The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The overload of information can become a significant challenge in relation to information retrieval systems. Often users will need to carry out extensive research to get the information they desire. This issue will only become more challenging as the quantity of data available on the internet increases. This increase shows no signs of slowing down and inevitably demands better solutions. One such...
The learning of reading is one of the challenges of school and one of its most important activities, because reading is the basis for other school activities and a fundamental element for the exercise of citizenship. The applied behavior analysis have been useful for the development of reading and writing instruction programs by means of two paradigms: the stimulus equivalence that seeks to identify...
European introduction of the eight key-competences and implicitly, the educational curriculum restructure at primary level by redefining educational outcomes and the introduction of the general and specific competences, led to the development in the Romanian educational system of the educational policy focused on skills training. The training based on competences has as premise the focus of the teaching...
Most information systems (IS) research focuses on the effect of gamification or the impact of emotions on IS adoption. Moreover, no study differentiates between digital natives and digital immigrants, although theoretically there should be differences in their IS adoption. Digital natives are those from the generation that has grown up with digital technology, their characteristics and behavior are...
This article presents an exploratory study undertaken during the initial phase of the Adults Digital Literacy Project (LIDIA), aimed at identifying situations where adults are hindered from exercising their full citizenship, due to their lack of digital technologies knowledge. Within the framework of an action-research methodology, a questionnaire was applied to 106 adults, aged between 26 and 92...
In our previous work, our grouping mechanism based on edX online forum, which aims to help teachers form learning groups in SPOC context. We proposed the interaction as the main criterion and heterogeneous academic results as the supportive to do grouping. In the past experiment, we compared our method to student grouping by themselves, our method is better in learning performance but satisfactions...
Blind people require special means of reading and writing of mathematical content. They require of alternative user interfaces in accessing math formulas. In this paper a tool helps surpass the difficulty in reading online documents containing mathematical expressions is presented. The translator from a MathML form to text in Polish take into account a mathematical context of symbols and neighboring...
Blended learning is the notion of integrating digital technologies and online based learning in classical face-to-face classrooms. Video lectures play an essential role in this learning paradigm. In this study, we investigate the impact of socio-economic differences in the viewing behavior of e-learners. Our work looks at e-learners' preferences of the devices they use to access the online learning...
This research explores ebook use among undergraduate students, drawing from the technology acceptance model (TAM) to examine ebook usage and adoption. Undergraduates enrolled in a large course at a mid-western university in the United States completed surveys at the beginning and the end of the semester. A great amount of variance was found in ebook use. A small number of students made a large number...
In the current diversity and complexity of the network information environment, the technology of web page sensitive keywords detection is an important and immediate way to manage public opinion online. We propose a system for web page sensitive keywords detection. This system can detect sensitive keywords in the web pages timely and effectively. And it will mark the position of the keywords in web...
Intelligent computing requires extensive knowledge containing possibly all of information and intelligence utilizing the knowledge. These two requirements have close interactions with each other. This paper takes a look at various kinds of research on intelligent computing from the perspective of semantic techniques and examines core works for the present and the future.
The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step...
Online communities are computer mediated, self-organizing, open networks where people voluntarily communicate and share knowledge. Knowledge sharing in online communities requires exerting time and effort and hence community members need motivation to contribute in these communities. Prior research identified numerous incentives that can motivate knowledge sharing in online communities such as self-efficacy...
The process of modernization, development and migration have much impacted the family size, functions and structure which consequently changing the ways of family communication. Therefore, communication technologies such as Social Network Sites (SNSs) are increasingly being used within family settings to support and extend the family relationships. Thus, the objective of this paper is to develop a...
The paper investigates the relative efficiency of visual and phonetic features of e-learning system for student's learning effectiveness leading to better academic achievement and employability. The e-learning system is a form of human computer interaction process build and transferable skills through computer. The features used in e-learning system to sustain student's long span of focus attention...
During the last six years, the gaming industry has introduced nontraditional interfaces to play videogames. These efforts had been done before but without reaching the success these new interfaces are experiencing in the last years. These new interfaces use player movement rather than buttons or joysticks, creating increasingly immersive environments for the player. These results open up a universe...
In recent years the relevance of digital evidence in Courts disputes is growing up and many cases have been solved thanks to digital traces that addressed investigations on the right way. Actually in some cases digital evidence represented the only proof of the innocence of the accused. In such a case this information constitutes a digital alibi. It usually consists of a set of local and Internet...
The fast development of ICTs provides great opportunities and challenges as well to pre-service English teacher education in China. With ICTs students can access abundant information in English stored online, communicate and interact with one another quickly, conveniently and synchronously or asynchronously in English both orally and in written form. ICTs have been changing how English is learned...
Grounded theory method is gaining importance as a method for theory building about a particular phenomenon. One of the most important benefits is the ability to derive theory from and within the context of data collected. In this research, the authors analyzed the data by using a grounded theory method, in which the cyber terrorism framework is drawn. This paper proposes a conceptual framework describing...
The Time-Dependent Execution Design Pattern describes a way of temporally decoupling a client and a server instance, based on the possibility to specify a point in time at which the operation required by the client instance will be executed on the server instance.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.