The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our work aims at helping teachers to monitor learners' engagement during mind mapping activities. The use of mind maps helps students to elaborate cognitive learning strategies like creating and organizing contents. To assess the quality of these mind maps, teachers need tools to understand students' choices and strategies when constructing their mind maps. We have defined in collaboration with teachers...
Keeping students attentive during lectures may significantly improve learning outcomes. Traditional methods of attention estimation cannot offer a real-time feedback to the teacher. We present a technical concept of student attention monitoring during a lecture. The system utilizes a set of cameras providing tracking of the behavior of individual students in the classroom. The monitoring system is...
Previous studies which explored the effects of typographic variables on Chinese text reading on small devices fixed the viewing distance from eyes to the screens. Hence, their results might not be generalized to the typographic design of Chinese texts on small devices. Therefore, the article tried to investigate the effects of Traditional Chinese character size and font style on reading performance...
The constant demand of healthcare has led to different technological sectors to consider new mechanisms that facilitate the monitoring of vital signs. This work is in the context of the development of a monitoring system that consist of multiparameter acquisition elements that have a power consumption of 1,5 W. It is a portable device with a size of 66 mm x 20 mm x 70 mm, displays its readings in...
In complex supervisory control settings, inadequate monitoring behavior is a substantial source of human error and a risk factor threatening human life and the environment. In this paper, we present a problemoriented approach to support a commander supervising multiple highly-automated unmanned aerial vehicles (UAV) to perform adequate monitoring behavior. Our approach utilizes an ambient light display...
Wireless Sensor Networks (WSNs) are rapidly gaining popularity in various critical domains like health care, critical infrastructure, and climate monitoring, where application builders have diversified development needs. Independent of the functionalities provided by the WSN applications, many of the developers use visualization, simulation, and programming tools. However, these tools are designed...
Actual electric network infrastructure is poorly adapted to the new requirements of the society for reliability, efficiency and sustainability. Thus, it must undergo an intense modernization in the next years, becoming smart, also known as Smart Grids. In this Smart Grid context, computer systems will be a key hole in the analysis and monitoring of several devices that are connected to the grid. This...
Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources. This presents a significant challenge as the person with the network management expertise is not necessarily the person who has the task or vision of how to maximize the value of these services. Conversely it would be valuable...
Network scans visualization provides very effective means for to detection large scale network scans. Many visualization methods have been developed to monitor network traffic, but all the techniques or tools still heavily rely on human detection. They seldom consider the importance of network event characteristics to the network data visualization, and cannot detect slow scans, hidden scans etc....
In this paper we present an application of computer vision techniques to obtain specific information about the behaviour of the people passing in front of a target scene. This is done by analyzing videos captured by cameras monitoring an area under surveillance. The target scene can be a large plasma screen, a projected image, an advertising poster or a shop window. An example of the type of information...
Interpersonal communication is based on acoustical and visual information exchange. Videoconferencing systems allow the communication between people separated by large distances by recording acoustical as well as visual information. In this article, we present a multi person videoconferencing system integrated in an Augmented Reality framework. Existing Augmented Reality applications already support...
Policy-based management is typically used to manage large and complex systems, e.g. the management of telecommunications networks. When collaborating multi-disciplinary managers try to create policies from their own viewpoint they are hindered by a lack of a common vocabulary and an inability to understand how the complex system currently operates and how it is constrained. For example, modern telecoms...
Texture is an important property of fire smoke, which is a significant signal for early fire detection. This paper describes a method of analyzing the texture of fire smoke combining two innovative texture analysis tools, Wavelet Analysis and Gray Level Cooccurrence Matrices (GLCM). Tree-Structured Wavelet transform is used to represent the textural images and GLCM are used to compute the different...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
Hidden functionality in software is a big problem, because we cannot be sure that the software does not contain malicious code. We conducted an experiment where we studied the relationship between architecture constructs, dynamic behavior and security vulnerabilities. We also studied to what extent architecture analysis tools can assist in detecting security vulnerabilities that are caused by architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.