The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last decade, the increasing plurality of materials, media types and software tools within the internet has established first steps towards more individualized learning approaches. However, the development of utilizing Big Data-based algorithms of the next internet generation, the so-called ‘Internet of Things’, leads to a comprehensive approach of personalized learning for very different target...
Smart Cities and outdoor advertising open newopportunities and important markets. For that purpose, theunderstanding of the citizens mobility may be highly helpful. Indeed, their mobility and the monitoring of their personalinterests can be a way of recommending specific advertising. We herein propose a new billboard system based on monitoringtechniques and realistic mobility patterns. Our objective...
The theory of self-regulation, which includes cognitive, motivational, and behavioral dimensions, is useful for understanding the relationships between motivations, learning strategies, and the learner in the context of learning. The critical attributes, such as planning, metacognitive monitoring, and self-reflection, provide valuable information to clarify why some students perform better than others...
As smartphones become more and more powerful and complex, many research works have focused on the analysis and optimization of smartphone energy consumption. Most works are focused on the cases when smartphones are actively used. However, one major issue with smartphones is that the standby time has become much shorter compared with traditional feature phones. Many users have to recharge their phones...
Despite recent emerging development in intrusion detection or network monitoring, malicious attacks and misbehavior remain a high-risk issue within network traffic. In this paper, we present a proactive solution called MMT (Montimage1 Monitoring Tool) that allows facilitating network security and performance monitoring and operation troubleshooting. We demonstrate the improvements of MMT in comparison...
Information about us is increasingly interesting to those who wish to understand our persona, our interests, and the context within which we lives our lives. Regulation follows with the aim to maintain our privacy in modern times. However, such regulation doesn't prescribe the detail of the processes needed to support the intended objectives of regulation. Nor, do we understand the requirement of...
Vehicular Ad hoc Network (VANET) is a type of Mobile Ad hoc Network (MANET) which is formed by mobile vehicles, Regional Trusted Authority (RTA) and fixed Road Side Units (RSU). Communication among vehicles has to be established in a secure way in order to identify attackers in the network and also to isolate them from the network. Different authentication schemes have been proposed for this purpose...
This work investigates how Hidden Semi-Markov Model (HSMM) can be used to monitor and evaluate physical rehabilitation exercises by Kinect v2 to support medical personnel and patients during rehabilitation at home. Authors developed an exercises assessment method based on the extraction of motion features determined by clinicians. Five different rehabilitation exercises are modeled using a HSMM to...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
This paper proposes a storage system cost model for Infrastructure as a Service (IaaS) Cloud. The proposed cost model takes into account the virtualization environment, the storage system characteristics in addition to energy and QoS related parameters (Service Level Agreement and penalties). We show that those parameters are relevant and allow us to predict an accurate estimation of the overall cost...
This paper proposes a storage system cost model for Infrastructure as a Service (IaaS) Cloud. The proposed cost model takes into account the virtualization environment, the storage system characteristics in addition to energy and QoS related parameters (Service Level Agreement and penalties). We show that those parameters are relevant and allow us to predict an accurate estimation of the overall cost...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
One of the key element needed to test most large-scale scheduling algorithms is a testing infrastructure. Large scale is of upmost importance as failures and complex behaviors are common occurrences only at such scale. In order to test the reaction of a system to failures or extreme behaviors, it is necessary to be able to create large scale environments. Such an infrastructure must be reproducible...
As the technology is advancing in health care applications there is a growing need for changes in monitoring patients in hospital, mainly monitoring patients who admitted in hospital. CCTv's and other devices attached to wireless network may record the patient activities for entire day. These devices provide patient's context information which enables the system taking the decisions to handle critical...
Modern research directions in smart environment include analysis of factors that influence overall human Quality of Life (QoL). Context influence factors (CIF) are unavoidable within smart environment research. In this paper, we address indoor air quality (IAQ) as one of the main CIF. The major contaminants of indoor air are CO2 and volatile organic compounds (VOCs). There are still no satisfactory...
Traditional SOA system frequently fails to execute services after the service composition. We address these shortcomings with Q-Mon, and efficient, reliable SOA system to find the rules between the environment and the executed service. Q-Mon provides real time replacement by choosing another service to execute, which is predicted to have a good performance in the current context. Q-Mon monitors the...
The City hall of Surabaya has a website that allows Surabaya citizen to write a proposal of Surabaya development. This websites also give information to the citizen about response of government toward the proposals which are uploaded by citizen. However, the status of the proposals cannot be monitored by citizen using the website. Therefore, a web application Monitoring dan Visualisasi Musrenbang...
With the advent of the newest emergency call mandates in US and Europe, with the advances in cellular-based and WiFi-based localization solutions, and with the developments of cloud computing and web-based social networks, the location information and movement-related data is becoming easier and easier to collect from the user mobile devices and from the user cloud data and it is more and more used...
Mobile devices have gone far beyond their basic usage like calling, texting, etc. New generation mobile devices like smartphones contain a rich set of embedded sensors which enable them to perform sensing operations in different domains. To get user contextual information, both human centric & participatory sensing can be helpful. In order to accurately capture, recognize and classify various...
Past literature recognizes the power of the well-established information systems continuance theory (ISCT) to explain information systems (IS) continuance. In this study, we integrate constructs from two additional perspectives and discuss their interdependencies with ISCT. We argue that the promising framework proposed by Sørebø et al. [1], which extends ISCT with self-determination theory (SDT),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.