The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The generation and dissemination of digital educational materials in Universities is an issue that has generated interest and concern in Latin American academic community. The use of these educational resources has been conditioned to a specific number of barriers and factors from different nature, being the conceptual and pedagogical, one of the most important, in which, the teacher training plays...
European introduction of the eight key-competences and implicitly, the educational curriculum restructure at primary level by redefining educational outcomes and the introduction of the general and specific competences, led to the development in the Romanian educational system of the educational policy focused on skills training. The training based on competences has as premise the focus of the teaching...
The goal is to present a summary approach to global aging process with particular emphasis on the EU-27 and Portugal. In this context, it addressed the issue of digital divide citizens 50+ and their consequences for this group of citizens that prevent them from exercising proper citizenship and a consequent social inclusion. To this end, the contribution of USALBI is displayed (Senior University of...
Internet traffic classification is a relevant and mature research field, anyway of growing importance and with still open technical challenges, also due to the pervasive presence of Internet-connected devices into everyday life. We claim the need for innovative traffic classification solutions capable of being lightweight, of adopting a domain-based approach, of not only concentrating on application-...
This article presents an exploratory study undertaken during the initial phase of the Adults Digital Literacy Project (LIDIA), aimed at identifying situations where adults are hindered from exercising their full citizenship, due to their lack of digital technologies knowledge. Within the framework of an action-research methodology, a questionnaire was applied to 106 adults, aged between 26 and 92...
Rapid technological development has affected teaching and teachers' work environment in higher education in many ways. Technology allows us to learn anytime, anywhere we want, but are the educators ready and what kind of skills they need to match the changing world. This paper aims to propose points to consider while planning support programs, internal training for higher education teachers in order...
Speech are widely used to express one's emotion, intention, desire, etc. in social network communication, deriving abundant of internet speech data with different speaking styles. Such data provides a good resource for social multimedia research. However, regarding different styles are mixed together in the internet speech data, how to classify such data remains a challenging problem. In previous...
Nowadays, many Learning Environments provide a tailored and personalized learning experience to learners on the basis of information collected implicitly or explicitly about them. Several studies have been carried out concerning personalization to provide a personalized environment when using a learning management system. However, these systems cannot be adapted to all kind of learners regardless...
Topic detection is an hot research in the area of information retrieval. However, the new environment of Internet, the content of which are usually user-generated, asks for new requirements and brings new challenges. Topic detection has to resolve the problem of its lower quality and large amount of noisy. This paper not only provides a solution for detecting hot topics, but also giving its semantic...
The information society has placed new challenges to the teaching/learning process, modifying the construction of knowledge: the information access has become more dynamic requiring constant updating of knowledge. This paper describes a training course held in Azores for teachers of the 1st, 2nd and 3rd cycles of basic education on Web 2.0 tools. This training was held in the blended learning mode...
While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by Foucault's analytic framework on psychiatric power that utilizes both terrorism cases and extremist social media groups to develop an explanatory model of radicalization...
This paper is aimed at educational technology specialists who work with multicultural and international projects in developing countries. Educational technology is increasingly portrayed as a cure for the developing countries' educational challenges. But as countries differ much from each other, and as developing regions differ in many ways from industrialized regions, naïve technology transfer just...
Personalized web-based learning has become an important learning form in the 21st century. An earlier research result showed that a fuzzy knowledge extraction model can be established to extract personalized recommendation knowledge by discovering effective learning paths from an access database through an ant colony model. However, critical limitations arose when considering its applications in real...
Performance advertisers want to maximize the return on their advertising spend. In the online advertising world, this means showing the ad only to those users most likely to convert i.e. buy a product or service. Existing ad targeting solutions such as context targeting and rule-based segment targeting primarily leverage marketing intuition to identify audience segments that would be likely to convert...
The proliferation of deep Web offers users a great opportunity to search high-quality information from Web. As a necessary step in deep Web data integration, the goal of duplicate entity identification is to discover the duplicate records from the integrated Web databases for further applications(e.g. price-comparison services). However, most of existing works address this issue only between two data...
During the last years the design and development of web-based educational systems for disabled group of learners has attracted the attention of technology-enhanced learning community. However, although a number of such systems have been designed to meet accessibility needs and preferences for those groups, most of them anticipate special-purpose eTraining material and keep their eTraining activities...
Anomaly detection in computer networks is an actively researched topic in the field of intrusion detection. The Internet Analysis System (IAS) is a software framework which provides passive probes and centralized backend services to collect purely statistical network data in distributed computer networks. This paper presents an empirical evaluation of the IAS data format for detecting anomalies, caused...
Web-based learning is now becoming an important learning form in the application of Internet,. The many problems have been brought in the web-based learning process to the researchers and educators. In the learning processes, the learning achievements and the learning evaluation will be important, and then these could effectively promote the learning capacity of students. In this paper, the suitable...
In this paper we propose to apply an algorithm for finding out and cleaning mislabeled training sample in an adversarial learning context, in which a malicious user tries to camouflage training patterns in order to limit the classification system performance. In particular, we describe how this algorithm can be effectively applied to the problem of identifying HTTP traffic flowing through port TCP...
Funded as part of the `Network-Enabled Platforms' program, the Health Services Virtual Organization (HSVO) Project has developed a network-enabled platform (NEP) consisting of a messaging specification, a collection of devices, a bus interface architecture and a middleware hub (SAVOIR) that can support the authoring execution and tracking of multiple independent and integrated simulation activities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.