The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work aims to present the planning, development (methodology) and implementation (technologies used) of the learnning object (LO) SegurIdade Virtual, as well as highlighting the learning experiences with the object. The material was built in game format and seeks to develop, in a playful way, the critical thinking of the elderly public for the safe use of the internet. The object was builded based...
In daily life, we use the internet for many purposes. The Internet makes easier our life and it has led to the providing to occur new technologies. Several smart devices that use the Internet infrastructure generates digital data in different formats and with different generation speeds. The evaluation of the generated data is carried out by the algorithms associated with the field of machine learning...
The basic indicators of the life cycle of technology were analyzed and the generalized system for the evaluation of the life cycle phase is allocated. Indicators are considered as properties that technology must have to fit a certain stage of its existence. The existing approaches of technology development analysis were studied. The generalized classification, which is a list of indexes for the proper...
Academic misconduct is a frequent practice. Some examples are: to copy a work in whole or in part and present it as your own, or to buy academic work online. Introductory Computer Science courses are not an exception of these inappropriate situations. In projects (coding activities done in groups outside class) we use automatic plagiarism detection tools such as MOSS and JPlag. In addition, we have...
Routing in Delay-/Disruption-Tolerant Networking (DTN) requires specific solutions as link impairments prevent the use of ordinary Internet algorithms, based on a timely dissemination of network topology information. Among DTN routing algorithms there is a dichotomy between opportunistic and deterministic (scheduled) solutions. The former are numerous and apply to terrestrial environments; CGR is...
The overwhelming interest in the Internet of Things (IoT) shown by the industry, academia, and hobbyists alike compel experts to declare that IoT could be the next disrupting technology since the Internet. This new paradigm has taken everyone in the computing field by storm, not because it is an unknown technology, but because of the vast opportunities that it promises to provide, and more importantly,...
In order to promote Java programming educations, the Web-based Java Programming Learning Assistant System (JPLAS) has been implemented. JPLAS provides the code writing problem, where students write Java codes that satisfy the given specifications and submit them to the JPLAS server to obtain the marks using test codes instantly. Unfortunately, JPLAS could be accessed simply when the Internet connections...
The colors of characters suitable to presentation slides were proposed. Here, five color combinations were proposed. A combination has three colors of “Base color,” “Main color,” and “Accent color.” The “Base color” is for the background. The color white is used as the “Base color.” The “Main color” is for the part becoming the frame. The “Accent color” is for the place where we want to emphasize...
Automatic building of software projects providesa desirable foundation to support a large variety of softwareengineering research tasks based on open software repositories. In this paper, we propose the first technique to automaticallyextract software build commands from software readme files andWiki pages, and combine the extracted commands for softwarebuilding. Specifically, we leverage the Named...
The power of E-learning in furthering science and engineering education has been demonstrated by simulating a lab experiment on ac circuits on a computer in the form of a standalone application. Subtle concepts can thereby be made very easily understandable which may not be possible with a conventional experiment done in the practical lab. The application can also be transformed to a form that can...
The colors of characters suitable to presentation slides were proposed. Here, five color combinations were proposed. A combination has three colors of base, main, and accent colors. The base color is for the background. The color white is used as the base color. The main color is for the part becoming the frame. The accent one is for the place where we want to emphasize. This paper proposes two methods...
From 2004 to 2016 the Leipzig Linguistic Services (LLS) existed as a SOAP-based cyberinfrastructure of atomic micro-services for the Wortschatz project, which covered different-sized textual corpora in more than 230 languages. The LLS were developed in 2004 and went live in 2005 in order to provide a webservice-based API to these corpus databases. In 2006, the LLS infrastructure began to systematically...
Piaget's classic work on cognitive development showed that engaging learners in critical discussions with peers about ideas that are different than theirs leads to deep conceptual understanding. Implementing such an approach in computer science and, more generally, STEM, courses has some specific challenges. Based on Piaget's theory, we have developed a highly innovative collaborative learning approach...
There are a large number of educational resources available on the Internet through different repositories. However, authenticity methods of learning objects has not been widely adopted by repositories, making it difficult to verify the authors of the content. To solve this problem, our goal is to aid users and authors of learning objects to have a trusted verification of authenticity and versioning...
The implementation of devices or sensors developed over open source electronic platforms is a very important key of the projects aiming for promoting concepts such as Internet of things and Smart Cities. Due to the heterogeneity of these projects and especially the lack of a standard to regulate the communication process between the sensors and the application server, taking into account that many...
Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a novel classification algorithm called EST.Stemmer of Arabic text, it presents many important improvement areas which deals with some issues in Heavy Stemmers and Light Stemmers.
The aim of this study was to determine the effect of e-marketing and e-service quality on e-satisfaction and its impact on e-loyalty. This research was conducted on customers in Jakarta. Data were collected from a sample of 100 respondents. The data were analyzed using path analysis. The result of this study found that e-marketing did not affect the e-satisfaction. E-marketing and e-service quality...
An Application-Programming Interface or API provides a set of program functions that can be used to build new applications. In this paper, we study how to use the expectation-confirmation theory (ECT) to identify API usability problems, and what obstacles a novice developer faces when learning a new API and its accompanying development tools. We conduct a study over the impact of using a visual editor...
Network has become the key method to analysis the interacting targets. The Baidu Baike entry network was constructed by means of Baidu Baike entry related terms and term category attributes. And then according to the feature of the closely connection in communities and the sparsely connection between communities in organization structure, it can reveal the relationship between the different entries...
Thanks to the proliferation of internet, a lot of data are produced by both websites and personal users. The documents are required to be classified in terms of their content in order to reach the necessary information fast and correctly from produced data. One of the biggest difficulties in document classification systems is detection of attribute that represent the classes in best way. In this research,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.