The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper an eye blink rate tracker is proposed for the persons working with computer for long duration. Now-a-days a common problem of computer users is Dry Eyes. Low blink is the reason behind redness and dryness of the eyes. While working in front of a computer screen, blink rate tends to decrease. This leads to inadequate tear film formation on the eye cornea. Designing an eye blink detection...
The advent of native mobile technologies particularly advances in the Mobile Operating Systems (OS), popularly among Android, Windows Mobile OS, iOS and their acceptance as an alternative to existing browser based access; has enabled the remote access of equipment and instruments over the World Wide Web (WWW). While more and more remote control solutions have been implemented in the industry via Local...
In this paper, we describe the development and validation of three survey instruments designed to measure the human factor in information security and privacy. These instruments are intended to measure the extent to which people engage in the responses necessary to mitigate three different information security and privacy threats: computer performance compromise, personal information compromise, and...
IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture...
IEEE 802.15.4 accordant devices are resource-restrained; thereby cannot execute conventional awkward routing algorithms. Even though, ZigBee provided a elementary routing algorithm for tree networks, it cannot manage long linear networks typically set up in roadside, mines, agricultural field, mountains etc. In this paper, we have nominated a source routing based light-weight routing algorithm that...
Software piracy worldwide has resulted in serious industrial, academic and economic consequences. However, the problem can be solved if the root causes can be identified. Personality traits are said to be an effective positive influence on unethical behaviour. For this reason, personality traits could be a predictor for software piracy. This study investigates personality traits as a factor in students...
Dynamic memory allocation is one of the most ubiquitous operations in computer programs. In order to design effective memory allocation algorithms, it is a major requirement to understand the most frequent memory allocation patterns present in modern applications. In this paper, we present an experimental characterization study of dynamic memory allocations in seven real-world widely used applications...
Early test systems were designed for manual operation where the user had to select front panel buttons and knobs to set-up and run tests. This method of testing was time consuming, expensive and prone to error. Automatic Test Equipment (ATE) was originally developed to take manual test scenarios and automate the repetitive procedures that technicians performed while conducting tests on Units Under...
Multicore processor architectures have been gaining increasing popularity in recent years. However, many available applications cannot take full advantage of these architectures. Therefore, many researchers have developed several characterization techniques to help programmers to understand the behavior of these applications on multicore platforms and to tune them for better efficiency. Characterizing...
This paper presents a new concolic execution-based smart fuzzer for detecting heap-based buffer overflow in the executable codes. The proposed fuzzer executes the target program with concrete input data and calculates the constraints of the executed path symbolically. The path constraints are used to generate test data that traverse new execution paths in the target program. For each executed path,...
e-Learning is a highly developing field in modern education. It provides many different possibilities for studying and assessment of learning outcomes. However, a problem of developing highly reliable identification methods for assessment procedures is still an important issue. This paper presents the results of our review of identification methods currently realized in various e-learning systems...
This paper discusses design and implementation of an operational architecture of practical work remote controlled using embedded systems. This architecture relates to university courses in electronics, such as new approaches of low-cost remote labs. Students can access these labs from a local network in the university at any time and frequently compared to conventional teaching, without being fixed...
Computing Semantic Similarity (SS) between words is an important issue of many research fields. Several features from knowledge databases can be involved in the definition of semantic computing models. Gloss-based approaches exploit the short and precise description for a concept for better expressing its semantics. In this paper, we propose a new Gloss-based WordNet and Wiktionary semantic Similarity...
Limited by the real experiment teaching condition, it becomes an inevitable choice to carry out the online experiment teaching for modern distance higher education in the present stage in China, and this requires China's modern distance higher education to construct the experiment network courses. According to the problems of the students' lower participation in the demonstration experiment, the higher...
In this paper, we present an innovative mixed pedagogical method to improve teaching and learning in undergraduate courses related to computer area. The method proposes learning multi-criteria assessments and pedagogical strategies, such as problem-based learning, that should be carried out during the activities. This research was performed in a three-year case study in courses undertaken at the Federal...
Our institution has recently committed to develop five new entrepreneurially-minded elective courses called “IDEAS studios”. The entrepreneurially-minded aspects of IDEAS studios include close interaction with industrial partners and an emphasis on topics such as value proposition, opportunity recognition, intellectual property, and customer engagement. We hypothesize that in addition to specific...
At the higher education institutions education by means of the remote real experiments education has been in use for several years. It has become a part of mainly science and technology fields. Besides the unquestionable economic and technical advantages it is necessary to monitor also the effectiveness of the didactic use of remote real experiments, which is examined in this article. Based on an...
In the paper the authors briefly describe the aims and content of an international project focused on modernization of tertiary education in the target countries (the Ukraine, Armenia, and Georgia). The quality of teaching technical subjects is assured by providing practically oriented syllabi and modules in the embedded system environment and by creating remote laboratories in the target institutions.
During workshops on computer animation using Alice, a free platform for three dimensional computer animation created by Carnegie Mellon University, we detected and observed a series of different patterns of use of the platform by attendants. Most participants would start following instructions as precisely as possible. Within a short time some would divert to create visually attractive scenes worrying...
This study is an implementation of information technology for education, aimed to produce a model of online lab course with a collaborative environment using a desktop sharing application. In the digital electronics lab course, participants were divided into the groups, each of them consists of three members. A desktop sharing application was used to the digital circuit simulator as an offline program...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.