The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RFID is one of wireless technology that can be used in various sectors of human life like military, school, sport, health, industry, security, animal, and other areas. RFID mainly consist of two important parts, the reader (combination of transceiver and antenna) and the tag (consist of unique number). The use of unique number inside the tag is very useful as an identity of an object or as tracking...
The aim of this work is to make a visibility test, which answers how the environment and form influence colour perception. A test program in C# was developed, where the observer can make experiments with different settings. The variable background colour and the variable form colour help to test how these factors influence colour perception. In a second experiment a Tobii X60 eye tracker was used...
In every field viz. medical science, engineering, law etc. there is a strong need of expert system. Expert system as a field of AI is used for smart and generalized process. We are proposing development of a expert system using Institutional development approach. In this system we are making use of heuristic technique and method for knowledge elicitation technique which is used for developing a knowledge...
Joint-venture alliance project partners have different and sometimes conflicting goals and incentives, and project members often have short project stays and weak allegiance to overall project goals. Given this, the sources of alignment required for the diffusion of selected and mandated ICT on projects appears to be limited. We ask, how are individual, organizational and project incentives aligned...
This paper describes the pedagogy of how the 7-week course on computer fundamentals is introduced and taught to a class of 700 first year undergraduate students from the schools of business and computing. The computer fundamentals course itself covers theoretical topics such as the hardware and software of computers, information systems and programming basics as well as practical topics such as using...
Classification is one of the main issues of data mining. Knowledge hidden in the data can be discovered by induction of decision rules. However, with the increase in the size of the decision tables there is a need to decompose the problem. An appropriate solution to this problem may be hierarchical induction of decision rules. In this article the decomposition algorithm of decision tables containing...
Many annotation systems proposed in the learning domain suffer from an under-exploitation of the annotation's semantics at the level of the assistance presented to the learner during his annotative activity. Thus, these tools offer the same classic features to its users, such as management, search, sharing and storage of annotations. In this paper, we propose a new annotation system which differs...
Given a concrete scenario, there is frequently a huge quantity and variety of exercises that we can write about it. In this article, we present an algorithm which allows us to automate this process. To generate mathematical exercises, we start from the relations between the variables present in the scenario, we calculate the possible exercises, we analise the complexity of its resolution process and...
Learning to use distributed business systems requires expensive and sustained training efforts. An approach to nurture local users to become mentors for colleagues has been developed as an alternative to training courses. A user level plus a mentor level distance learning course were evaluated amongst users of a health information system in Malawi. The user level course was adequate for users with...
Nowadays systems administrators are facing with huge challenges in securing and protecting information systems. Intrusions attempts are increasing and becoming more sophisticated by days leading to the common presumption that any information systems can be hacked into, no matter what level of security measures are being taken. Systems administrators are also relying heavily on security tools to secure...
Information and Communication Technology (ICT) is increasingly becoming an important facilitator of effective and efficient delivery of services in higher education institutions (HEIs). The introduction of open, distance and e-learning (ODEL) mode of study has made it necessary for academic libraries to incorporate computer-based information systems (CBIS) in order to facilitate easier access to information...
Creation and maintenance of a computerized information system that not only manages agricultural field experiments data efficiently but also provides its statistical analysis is essential for researchers, planners and farmers. Generally data created by the researchers is collected, processed and stored in different physical locations and is poorly disseminated. Data is usually retained at the level...
The paper proposes a new model, method and algorithms for processing a Subject Domain (SD). It considers an SD as a tuple (E,V,T), where E is a set of all objects of this domain, V is a set of all connections between these objects, T is a set of mass problems that can be solved in this domain. Each object is represented by its essential attributes. This allows us to describe SD, to solve most of the...
Herd literature suggests that people tend to discount their own beliefs and imitate others when making adoption decisions. However different people based on their characteristics exhibit different degrees of herd behavior. In the same vein, the characteristics of technology must fit with the requirements of the task that an adopter wants to fulfill Characteristics of individuals and of the technology-to-be-adopted...
Social networks are representation of complex systems defined by the patterns of relationships among a system's components. Networks are created by information flows or other relations among entities through time and space. The goal of network analysis is to describe the structure of a higher-level system based on the pattern of linkages among a set of lower level nodes, and how this structure changes...
The debates on materiality and sociomateriality, hailing from science studies and organization studies, allow information systems (IS) researchers to evade received distinctions between the social, natural and technical. The literatures that inform this Minitrack contest a purely information-based perspective that posit abstract meanings and immaterial data divorced from situated contexts. Instead...
This paper aims to advance understanding of information systems (IS) through a critical reflection on how IS are currently defined in the IS literature. Using the hermeneutic approach for conducting literature reviews the paper identifies 34 definitions of IS in the literature. Based on the analysis of these 34 definitions four different views of IS are distinguished: a technology view emphasizing...
A classical range-free localization algorithm for Wireless sensor networks, which called DV-Hop Algorithm, is widely used in many fields. It has the defect of low location accuracy. In this article, we proposed a position-correction algorithm based on hop distance of DV-Hop, when the primary location finished, the propose algorithm can make a correction for the previous locating position. Simulation...
Recently more and more sensor networks are powered by diverse environmental energy surrounding the deployment field. The charging process of such nodes results in intermittent network topology, through which it is very hard to deliver packets efficiently. CTP is a de facto routing protocol for wireless sensor network applications driven by the TinyOS. It constructs and maintains a routing tree by...
This paper illustrates a rule induction approach to discover decision patterns by using Dominance-based Rough Set Approach (DRSA) to unravel the intrinsic factors for learning successes and failures in a cooperative group-learning environment. It employs an innovative group quiz method in a university Management Information Systems (MIS) course which induces students into a unique learning process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.