools. These initiatives impacted the policy makers in Macedonia to include coding as a part of a new compulsory subject for the pupils at the age of 8. In this paper...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.