The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of Persuasive Technology in various fields is rapidly increasing. It can be applied in many fields such as computing, marketing, sales, environment, education, and health. Persuasive Technology has been found effective in bringing a required change in users' behaviors and attitudes. However, the use of persuasive technology is scarce in the field of Information Security awareness. This paper...
The aim of this paper the extraction of human body dimensions using the latest Microsoft Kinect device. Another focus is the analysis of various application of this device in specific branches of science and research and its application in estimation of dimensions. Brief analysis of the device itself is carried out as well. The principal output of this paper the software application that utilizes...
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
Recently, Network Function Virtualization (NFV) has been getting the attention for reason of operational efficiency, cost savings and service scalability. The NFV can be described as integrating an independent software on the general purposed hardware such as server and switch in order to replace the legacy hardware-based network device. Therefore, NFV can help ensure that carriers can quickly respond...
The main idea behind Elders-Up! project is to bring the valuable experience of senior adults to start-ups and small companies [1]. The Elders-Up! project will build an ecosystem for collaboration on which European seniors' labour activities continue after retirement, as well as their productivity and usefulness to the society. On the other hand, small companies struggle to create their own production...
Educational videogames are a very effective tool in the learning process, especially for the current generation, known as the digital natives generation. Many studies have shown their benefits in different fields, using computers and mobile devices, among others. Nevertheless, we have not found in the literature any comparative research between these two platforms. Is one of the platforms more effective...
This article includes the details of the experiment conducted at the University of the Balearic Islands related to organize a hackathon which involves interdisciplinary, Service-learning and enterprise internship. The goal of the activity is to increase the student motivation and their knowledges and skills. Results are analysed through post-test surveys.
Computers cause an impact in almost every single aspect of our lives, however, unfortunately, schools have not been able to keep up with this irreversible evolution. The simple use of technological apparatuses in the classroom does not guarantee the improvement of the learning process, however it can be the medium through which the students find the alternatives for the solution of complex problems...
Every year, companies are searching for professionals in cybersecurity more than ever before; however, there is a big void in the pipeline. Interestingly enough, the largest source of security incidents are unintentional insiders, which demonstrates the need for cybersecurity education not only for developing cybersecurity workforce but also to raise mere awareness and consciousness about these issues...
To ensure success and quality of a software, early identification and prioritization of the risk is necessary. Risk impacts the cost and duration for of a software. As agile practices of software development prevail over traditional software development, so they are used in present scenario. This paper proposes an Agile based Risk Rank (AR-Rank) method for the prioritization of risk factors in agile...
In this technological world one of the general method for user to save their data is cloud. Most of the cloud storage company provides some storage space as free to its users. Both individuals and corporate are storing their files in the cloud infrastructure so it becomes a problem for a forensics analyst to perform evidence acquisition and examination. One reason that makes evidence acquisition more...
The integration of distributed generation (DG) sources can cause significant impacts on distribution networks, particularly the changes in magnitudes and directions of short circuit currents that may lead to false tripping or fail to trip over-current protection relays in the system. It is expensive and technically challenging to redesign/reconfigure and/or to replace the original protection system...
Stray voltages have always been a concern to utility companies and customers. But methods to troubleshoot and monitor nonroutine stray voltage problems are very limited. This paper presents a passive, measurement-based method to identify the contributors to the common cause of stray voltages, the neutral-to-earth voltage (NEV) rise at the service entrance point. The paper shows that the NEV can be...
Being directed against the bottleneck assignment problem in operational research, a new method called Matrix Elimination Method based on cost matrix transformation is proposed, and an example analysis is used to prove the validity of the algorithm and the resolution is optimal substructure, moreover, the method is illustrated more efficient than other methods by comparison.
After a physical crime occurs an important action typically takes place: the reporting of the crime to the police. However, this action becomes more complex for a victim to properly execute when a cybercrime is experienced, which can be partly explained for instance by a lack of knowledge about cybercrimes and computer security. Cybercrime reporting is crucial because it can provide a multitude of...
The paper concerns the problem of using and implementing mobile solutions in SMEs (Small and Medium Enterprises). Some of the existing examples of mobile solutions are analyzed and characterized. A significant part of the paper is a presentation of the research on mobile solutions which can be used to manage the business activities in SMEs. The role and methods of testing the mobile systems have been...
A great challenge faced by many organizations refers to translating their large computing infrastructure into an effective tool to support their productive chain. In this paper, we introduce a modular single point of access middleware approach focused on integrating distributed and heterogeneous computing resources, coined as Dédalo. Since its design, which follows a software product line (SPL) paradigm,...
Serial number is a unique number given to a product which can be used for product identification and inventory management. Information about the product may be its manufacturing date, expiry date, place of manufacture and so on. Some companies use serial numbers to keep track on the number of products which a retailer is authorized to sell. Thus serial number identification becomes an important part...
This Event log file is the most common data-sets exploited by many companies for customer behavior analysis. Oftentimes these records are unordered, and need to be grouped by certain key for effective analysis. One such example is to group similar user with different session ID to facilitate further analysis. This kind of analysis is known as User Sessionization. In this paper, we propose a distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.