The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Self-adaptive systems are modern applications in which the running software system should be able to react on its own, by dynamically adapting its behavior, for sustaining a required set of qualities of service, and dynamic changes in the context or in user requirements. They are typically involved in Future Internet development such as the Internet of Things where interoperability, flexibility, and...
Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports multicast, mobility, content oriented security, and...
With the giddy growth of the amount of the information data through constant interaction and sharing in daily life, the mobile Internet has shifted from the lack of information to information overload. How to satisfy readers' individual needs from the disorder and mixture data has become an urgent problem to be solved. This paper combines the context information into the recommended process, and constructs...
Children use Internet in a daily activity both at home and school. Despite the benefits that Internet might has for children, there are risks surrounded children that we must recognise and be careful of it. Internet use has serious risks including child sexual harassment and child pornography. Unfortunately, cyber criminals take advantages of technological advancement and exposed young people as they...
The article describes computational experiment and further research work in the area of identification of destructive information influence in social networks. The problem of distribution of suicidal content via open sources is presented. On the basis of calculations there was made a conclusions about the prospects of using the methods of information retrieval in the task of identification of the...
While the use of reconfigurable computing for tasks such as packet header processing or deep packet-inspection in high-speed networks has been widely studied, efforts to extend the technology to application-level processing have only recently been made. One issue that has prevented wider use of reconfigurable platforms in that context is the unfamiliar programming environment: Such systems commonly...
System response time can greatly affect the user experience. Society has entered the mobile Internet era, and in mobile applications, as carriers of the mobile Internet, response time is an important performance index related to users' attention. Previous studies of user experience of response time have focused more on computers and websites and less on mobile applications. The current study develops...
With the advent of Internet technologies, information privacy has emerged as an important but complicated notion that is difficult to articulate and conceptualize in technological system design. In this study we identify the key baseline factors for designing privacy-enhancing systems from users' perspective. Utilizing Solove's pragmatic approach to investigate global users' conceptualization of information...
This paper describes results from the study case in developing an ontology for the Indonesian medicinal plants. The approach to the new way of developing ontology is taken from the point view of a socio-technical system theory. The case study was conducted after the theoretical model development developed through a qualitative research synthesis which aimed as a proof of concept. We describe a socio-technical...
A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
Discovering topics in short texts, such as news titles and tweets, has become an important task for many content analysis applications. However, due to the lack of rich context information in short texts, the performance of conventional topic models on short texts is usually unsatisfying. In this paper, we propose a novel topic model for short text corpus using word embeddings. Continuous space word...
Indonesia is prone against local tsunami. After Aceh Tsunami in 2004, many works have been done to reduce disaster risk. One of them is InaTEWS, which is an end-to-end tsunami early warning system. Currently, InaTEWS support 5 types of warning receiver system (WRS): siren, SMS, telephone, fax, and website. In here, we propose a design of WRS based on pervasive display vision. Where it uses a networked...
Security in Android applications is enforced with access control policies implemented via permissions giving access to different resources on the phone. These permissions are often too coarse and on most Android platforms, based on an all-or-nothing decision. How can we grant permissions and be sure they will not be misused? We propose a policy-based lightweight approach for the verification and certification...
This paper presents a new selection-based question answering dataset, SelQA. The dataset consists of questions generated through crowdsourcing and sentence length answers that are drawn from the ten most prevalent topics in the English Wikipedia. We introduce a corpus annotation scheme that enhances the generation of large, diverse, and challenging datasets by explicitly aiming to reduce word co-occurrences...
The overload of information can become a significant challenge in relation to information retrieval systems. Often users will need to carry out extensive research to get the information they desire. This issue will only become more challenging as the quantity of data available on the internet increases. This increase shows no signs of slowing down and inevitably demands better solutions. One such...
In this work, we describe the design, development, and deployment of NEREA (Named Entity Recognizer for spEcific Areas), an automatic Named Entity Recognizer and Disambiguation system, developed in collaboration with professional documentalists. The aim of NEREA is to keep accurate and current information about the entities mentioned in a local repository, and then support building appropriate infoboxes,...
The paper is devoted to the problem of on-line education in MOOC context and its application as an advanced and effective e-learning strategy to Hungarian speaking communities in Carpathian Basin.
The learning of reading is one of the challenges of school and one of its most important activities, because reading is the basis for other school activities and a fundamental element for the exercise of citizenship. The applied behavior analysis have been useful for the development of reading and writing instruction programs by means of two paradigms: the stimulus equivalence that seeks to identify...
The generation and dissemination of digital educational materials in Universities is an issue that has generated interest and concern in Latin American academic community. The use of these educational resources has been conditioned to a specific number of barriers and factors from different nature, being the conceptual and pedagogical, one of the most important, in which, the teacher training plays...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.