The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This project documents the livelihood of the boatbuilders, in Pangkor Island, Perak, Malaysia. The traditional process of building a boat is a heritage practice that could disappear due to the many issues it currently faces. These traditional boatbuilders do not have a specific blueprint for each boat and these boats are of the classification of 65 to 120 tonnes each based on its license by Department...
While fans of classical music were found to be underrepresented on social media and music streaming platforms, they constitute an important target group for music recommender systems. We therefore focus on this group of listeners and investigate a wide range of recommendation approaches and variants for the task of music artist recommendation. Within the group of classical music listeners, we further...
This paper presents an analysis of star ratings in consumer reviews in Yelp, an online social platform for sharing consumer reviews about local businesses. In particular, we analyze consumer reviews about food businesses. We analyze how well or poorly the star ratings (on a scale of one star to five stars) associated with these reviews tally with the sentiment derived from the textual portion of the...
This paper presents strategy to classify tweets sentiment using Naive Bayes techniques based on trainers' perception into three categories; positive, negative or neutral. 50 tweets of ‘Malaysia’ and ‘Maybank’ keywords were selected from Twitter for perception training. In this study, there were 27 trainers participated. Each trainer was asked to classify the sentiment of 25 tweets of each keyword...
Recently, as social networking websites become increasingly ubiquitous, there is also a surge in academia to study their potential impacts on business practice. One strand of literature focuses on the public sentiment expressed through social media and how such sentiment shape business environment. Previous researches have proved that public sentiment on social media does have an impact on movie's...
Big data has been around a long time,' said Byron Banks, VP of big data for SAP. 'Now with social media, the Internet of Things, sensor data, mobile devices -- new big data has transformed the business.' While in industry a new generation of products and services dealing with big data arise, it has also raised many fundamental research challenges and open issues in the context of BPM and existing...
Existing approaches of social influence analysis usually focus on how to develop effective algorithms to quantize users' influence scores. They rarely consider a person's expertise levels which are arguably important to influence measures. In this paper, we propose a computational approach to measuring the correlation between expertise and social media influence, and we take a new perspective to understand...
Substantial numbers of Chinese mainland students are enrolled in overseas Western-based business courses but are dislocated from their home cultures. Business education curriculum and course designers need to understand how these students are best trained in western style education programs. Four-hundred students in Singaporean business training programs provided differential ratings of perceived...
In today's knowledge-based economy, education is not only an essential instrument for knowledge acquisition and self-development, but also a mandatory tool that enables students to secure a good job, gain respect in society, and develop a personal identity. The importance of having the intellectual curiosity, ability to effectively apply the acquired knowledge/skills and job expertise becomes even...
The challenge for the modern university in the digital age involves developing an effective pedagogy that meets the changing needs of students and staff as well as addressing the requirements of business and industry. The development of the Learning Design Conceptual Map (LD-CM) represents an educational landscape, which can be used to support learning design activity at all levels of operation (Dalziel,...
Virtual environments are digital scenes which are now widely familiar to home game players and movie goers. The power of conveying ideas and experiences through realistic 3D presentations is well established, and interactivity with objects and other digital participants is the basis for success in achieving common goals and increasing outcomes such as scores. This experience builds on analogues from...
We have studied a two-year project aiming at exploring the potentials of the e-newspaper, i.e. a news service published with e-paper technology. Different actors have interests in this process, e.g. newspaper publishers, device producers, readers and advertisers. These actors are forming value networks by negotiations of interests and positions. The contribution of the paper is twofold: firstly we...
Based on the survey results of Chinese requirements engineering practices, this paper reports a few general patterns of Chinese-culture-related ways of thinking and their influence to requirements elicitation activities. A multimedia enhanced goal oriented requirement elicitation method is proposed, in which media measures are used to help capture user requirements and preferences more easily. The...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.