The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study reports how senior citizens domesticate their personal mobile devices at the beginning of learning process in an adult education class. The aim of this study was to examine how seniors integrate their mobile devices into their personal education experience, what sort of processes were experienced to render the devices useful and meaningful, and how gender and information literacy influenced...
Having implemented a Classroom Response System (CRS) “Tweedback” in style of Social Media, this instrument was supposed to be evaluated for further rework and refinements. However, systematic evaluation of such applications is rarely done and demands a determination of the issues to be considered within the evaluation. The scope of the approach presented in this paper is the evaluation with regard...
It is important for today's students to have skills to adequately equip them for working in the 21st Century. Students also have a high rate of ownership of various kinds of technologies including mobile devices. It is important to engage students in their lectures when they are studying in higher education and getting students to use their own mobile devices is one way of doing this. Research suggests...
This paper presents a practical application of interactive TV in baseball watching. It has two features. First of all, it employs social media to generate semantic metadata of the media stream that reflect the interest of the public. The metadata are extracted by our proposed bursty feature extraction algorithm, and it provides immediate but rich summaries of live TV contents. Second, utilizing them,...
Although video sharing in web is used in learning, most video sharing services are not designed to be used as a learning application. In addition, most of these systems were designed to use via computer and with a web browser. Our solution, MoViE (Mobile Video Experience), is designed to be used in learning applications especially with mobile devices. MoViE is a social media service that enables users...
We propose a system for collecting and connecting people's stories. In order to help encourage participants to engage their ??expression mode,?? we employed mobile phones for video capture, as opposed to traditional video cameras. As part of our work, we held a workshop in an art festival. In the workshop, facilitators capture participants' stories using mobile phones. Applying a question-and-answer...
This poster describes a robot cell-phone named CALLY with which we are exploring the roles of facial and gestural expressions of robotic products in the human computer interaction. We discuss non-verbal anthropomorphic affect features as media for building emotional relationships between a user and a product, and introduce new types of robotic products in the market that may be capable of establish...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
A low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology is proposed in this paper. The proposed solution can be applied not only to various security systems, but also to environmental surveillance. Firstly, the basic principle of moving object detecting is given. Limited by the memory consuming and computing capacity of a mobile phone,...
After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (multimedia...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.