The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study is to explore students' perceived information security and privacy (IS&P) threats and to classify them in a way that helps in analyzing the problem, creating awareness measures and further improving students' IS&P education. Using a qualitative research approach, a group of forty two Master's degree IT students identified seventy five IS&P threats related to them...
This paper will focus on how ICT in the classroom could really work to provide the children the education they need in this 21st century. Learning for children with the use of ICT in the classroom can work if teachers have the ability and skills to integrate ICT in their classroom. This is where the headmasters play a crucial role, if the teachers are supported by the surrounding education system...
The structuring of large volumes of e-documents assumes the organization of text on several levels, namely paragraphs, sentences, phrases, words. Methods of lexical paradigms extraction using statistical analysis were developed long ago. In this paper we attempt to move from lexical correlatives to the list of synonyms on various levels of generalization on the basis of local and global contexts'...
Recent intensive research in the fields of obesity and eating disorders has proved most traditional interventions inadequate: The obesity-targeting interventions have either failed or are strongly social context dependent, while the interventions for eating disorders have poor results and high levels of relapse. On the contrary, recent randomized control trials have illustrated that supervised training...
The Embedded system is controlled with the combination of hardware and software. They are usually processed by a microprocessor / microcontroller that execute instructions which are present in ROM. The term "embedded" reflects to the fact that they are part of the system. Real-Time Operating System (RTOS) combines with two thoughts "real-time" and "operating system"....
Engineering education research generates many insightful findings on learning and teaching of engineering concepts. These research findings need to be translated into practical implementations in the classroom to help students to achieve better learning outcomes. This paper describes a project by research scholars specializing in educational technologies. The aim of the project was to use the analyses...
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-oriented monitoring research. In this paper, we release a fine-grained user request-centric open trace data set, called Trace Bench, collected on a real world cloud storage system deployed...
Sentiment lexicons are useful to automatically extract sentiment from text. In this paper, we generate several Norwegian sentiment lexicons by extracting sentiment information from two different types of Norwegian text corpus, namely, news corpus and discussions forums. The methodology is based on the Point wise Mutual Information (PMI). We introduce a modification of the PMI that considers small...
Sentic Net is a popular resource for concept-level sentiment analysis. Because Sentic Net was created specifically for opinion mining in English language, however, its localization can be very laborious. In this work, a toolkit for creating non-English versions of Sentic Net in a time- and cost-effective way is proposed. This is achieved by exploiting online facilities such as Web dictionaries and...
Requirements engineering is a preliminary and crucial phase for the correctness and quality of software systems. Despite the agreement on the positive correlation between user involvement in requirements engineering and software success, current development methods employ a too narrow concept of that user and rely on a recruited set of users considered to be representative. Such approaches might not...
User feedback is crucial to improve software quality. For example, it can be used to identify missing features and clarify user trends and preferences for future improvement. However, obtaining user feedback is not a 'one-off' process which requires that developers need to gather user feedback in an on-going approach. The problem lies here: the majority of users are generally lack motivation and interest...
Student performance depends upon factors other than intrinsic ability, such as environment, socio-economic status, personality and familial-context. Capturing these patterns of influence may enable an educator to ameliorate some of these factors, or for governments to adjust social policy accordingly. In order to understand these factors, we have undertaken the exercise of predicting student performance,...
To find a specialty-counterpart, diagnosis-accurate, skill-superb, reputation-high, and meanwhile cost-effective and distance-close doctor is always essential for patients but not an easy job. According to various categories of medical professions, the diversity of user symptoms, and the information asymmetry and incompetence of doctors' profiles as well as patients' medical history, today most recommender...
Evidence from the literature suggests that achieving sustainable IT adoption benefits in organizations remains a problem. The assumption of most IT adoption frameworks is that there is always consensus during IT adoption decision making in organizations. However, the different stakeholder worldviews make IT adoption decision making in organizations a challenge. This paper developed and validated an...
Building one's vocabulary in a language is an important component of language acquisition. Children learn their native language by being immersed in the language that is used in their environment. However, in second language acquisition, learners are often exposed to vocabulary that is selected by others specifically to aid language acquisition such as textbooks and word-lists. In this paper, we are...
The business process model and notation BPMN standard is becoming increasingly popular for process descriptions and reasoning with processes. Several formal techniques have been proposed addressing its semantics, temporal aspects, and process constraints. In this paper, we present a characterization of the BPMN process execution using user intentions. User intentions refer to the user's mental dispositions...
Social media has become one of the most popular marketing channels for many companies, which aims at maximizing their influence by various marketing campaigns conducted from their official accounts on social networks. However, most of these marketing accounts merely focus on the contents of their tweets. Less effort has been made on understanding tweeting time, which is a major contributing factor...
Motivation is very important in any kind of human activity. This is especially true in the context of learning. Various educational systems therefore try to incorporate elements, which has motivating effects on their users -- learners (students). Increasingly popular in this domain is employing elements of gamification. In our work, we propose specific type of one of the gamification mechanics --...
In the context of product line engineering (PLE), providing immediate feedback on the correctness of a manual configuration step to users has a practical impact on whether a configuration process with tool support can be successfully adopted in practice. Model-based PLE has brought opportunities to enable automated product configuration and derivation for large-scale systems/software, in which models...
Connected components of edge pixels are valuable for many applications, e.g., Image segmentation, contour extraction, and text detection. However, a connected component of edge pixels may not form a simple curve due to the existence of bifurcation pixels, and thus limits its application in shape modeling. In this paper, we propose an approach to remove bifurcation pixels in an edge image, which let...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.