The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
STEM outreach continues to grow and be an effective means to inspire young minds. Finding optimal paths and methods to reach these students continues to be a focus for educators and researchers. As with any system, there is a complex network of influencing factors and stakeholders that ensure the system operates effectively. This paper examines methods to utilize stakeholders outside of the typical...
The purpose of this paper is twofold. First, it explores the relationship between gender grouping in small group work in design-based science (DBS) in high school biology and female students' engagement and achievement in both biology and engineering. Second, it presents a mixed methods approach to video data analysis by introducing how the researchers analyzed student engagement in the engineering...
STEAM-based courses are increasingly becoming popular in introductory programming courses but not many of these efforts focus on non-major undergraduate students and less is known about its effectiveness with career-bound students at the collegiate level. This paper describes our results and the lessons learned in teaching and implementing an EarSketch based introductory programming course for non-majors...
This paper concerns an experiment that attempts to understand the impact the physical and virtual environment can have on human emotions. To do this four blended learning workshops are held covering different amounts of technology enhanced learning based on the blended learning continuum. In each workshop there are two of the same participants – one who is autistic and one who is empathic – and then...
In this article, we consider a class of contextual insertion-deletion (Ins/Del) system on strings and languages. The notion of sequential operations to a given contextual insertion-deletion (Ins/Del) has been introduced for the first time. We found that sequential operation in contextual system characterizes non synchronized pure pattern language (NSPPL) and context free language (CFL). Moreover,...
Nowadays, the demands for composite services with devices such as sensors/actuators and Web services have increased [1]. Many kinds of cloud services that can connect to real world, as typified by image recognition or speech recognition has come into widespread use to address the limitation in information processing on devices. In that situation, sensors are also provided as sensor services that senses...
The Levy Walk (or Levy flight) is a concept fromBiomathematics to describe the hunting–behaviour of manypredatory species. It is a very efficient way to find prey in avery short time frame. We now want to use this concept ina clustering–context to – if you so will – "hunt" for clusters. We describe how we convert this concept into an efficient wayto find cluster centres by linking the data...
Pattern mining is a fundamental topic in data mining area. Many pattern mining techniques, such as closed and maximal pattern mining have been proposed for different applications. However, when calculating the frequency of a pattern, the existing techniques treat each word equally. For example, although the word ‘pie’ in ‘I love eating pie.’ is quite different from ‘pie’ in ‘american pie’, ‘pie’ in...
Borgs et al. [2016] investigated essential requirements for communities in preference networks. They defined six axioms on community functions, i.e., community detection rules. Though having elegant properties, the practicality of this axiomsystem is compromised by the intractability of checking twocritical axioms, so no nontrivial consistent community functionwas reported in [Borgs et al., 2016]...
This paper focuses on the identification of overlapping communities, allowing nodes to simultaneously belong to several communities, in a decentralised way. To that aim it proposes LOCNeSs, an algorithm specially designed to run in a decentralised environment and to limit propagation, two essential characteristics to be applied in mobile networks. It is based on the exploitation of the preferential...
This study was conducted to examine the effects of Problem Based Learning (PBL) on students' intrinsic motivation compared with that of a conventional approach, in a procedural-based and number-oriented subject. A quasi-experimental study was conducted for five weeks on 81 first-semester Diploma students, who were attending the subject of Fundamental Accounting (DPA1013). An experimental, pre-test...
This paper proposes an educational model for groups of investigation in technological programs based upon the concepts of self-learning and self-management. The aim of this model is the definition by levels of learning and the definition of some tasks needed in order to that the knowledge will be acquired by the students in formation on investigation, allowing to these generate new knowledge that...
A podcast combines the liveliness of a FM radio channel with the economy of internet blog posting. They are especially convenient for scenarios when there is limited internet ability and connectivity for example in the car, the gym, etc. While both the volume and heterogeneity of content is huge it becomes operationally difficult to manually categorize or tag these audio items, thus manage them in...
Can we mine latent patterns from discrete, non-numeric heterogeneous data? Many modern data sets contain heterogeneous non-numerical information measured over Boolean, ordinal and ternary scales. Values for features like these are "mixable" in the sense that they have intuitive non-linear analogs to classical "addition" (e.g. logical OR for Boolean data). We present a novel, general...
Twitter is becoming a popular microblogging platform for exploring various socio-political movements. We extract 2.7 million Brexit related tweets to decipher the European Union (EU) referendum deliberations. Our volumetric analysis correctly predicts the outcome of 2016 Brexit referendum. We also investigate whether Twitter discussion adequately reflects the socio-economic concerns related to the...
Converting a sentence to a meaningful vector representation has uses in many NLP tasks, however very few methods allow that representation to be restored to a human readable sentence. Being able to generate sentences from the vector representations demonstrates the level of information maintained by the embedding representation – in this case a simple sum of word embeddings. We introduce such a method...
Semi-supervised learning is the required paradigm when data are partially labeled. It is more adapted for large domain applications when labels are hardly and costly to obtain. In addition, when data are large, feature selection and instance selection are two important dual operations for removing irrelevant information. To address theses challenges together, we propose a unified framework, called...
Outlier detection is the task of automatic identification of unknown data not covered by training data (e.g. a previously unknown class in classification). We explore outlier detection in the presence of hubs and anti-hubs, i.e. data objects which appear to be either very close or very far from most other data due to a problem of measuring distances in high dimensions. We compare a classic distance...
In order to generate effective results, it is essential for a recommender system to model the information about the user interests (user profiles). A profile usually contains preferences that reflect the recommendation technique, so collaborative systems represent a user with the ratings given to items, while content-based approaches assign a score to semantic/text-based features of the evaluated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.