The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dependability is an important issue of assessing a software systems. With more wide application of Internet in life-critical domain, the dependability of software system arranged on Internet becomes big challenges because of the undependability of today's Internet. Accurately assessing the dependability of a Internetware system has to be one of important task. In this paper, we propose a mathematics...
This paper briefly describes the Online and Computer Aided Assessment (OCAA) from the perspective of the security of the online evaluation process. Significant aspects of online evaluation have been discussed. The evaluation is considered to be a critical item in determining the Key Performance Indicators (KPI). This study contains a short description of offered online evaluation systems in particularly...
One of many challenges in a web information systems is the capability of staying stable and available as the number of users and requests increase rapidly, what we call scalability. This paper provides a model based on development of events-oriented applications, non-blocking in the environment Node.JS with the non-relational database model (MongoDB), preparing to establish scalability and a comparison...
The problem of computer-supported tools application in didactic process in the engineer education on the example of teaching of electrical engineering was described. Especially laboratory activities engage different tools which were created by information and communication technologies development. The idea of mixed electrical engineering laboratory groups, where the members of the group receive different...
Business process modeling is currently an important step in supporting the development of computational systems, as it occurs prior to the establishment of what is required for implementing the system. The business process mapping and its description are designed to further develop and structure the activities needed for the successful execution of this task. This article presents a modeling methodology...
Formal concept analysis is a mathematics research field introduced in the beginning of the 1980s by Rudolf Wille, that has been applied in several different knowledge areas, including Computer Science. FCA is a data analysis theory that identifies conceptual structures within data sets or formal contexts. In this work, we propose an FCA-based approach to build minimal implication rules-based computational...
Numerical simulation is an essential tool to study and design HVDC grids interconnected with AC networks. Detailed real-time simulation of such complex power systems requires large computational resources. The connection of remote laboratories provides the possibility to share available resources thus meeting these demanding computational requirements. This concept is referred to as geographically...
The research study is focused on the exploration and analyses of development methodologies of e-learning software and proposes a model and a framework for approaching such development, while applied it on a particular practical application E-Learn SEEU were has been implemented and tested the proposed model as well as evaluated with the users. Analyses of the current methodologies and best practices...
This article aimed to show the current reality of existence and use of technological resources that exist at school. It was possible to accomplish and check through the holding of workshops on the use of technologies, in particular the use of Pen Drivers what is common for students. However, only as long as file systems. The UPA project-A Flash Drive per pupil consists of storing large volumes of...
With the popularization of Internet access, institutions and parents have encountered serious problems to prevent access by employers and children to inappropriate content such as pornographic pages. The detection mechanisms try to circumvent or at least mitigate this problem by using of filters or mechanisms that enable the nudity detection in digital images. This paper proposes ANDImage, an adaptative...
The advent of e-commerce has prompted many retailers to sell product by online channel. In this paper, we study the competitive strategies between a traditional retailer and an online retailer. We investigate how the changes of the degree of customer acceptance of the online channel and the traditional channel inconvenience affect the strategies of the two retailers under two different Stackelberg...
This work it is a PhD project that aims to develop the communication pedagogical model of u-learning Youubi with the adequacy of pedagogical models to favor the effectiveness of learning through the use of ubiquitous technology. The work related to this issue highlights the difficulties of the adequacy of pedagogical models that incorporates the ubiquitous computing resources in the educational context...
This paper discusses aspects of Information and Communications Technologies and how they have influenced our daily lives, especially our educational models. Despite the technological advances, the lack of interest of young people for science and technology careers increases and it is even more worsened by the fact that an extremely small number of schools have science and computer labs in Brazil....
In this world of emerging technologies, online frauds are rapidly increasing with the increasing popularity of online shopping era. It has been identified in the past research that the shilling is main cause behind online auction frauds. Several researchers have proposed various methods to counter the possibility of shilling in online auction. In this paper we have proposed a mechanism which uses...
Cross-language text similarity calculation is a critical and fundamental problem in natural language processing. It is widely used in cross-language research, such as cross-language information retrieval. In this paper, we used the LDA (Latent Dirichlet Allocation) model to calculate similarities of Tibetan and Chinese texts at the topic level. Through topic modelling and forecasting, the texts are...
Using thousands of infected internet computers to launch distributed denial of service attack against companies and governments internet resources by attackers is becoming dangerously common trend. Recently, there is a growing trend towards attackers, using IRC (Internet Relay Chat) protocol-based botnet for control and command infected internet computers. The botnet consists of the infected computers,...
Efficient policies should be applied in order to decrease the document retrieval time on distributed systems, the network traffic, admission and content replacement for cache systems. Usually, proposed simulators that aim to select better policies have limitation. As an example, it's difficult to create scenarios with multiple cache systems. Besides, frequently those simulators present a lack of extensibility...
This study proposed a social capital (SC) model to examine the relational bonds between SC and the mathematical literacy (ML). A random sample of 1021 15-year old secondary school students responded to the SC Questionnaire measured in Likert scales rated from 1 (strongly disagree) to 10 (strongly agreed) and answered selected released 2006 PISA items on ML. Structural Equation Modeling was employed...
This paper uses the Technology Acceptance Model (TAM) to identify the factors influencing citizens' acceptance and intention to use e-government in Sudan. Specifically, a survey questionnaire was used to collect responses from a sample of (292) participants using the Electronic Passport and National ID services. Results from this study showed that the quality of services and advertising have significant...
With the boom of social media, it is a very popular trend for people to share their consumption experiences and rate the items on the review site. Users can share their experiences, reviews, ratings, photos, check-ins, moods, and so on. The information they shared is valuable for new users to judge whether the items have high-quality services. Nowadays, many researchers focus on personalized recommendation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.