The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online laboratories have been effective in bridging the gaps between theory and practice particularly in situations not covered by traditional hands on laboratories. Together with secondary school students we aim to develop 3 laboratory setups including a novel approach to seamlessly plug these setups to the cloud and make them available to other peers. Students will strongly be involved in the research...
Files are seen by many specialists as one of the main bottlenecks of IT systems evolution. This is mostly due to the very unnatural fragmentation of information into chunks which are easier to manage by operating systems and legacy storage devices but much more difficult for information processing tools and eventually by humans themselves. In this paper we propose a novel approach which has the potential...
In the following work, we can observe a systematic process to obtain a web application, from the use of the method 2.0 and use OOWS RIA. A typical situation in programmer's work is that often must repeat pieces of code with some specific goal, that without being exactly the same share a structure that can be reused, these pieces are called snippets. While there are alternatives to work with snippets,...
This paper describes the advantages of using mobile devices and the so-called active learning method in higher education. The authors use their methodological experiences to include m-learning in their teaching process, focusing specifically on higher education and engineering students. The paper also describes the authors' motivation for expanding the existing e-learning projects with mobile learning...
Mobile phones offer benefits to various age group users in supporting their continuous learning. However, despite such advantages, users still have difficulties learning mobile phone applications interfaces. In the paper we investigate different methods used by two groups of mobile phone users, namely the younger and older groups, to improve their l earnability. We examine the errors made by both...
Phishing has been and still is a prevalent attack causing serious damage to numerous ingenuous Internet users every year. Usable security is understood as one required pillar for developing effective protection means in this context. We therefore survey and discuss on available usable security mechanisms against phishing. Our investigations show that existing solutions contain too many obstacles for...
In general, there are five common usability testing characteristics that may lead to the best practices in the usability testing. The five characteristics are (i) specific goals for each test, (ii) participants representing real users, (iii) participants doing real tasks, (iv) usability researcher observes and records what participants do and say and (v) usability researcher doing the data analysis,...
Various personalized recommendation services are provided through internet for users with different screen sizes and various sensors. It is also expected to be many competing service providers for similar recommendation service, and the users are expected to have the chances to select one of these services. However, the user related information as well as the environmental information around the user...
The Internet of Things scales the Internet to billions of embedded nodes and allows to link physical and cyber systems to form complex control systems. Current research focuses mainly on the networking and communication protocols and leaves the application layer and aspects like the engineering process and creation of control logic out of scope. Existing approaches are mainly based on using scripting...
Nowadays, people use on-line services to conduct various tasks such as on-line shopping and holiday trip planning using web applications. Generally users are required to enter information into web forms to interact with the web applications. However they often have to type in the same information to different web applications repetitively. It could be a tedious job for a user to fill in a large amount...
Online shopping is becoming increasingly important as more and more manufacturers sell products on the Internet, and many users are using the Internet to express and share their opinions. However, it is impossible for consumers to read all product reviews. Therefore, it is necessary to design effective systems to summarize the pros and cons of product characteristics, so that consumers can quickly...
For an Android-powered device, its security is established such that an application, when it is installed, declares the functions and other information that it will use, and user approves or rejects the declaration according to reviewing results. The problem is that, however, it is difficult for users to completely understand the details of a declaration, and careless users may neglect the approval...
Persuasion is an attempt of changing individual's behaviors and attitudes. Computer systems which incorporate with an embodied agent can be effective persuasive user interface as a social actor, and we developed and evaluated the persuasive application software which was named "iDetective" as the previous work. The main persuasive strategy of the iDetective was conversations including questions...
Web Mailer is an Web based E-mail client. We have developed various Web Mailers as themes of bachelor's or master's thesis. During developments of Web Mailers, students studied a lot such as programming, networking, user interface issues and so on. According to the deployments of new technologies, Web Mailers have evolved and enriched. This paper introduces our Web Mailers and its technologies.
In the paper, we discuss a scalable, multi-purpose sensor network implementation called EfiIoT. It combines two network topologies to enhance scalability and introduce new uses, such as locally available data to subscribers. The system is designed to be put together from a variety of sensors. It supports almost any kind of user interface and supports many user bases with partially or wholly different...
This article presents a set of resources for helping to learn and teach the C programming language. This language is used on the subject “Informatica” (computing), in the Degree in Electronics and Automatics Engineering at the Polytechnic University of Madrid. The resources presented are interactive animations, that students can use to analyze, on a dynamic way, the behaviour of common programming...
Locating services in public environments substantially differs from finding services in a private local network (e.g. a home network). Conventional discovery protocols require a user terminal to be connected to a network in order to query it for available services. However, out in the city, one can hardly try to connect to every public hotspot within reach to discover the services it might provide...
Information sharing plays a significant role in human daily life. With the development of the Internet and applications over it, we share almost all kinds of information in a much wider space and time scope that we never had. However, when it comes to sharing information about resources which are available in an instant manner and expire in a very short time, such as the cases in carpooling, train...
In this paper, we propose a lyrics writing support system focused on the number of syllables, rhyme and word accent. The system generates candidate sentences that satisfy user-specified conditions based on N-gram, and presents them. Users can use the system like a dictionary, and write lyrics be choosing presented sentences. In our subjective evaluations, we have investigated how the system is utilized...
This paper proposes a service which searches goods by images and finds a shopping mall site that offers referral services. In the service, images are obtained in various types. For image management, it will be modeled using UML Diagram. Unlike other existing sites, the service applied sites have special advantages in:1) Using sketch accessories which enable users to draw pictures.2) Support functions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.