The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a dynamic technique for identifying learners learning styles based on their behavior in the learning environment influenced by literature approach. The technique was suggested based on VAK Learning Styles model and the behavioral patterns. First we defined the learning material features (contents, case studies, examples, exercises and assessments) and the behavioral patterns (staying...
Online review fraud has evolved in sophistication by launching intelligent campaigns where a group of coordinated participants work together to deliver deceptive reviews for the designated targets. Such collusive fraud is considered much harder to defend against as these campaign participants are capable of evading detection by shaping their behaviors collectively so as not to appear suspicious. The...
The importance of understanding the information technology (IT) adoption process in organizations has been highlighted by many researchers. Information technology adoption at individual or organizational level is a highly researched topic in the IT field. Most literature on IT adoption in organizations is often premised on the assumption that IT investment benefits are always obvious after selecting...
Nowadays, a typical household owns multiple digital devices that can be connected to the Internet. Advertising companies always want to seamlessly reach consumers behind devices instead of the device itself. However, the identity of consumers becomes fragmented as they switch from one device to another. A naive attempt is to use deterministic features such as user name, telephone number and email...
The study of wind power system strongly relies on simulations in all kinds of methods. In industry, the feasibility and efficiency of wind power projects also will be verified by simulations at first. However, taking time cost and economy into consideration, simulations in large scales often sacrifice model details or computing precision in order to gain acceptable results in higher simulating speed...
Training simulation is broadly used in military training but not limited. The simulation environment contains so many elements and so many factors affect the result, so an effective and efficient mechanism to help to manage these factors is required. This article firstly listes the elements in the environment, and then builds the object models of all kinds of objects. Based on these object models,...
In order to prevent illegal users access the cloud data frequently, this paper puts forward trusted access control model based on role-task in cloud computing. It can prevent the illegal users accessing cloud data more effectively. Combining the advantages of the role access control model and the task access control model, the concept of reputation value will be introduced, and a certain threshold...
Internet and mobile computing have become a major societal force in that down-to-earth problems and issues are being addressed and sorted out. For this to be effective, information and content extraction need to be at a basic generic level to address different sources and types of web documents and preferably not dependent on any major software. The present study is a development in this direction...
Many practical problems are modeled with networks and graphs. Their exploration is of significant importance, and several graph-exploration algorithms already exist. In this paper, we focus on a type of vertex equivalence, called exploratory equivalence, which has a great potential to speed up such algorithms. It is an equivalence based on graph automorphisms and can, for example, help us in solving...
The KID (Knowledge-Information-Data) model is a unified structure which unifies data, information, and knowledge. It is also a data driven process in the data transformation process from data, to information, and then to knowledge. In this process, knowledge is enriched and enhanced with continuous perception of the external context and at the three stages of the data transformation. In other words,...
A common approach to the problem of predicting students' exam scores has been to base this prediction on the previous educational history of students. In this paper, we present a model that bases this prediction on students' performance on several tasks assigned throughout the duration of the course. In order to build our prediction model, we use data from a semi-automated peer-assessment system implemented...
The enormous amounts of data that are continuously recorded in electronic health record systems offer ample opportunities for data science applications to improve healthcare. There are, however, challenges involved in using such data for machine learning, such as high dimensionality and sparsity, as well as an inherent heterogeneity that does not allow the distinct types of clinical data to be treated...
We review strategies for applying statistical inference to system design and management. In design, inferred models act as surrogates for expensive simulators and enable qualitatively new studies. In management, inferred models predict outcomes from allocation and scheduling decisions, and identify conditions that make performance stragglers more likely.
Modeling Extract-Transform-Load (ETL) processes of a Data Warehousing System has always been a challenge. The heterogeneity of the sources, the quality of the data obtained and the conciliation process are some of the issues that must be addressed in the design phase of this critical component. Commercial ETL tools often provide proprietary diagrammatic components and modeling languages that are not...
The vigorous growth of big data has triggered both opportunities and challenges in business and industry. However, Web big data distributed in diverse sources with multiple data structures frequently conflict with each other, i.e. inconsistency in cross-source Web big data. In this paper, we propose a state-of-the-art architecture of auto-discovering inconsistency with Web big data. Our contributions...
Mathematical and uncertainty modelling is an important component of data fusion (the fusion of unprocessed sensor data) and information fusion (the fusion of processed or interpreted data). If uncertainties in the modelling process are not or are incorrectly accounted for, fusion processes may provide under- or overconfident results, or in some cases incorrect results. These are often owing to incorrect...
Research shows that people consistently reach more efficient solutions than those predicted by standard economic models, which assume people are selfish. Artificial intelligence, in turn, seeks to create machines that can achieve these levels of efficiency in human-machine interaction. However, as reinforced in this paper, people's decisions are systematically less efficient — i.e., less fair and...
Artificial agents are becoming artificial companions, interacting with the user on a long-term basis. This evolution brought new challenges to the affective computing domain, such as designing artificial agents with personalities to the benefits of the user. Endowing artificial agents with personality could help to increase the agent's believability, hence easing the interaction. This paper touches...
Wireless sensor networks (WSNs) are collection of sensor nodes that unite together to monitor an environment or a system. Due to abundant workload on node near the sink makes faster energy depletion than other nodes. Due to this, lifetime of WSNs to some amount, is resolved by the power consumption between sensor node & sink. Hence, CSMA/SF is used to reduce power consumption for sensing nodes...
Cloud computing is recently has emerged as a pattern for hosting and service delivery on internet and has rapidly become a hot topic in academic and commercial environments and has attracted many people. Nowadays, we are encountering various cloud service providers. One of important aspects in cloud computing is service level agreement which is a contract involving service agreement between client...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.