The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Shortage of qualified cybersecurity workforce is a national problem. Without an effective solution, people's daily lives, business operations, and even national security are in jeopardy. Higher education institutions have invested in various approaches to train college students to acquire cybersecurity related knowledge, skills, and abilities. The existing approaches still need improvement and refinement...
Service-dominant logic, called S-D logic, proposed a new thought oftheoretical foundation for service economy from a service centricviewpoint, but basic terms and their relationship are not representedin technical form. We first formalize S-D logic in a mathematical form. In addition to the terms that have already been introduced in S-D logic, we define terms of 'capability' and 'potential'. These...
‘Ecole-Numerique’ or Digital Schooling has become an emerging trend for primary schooling worldwide. This paper attempts to assess the readiness of educators and schools in the migration from “Informatique” to “ÉcoleNumerique” for young learners at primary levels. A case study was drawn from two french private schools X and Y in Mauritius. To achieve this aim, the TAM model was adapted as guideline...
English, though not being the native language, is the language of instruction across the schooling years in Mauritius. Indeed, English literacy is introduced to young students at the pre-primary level as it is a pre-requisite for all other subjects, except French language in Standard One of primary level. In consequence, it is imperative that students acquire English literacy skills at pre-primary...
Knowledge about problem solving in business events is complex, besides, there is a dispersity in terms of the storage of the knowledge. As a result, islands of knowledge are common in problem solving of business events. Knowledge links established norms of the business problem to solve in the process of knowledge structure and connect with each other. Scenario links solving scenario factors of business...
Cloud computing has been identified as a new paradigm in the field of computer networks services and has changed the way businesses interact with IT services by offering a strong base of virtualized services in both hardware and software platforms while delivering different on demand business models. This paper presents a new model of Cloud computing combined with E-Learning in schools and universities...
For the forest, the fire is an extremely serious damage. In the forest fire point positioning research, it was found that the monocular vision system combination of digital elevation model(DEM) is a better way to locate fire position. However, this method has insufficient. This paper presents an improved monocular forest fire point positioning method on the grayscale bit plane. This way can make up...
In this paper, we propose a distributed frequency regulation framework for prosumer-based electric energy systems, where a prosumer (producer-consumer) is defined as an intelligent agent which can produce, consume, and/or store electricity. Despite the frequency regulators being distributed, stability can be ensured while avoiding inter-area oscillations using a limited control effort. To achieve...
For the recent advances of Cloud Computing technologies, cloud applications have been popularity for their rich set of features. Therefore, their practical use for promoting business values can be expected. As such, cloud applications are recognized as a trend for the next generation of existing Web applications, and hence how to migrate these Web applications to the clouds becomes a desired field...
The act of applying game mechanics and dynamics (which have been traditionally used in video games) into business applications is being widely trialled in an effort to make conventional business software a bit more participative, fun and engaging. This new trend, named ‘gamification’ has its believers and of course, its critics who still need convincing that the concept is an effective and beneficial...
In this paper, we conducted a review of techniques and methods used for collaborative data management for business purposes on the WEB. The aim was to propose a document flow optimization and to offer an information technology support for all departments of an organization. In a business organization or a firm, professionals involved in solving specific tasks either use the same data (common information)...
The paper concerns the problem of using and implementing mobile solutions in SMEs (Small and Medium Enterprises). Some of the existing examples of mobile solutions are analyzed and characterized. A significant part of the paper is a presentation of the research on mobile solutions which can be used to manage the business activities in SMEs. The role and methods of testing the mobile systems have been...
Writing a user story is essential to communicate with end users and developers. It is popular practices found in most agile methodologies. Therefore, to reuse the user stories from the previous successful projects becomes necessary. In this paper, we propose the business process ontology for defining user story. The ontology is a knowledge base designed to collect the user stories in term of N-triple...
Consumer choices are enormously influential in the success of the companies and organizations behind the highly competitive global service and product offerings of today. Consumer choice relates to preference, i.e. a set of assumptions a person creates around a service or a product such as convenience, utility or aesthetics. Furthermore, consumer preferences allow ranking of different assumptions...
Cyber-physical systems (CPS) are a set of physical entities controlled by software systems to reach a specific goal under temporal and physical resource constraints. Existing research pays little attention to the modeling of CPS at the business process layer, and is lacking in considering the temporal dimension. In this paper, we present a set of time patterns applied to the cyber and physical elements...
Heterogeneous rectangular dissections are frequently used in information processing such as multiple paged books in spread sheet languages and multi-layer image data. In previous studies, a hexadecimal grid graph model was proposed for multilayer rectangular dissections and certain algorithms were provided. In this paper, we propose a 16-ary list structure to implement their algorithms for the hexadecimal...
During their collaboration in a virtual learning environment, students leave “digital traces” that record their interaction with other students, instructors, and learning objects. These traces allow instructors to monitor students' work and encourage isolated or passive ones to participate actively. They also help course designers to assess students' behavior and experience in the learning environment...
Data is a part of information that is formatted in some special approach. In general way data can be exist in various forms like numbers or text on a paper, as bits or bytes in computer memory, or as facts in the brain of human beings. Moreover, data is present each and every place in the universe. There is no limit of the data present all over the universe. Since the day when human civilization starts,...
Prefixspan algorithm with GRC constraints which generates sequential patterns by using prefix projected pattern growth approach is implemented. Other than frequency this algorithm also uses gap, compactness and recency constraints during sequential pattern mining process. The gap constraint applies limit on the separation of two consecutive transactions of discovered patterns, recency constraint makes...
One of the important approach in data mining is sequential pattern mining that is used for discovering behaviors of sequential databases. There are various challenges in sequential pattern mining such as efficiency and effectiveness. In this paper different sequential pattern mining algorithm are discussed such as GSP, FreeSpan, PrefixSpan, and CAI-PrefixSpan to improve performance to finding sequential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.