The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recommender systems help people to find items of interest by utilizing past user interactions (such as product views, ratings, and purchases). Today many e-commerce sites and large scale web applications use recommender systems and provide their customers personalized products. In this work we will share our recent experience in developing a job recommender system based on collaborative filtering...
Cloud computing has recently become an extremely useful facet of modern distributed systems. Some of its many applications lie in the development of web services, its federation with the Internet of Things (IoT) and services for users in the form of storage, computing and networking facilities. However, as more services start utilizing the Cloud as a viable option, security concerns regarding user...
It is predicted that cryptocurrencies will play an important role in the global economy. Therefore, it is prudent for us to understand the importance and monetary value of such cryptocurrencies, and strategize our investments accordingly. One of the ways to obtain cryptocurrency is via mining. As solo mining is not possible because of the computational requirements, pool mining has gained popularity...
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health...
Administrative Role-Based Access Control (ARBAC) models deal with how to manage user-role assignments (URA), permission-role assignments (PRA), and role- role assignments (RRA). A wide-variety of approaches have been proposed in the literature for URA, PRA, and RRA. In this paper, we propose attribute-based administrative models that unify many prior approaches for URA and PRA. The motivating factor...
This study examines e-Collaboration processes within temporary and ongoing virtual team by analyzing the level gaps of these processes according to the virtual team type. A quantitative test was carried out to compare the means gaps between the two virtual team types in five common collaboration processes. Then, employing a qualitative analysis, we constructed a conceptual model to understand the...
The desire of moving from data to intelligence has become a trend that pushes the world we live in today fast forward. Machine learning and data mining techniques are being used as important tools to unlock the wealth of voluminous amounts of data owned by organizations. Despite the existing effort of explaining their underlying machinery in layman's terms, data mining models and their output remain...
With the development of Internet e-commerce, shopping online has become very popular. Online stores have the advantage of having more items in their catalogue without worrying about shop constraints. In this scenario, recommendation systems are useful as they can help users in identifying items that they might be interested in. After shopping users usually provide feedback in the form review and ratings...
In the paper we deal with Massive Open Online Courses (MOOCs) on safe Internet usage among primary school children. This topic is getting more important every day due to the current age of digital technology. We focus on MOOCs used by primary school students, since Internet safety is definitely a topic which they must get to know. The results show that, with suitable motivation and students' active...
In case that individuals feel their privacy is violated while using any recommender system, they might be willing to declare incorrect information or even completely refuse to use such services. To relieve customer concerns, privacy risks that are inherent in the utilization of such systems need to be discussed principally, and service providers should offer privacy-preservation mechanisms. Also,...
Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to...
High-end equipment manufacturing plays a core role in the equipment manufacturing industry. Analyzing user requirements is crucial in the process of high-end equipment manufacturing. A requirement generation model for the high-end equipment manufacturing is proposed based on recommendation algorithm, which can recommend some requirements to assist users in validating and managing their requirements...
The current network architecture is built on a host-centric communication model that is suitable for early network information transmission needs. However, with the emergence and rapid growth of network applications and services, the adaptability, flexibility, scalability and other defects have become increasingly prominent, and the current network architecture can't dynamically provide the required...
To make open source software development successful, acquiring contributors from outside is an important factor. However, despite the need for external contributions, many projects have disappeared without being able to acquire contributors. GitHub, an Internet hosting service for the purpose of open software development, is widely used for research projects of related topics. However, different from...
Degree distribution is an important characteristic of complex networks. To better understand the mechanism of complex networks, it is necessary to analyze their vertex-degree sequences. We had shown before that, for a complex network model with power law distribution or exponential distribution or general degree distribution, the length l of the unequal vertex-degree sequence is of order logN. Poisson...
The present study aims to identify the intellectual structure of computed-supported collaborate learning (CSCL) so as to provide more insights into the research trend, the most influential scholars, categories, and regions. This paper analyzed the articles and conference publications derived from Web of Science (WOS) in the field of CSCL from 2006 to 2016. A total of 792 articles were selected and...
We present Socialite, a novel end user programming tool for the Social Internet of Things (SIoT). SIoT is a new paradigm where IoT merges with social networks, allowing people and connected devices as well as the devices themselves to interact within a social network framework. Through an online survey with 60 potential users, we identified eight desired features for the SIoT, which were then clustered...
The technological convergence of the mass media is the result of a long adaptation process of their communicative resources to the evolutionary changes of each historical moment. Thus, the new media became (plurally) an extension of the traditional media, allowing to the public access information in a wide range of digital devices. In this sense, our qualitative study with empirical-descriptive nature...
Currently, we realize that in general tourists spend a lot of time planning their trips because they need to make the most of every moment. In this sense, technology has been a great ally, especially to make this planning as well as to adapt in the event of some unforeseen during the journey. In the last decade, an increasing trend was observed, the traveler or tourist is always connected to mobile...
How does digital activism call upon citizens to understand their own role within a democratic political system? We explore citizen activists' use of digital technologies for civic engagement purposes in the case of a particular burgerinitiatief (citizen initiative) in the Netherlands. A grassroots undertaking, Ons Geld (Our Money) sought to spread awareness on the shortcomings of the monetary system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.