The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Captcha is a security mechanism designed to differentiate between computers and humans, and is used to defend against malicious bot programs. Text-based Captchas are the most widely deployed differentiation mechanism, and almost all text-based Captchas are single layered. Numerous successful attacks on the single-layer text-based Captchas deployed by Google, Yahoo!, and Amazon have been reported....
Captology is an acronym, derived from Computer As Persuasive TechnOLOGY, where the instance persuasive, (lat. persuasibilibus - enticing), refers to the convincing persuasion caused by computer technology. Transitive and interactive technologies as intelligent systems, have imposed, by their persuasivity, “the cult of information”, after which the information became type of goods that as utilitarian...
Software is a key component of solutions for 21st Century problems. These problems are often "wicked", complex, and unpredictable. To provide the best possible solution, millennial software engineers must be prepared to make ethical decisions, thinking critically, and acting systematically. This reality demands continuous changes in educational systems and curricula delivery, as misjudgment...
ACM and the IEEE Computer Society have released their computer engineering curriculum guidelines in December of 2016. The curricular report, tagged CE2016, reflects current computer engineering education and practice that would be relevant for the coming decade. The report provides some examples on ways to map knowledge units to courses and it addresses expected requirements in science and mathematics...
The purpose of this research is to identify factors of phishing victim based on the Heuristic Systematic Model and propose phishing awareness guidelines. In this research, the explanatory sequential mixed method is chosen. Therefore, survey and interview method been applied for data collection purpose. In summary, this research concluded that the major factors that influence user becomes a phishing...
Hashing is an important technique to achieve high code performance in a variety of data processing applications. The concept is emphasized in Computer Science curricula, and the IT industry values graduates who can use hashing skillfully. Although several implementation details of hashing are routinely handled by software libraries, it remains the responsibility of the programmer to choose a suitable...
ACM and the IEEE Computer Society plan to re-lease their computer engineering curriculum guidelines at the end of this calendar year. The curricular report, tagged CE2016, reflects the state-of-the-art in computer engineering education and practice that would be relevant for the coming decade. This panel presentation provides an overview of the report and it also provides unique perspectives from...
Student cheating is a well-known topic with a large number of references in literature. This paper presents and discusses the role of assessment rules as a vehicle for cheating minimization, related to delivered work, in the context of computer programming courses. As there is no single best solution, we present a classification for cheating behaviors that provides a guideline for teacher reflection...
This paper studies the effects of applying process improvement principles to knowledge-intensive processes, which are typical for being supported by Adaptive Case Management systems. The study is being completed by investigating a process of conducting a small-scale research project that results in BS or MS thesis being defended and graded. The research is a mixture of the case study at the department...
In recent years, it has been a growing interest in the phenomenon of Learning Analytics. Most efforts have been focused on learning platforms, due to the huge amount of information they provide about student activity. However, as other authors also state, it is important to point out that much of this activity occurs beyond such platforms. This work aims at presenting a set of guidelines to select...
Re-thinking the process of designing inclusive systems may help to identify the potential for re-use and interoperability of developed systems. Based on existing models of system engineering and project management, a process model for inclusive design as well as consequences for its practical application are presented.
Mobile devices are becoming a more popular tool to use in day to day life; this means that they can accumulate a sizeable amount of information, which can be used as evidence if the device is involved in a crime. Steganography is one way to conceal data, as it obscures the data as well as concealing that there is hidden content. This paper will investigate different steganography techniques, steganography...
The quality and impact of application system messages (ASMs) is an important yet neglected area of human computer interaction (HCI) in healthcare. Complex, technical, uninformative ASMs contribute towards user frustration, lack of acceptance, may lead to interruptions in healthcare workflow, and impact patient safety. ASMs refer to messages displayed within a software application and includes error...
Machine learning programs are non-testable, and thus testing with pseudo oracles is recommended. Although metamorphic testing is effective for testing with pseudo oracles, identifying metamorphic properties has been mostly ad hoc. This paper proposes a systematic method to derive a set of metamorphic properties for machine learning classifiers, support vector machines. The proposal includes a new...
This research proposes user interface requirement guidelines when designing a tour website for older people. At the moment, because of the increased shift from manual to an automated method to acquire services such as accessing a tour websites, it is important to give more attention to design and development that caters to the needs of the older people. Currently, there are some design problems in...
VOIP (Voice over IP Protocol) is an emerging field including a lot of wholesale companies in market striving to give cost effective wholesale VoIP termination and business VoIP services to its clients. The VOIP wholesaler processes bulk of calls per day therefore, have to manage a large amount of data i.e. calls, clients, contracts and its account managers. Sales Management Systems are used to manage...
On behalf of the Conference Organizing Committee, it gives me a great pleasure to welcome you to the 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT 2015). I am honored and privileged to be the General Chair of the Organizing Committee of this Conference that is jointly organized by Princess Sumaya University for Technology (PSUT) and IEEE - Jordan Section.
Social-affective aspects of interaction play a vital role in making human communication a rich and dynamic experience. Observation of complex emotional phenomena requires rich sets of labeled data of natural interaction. Although there has been an increase of interest in constructing corpora containing social interactions, there is still a lack of spontaneous and emotionally rich corpora. This paper...
Joint ACM/IEEE Computer Society undergraduate computer engineering curriculum guidelines are slated for release in 2016. These update the 2004 guidelines commonly known as CE2004. The presenters are part of the task group leading the revisions and will give an overview of the latest draft. Participants will engage in discussions on potential improvements to the guidelines to ensure that they are useful...
Recreational nature experiences are rehabilitative for humans. Nature-oriented virtual environments (VEs) might be able to provide similar experiences. A pilot study have shown to increase the enjoyment of an exercise experience for retirement home residents, by augmenting their everyday bike exercise with a custom made recreational VE. This paper proposed a set of guidelines with design considerations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.