The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ZoneIT — at the University of the Western Cape renamed in UDUBSit — was first developed by the University of Ghent in Belgium as a sharing application for and by the student community. This app is adapted and contextualised to the UWC context by way of a living lab approach. This paper describes and analyses the results from the needs analysis, which formed the first step in the living lab approach...
The use of Information and Communication Technologies (ICTs) in a cooperative way can give a good improvement in the educational field; in developing countries, especially in Sub-Saharan area. Sustainable technologies and collaborative LMS are investigated in a case study as possible ways to improve, towards distance learning systems, education and towards it, social empowerment and development. A...
The amount of music in digital form increases due to the improvement of internet and recording technologies. With this increase, the automatic organization of musics has emerged as a problem needs to be solved. For this reason, Music Information Retrieval (MIR) is commonly studied research area in recent years. In this context, with the developed Music Information Systems solution is sought for some...
In floating-point arithmetic, a desirable property of computations is to be accurate, since in many industrial context small or large perturbations due to round-off errors may cause considerable damages. To cope with this matter of fact, we have developed a tool which corrects these errors by automatically transforming programs in a source to source manner. Our transformation, relying on static analysis...
The paper deals with the Knapsack Problem with conflicts, also known as the Disjunctively Constrained Knapsack Problem (DCKP). The conflicts are represented by a graph whose vertices are the items such that adjacent items cannot be packed in the knapsack simultaneously. We consider a classical formulation for the DCKP, study the polytope associated with this formulation and investigate the facial...
Cases have become commonplace for learning as they bring a connection to reality though rarely used for assessment. The case-based exam combines learning with assessment in the same instrument. Students familiarize themselves with a pre-exam version of the case while applying their textbook knowledge to the expected questions. The actual exam case adds additional information that invokes higher cognitive...
In this contribution a process and a way for a standardized documentation are proposed for the creation of gamified and competency-based learning activities. Furthermore the application of the process and its documentation is described by using an exemplary learning activity which was created, implemented and evaluated. The findings indicate, that the use of gamification design elements for learning...
Laplacian score used to select the most relevant income (input) indicators for Middle East countries, has shown good classification performances of those countries, while reducing their input indicator space. In this paper, we propose a new way to calculate the similarity matrix used by this Laplacian score in order to perform the selection. This similarity matrix is calculated using selected outcome...
As the adoption of enterprise Big Data platforms mature, the necessity to maintain systematic catalogue of data being processed and managed by these platforms becomes imperative. Enterprise data catalogues serve as centralized repositories of storing such metadata about data being handled by such platforms, enabling better data governance, security and control. Standardized approaches, methodologies...
Ihıs article presents an analysis on the attacks related to the sensitive data breach in the Web ecosystem. The study is based on an Meta-Analysis which identified the significance of 21 years of relevant contributions to the subject. Considering the results we elaborate two contributions: (i) we group attacks according to their behavior and (ii) we reveal the most serious emerging attacks. Additionally,...
The execution of sensing services within the Internet of Things (IoT) mandates considering IoT characteristics which include heterogeneity, scalability, dynamicity, randomness, and multiple ownership. In such environment new types of sensing coverage holes posed by anchor misplacement arise. The first type is actual coverage holes that have been falsely hidden and unreported. The second one is perceived...
Estimating the structural characteristics of large graphs from a sample is a classical problem. In this study, we propose asymptotically unbiased estimators for the average degree characteristic of a network under ego-centric sampling. In this sampling design, we first sample a number of vertices called ego vertices from the underlying graph and then obtain their ego-centric graph. Ego-centric graph...
The aim of this paper is to present a taxonomy for security threats on the Web ecosystem. We proposes a classification model based on 21 vectors divided into 8 distinct security threats, making use of levels of abstraction and criteria for discrimination which consider propagation and similarity in vulnerabilities. We also propose to estimate the risk factor and impacts on assets, considering data...
Developing efficient and effective decision making support includes identifying means to reduce repeated manual work and providing possibilities to take advantage of the experience gained in previous decision situations. For this to be possible, there is a need to explicitly model the context of a decision case, for example to determine how much the evidence from one decision case can be trusted in...
Smart home is one of the most important applications of ubiquitous computing. In this work, we propose an infrastructure of Vietnamese Smart homes as well as a training framework for activity recognition and forecast. In this framework, active learning technique is applied and a new mining algorithm is proposed. In addition to activity recognition, a forecast mechanism is also added into the smart...
While the design of entertainment systems and 3D games often incorporates time and space in a creative and flexible manner, space and time are often viewed in a more rigorous and limited approach when designing everyday virtual environments applications. The limited exploration of temporal and spatial aspects in the design of everyday virtual environments could limit user engagement and impact the...
In this paper, we suggest using a hybrid projection to increase the vertical geometric field of view without incurring large deformations to preserve distance perception and to allow the seeing of the surrounding ground. We have conducted an experiment in furnished and unfurnished houses to evaluate the perception of distances and the spatial comprehension. Results show that the hybrid projection...
Architectural rules are often defined but rarely tested. Current tools offer limited functionality and often require significant effort to be configured, automated and integrated within existing platforms. We propose a platform that is aimed at reducing the overall cost of setting up and maintaining an architectural conformance monitoring environment by decoupling the conceptual representation of...
Storytelling is a foundational activity in every human culture, and the stories humans tell emanate from and result in each culture's unique history and mythology. Storytelling can also be an effective business tool for the creation of workplace culture. In the hands of capable leaders, storytelling can build strong culture, resulting in high employee engagement, which leads to high performance organizations...
Situation awareness is an emerging concept in ubiquitous environments, particularly the learning ones. Situation-aware systems aim to infer the user's situation from detected context. Given the fact that detected context information pieces are prone to sensors' quality, recent quality-awarecentred researches are basically interested in the evaluationof the quality of context (QoC). However, so far...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.