Search results for "Application"

showing 10 items of 5559 documents

Understanding Social OER Environments—A Quantitative Study on Factors Influencing the Motivation to Share and Collaborate

2014

Social software environments are increasingly used for open education: teachers and learners share and collaborate in these environments. While there are various possibilities for the inclusion of such social functionalities for OER, many organizational, individual and technological challenges can hinder the motivation of teachers to share and collaborate in these environments. Current research cannot explain what barriers teachers face in social OER environments and how those challenges influence their motivation to engage in such environments. An exploratory factor analysis was used in the context of schools and higher education institutions to investigate the possible barriers to engagin…

ta113Knowledge managementHigher educationComputer sciencebusiness.industrySocial softwareGeneral EngineeringContext (language use)computer.software_genreExploratory factor analysisComputer Science ApplicationsEducationKnowledge sharingOpen educationta516Social mediabusinessInclusion (education)computerIEEE Transactions on Learning Technologies
researchProduct

Consumer value of camera-based mobile interaction with the real world

2013

Camera-based mobile interaction with the real world allows consumers to connect digital information with the real-world environment, and furthermore, to interact with real-world objects and places. To explore and understand the types of consumer value in the context of such consumer-level applications, we applied the critical incident technique to reflect actual use experiences from 107 application users with a recognized consumer value framework by Holbrook. The findings of the study suggest that at the current state value is heavily based on utilitarian efficiency and excellence. Although the applications enable a diverse value, they have yet to fulfill their potential in providing hedoni…

ta113MultimediaComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectContext (language use)computer.software_genreComputer Science ApplicationsHardware and ArchitectureHuman–computer interactionExcellenceState (computer science)ta512computerCritical Incident TechniqueValue (mathematics)Mobile interactionSoftwareInformation SystemsValue frameworkActual usemedia_commonPervasive and Mobile Computing
researchProduct

Evaluating the performance of artificial neural networks for the classification of freshwater benthic macroinvertebrates

2014

Abstract Macroinvertebrates form an important functional component of aquatic ecosystems. Their ability to indicate various types of anthropogenic stressors is widely recognized which has made them an integral component of freshwater biomonitoring. The use of macroinvertebrates in biomonitoring is dependent on manual taxa identification which is currently a time-consuming and cost-intensive process conducted by highly trained taxonomical experts. Automated taxa identification of macroinvertebrates is a relatively recent research development. Previous studies have displayed great potential for solutions to this demanding data mining application. In this research we have a collection of 1350 …

ta113Radial basis function networkEcologyArtificial neural networkComputer sciencebusiness.industryApplied MathematicsEcological Modelingta1172PerceptronMachine learningcomputer.software_genreBackpropagationComputer Science ApplicationsProbabilistic neural networkIdentification (information)Computational Theory and MathematicsModeling and SimulationMultilayer perceptronConjugate gradient methodta1181Artificial intelligencebusinesscomputerEcology Evolution Behavior and SystematicsEcological Informatics
researchProduct

A two-step, user-centered approach to personalized tourist recommendations

2017

Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniTourist applicationEngineeringUser profileSettore INF/01 - InformaticaPoint (typography)Process (engineering)Computer Applicationsbusiness.industry02 engineering and technologyRecommender systemWorld Wide WebTourist applicationsUser validationHuman–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryRelevance (information retrieval)businessDrawbackProceedings of the 12th Biannual Conference on Italian SIGCHI Chapter
researchProduct

Vertical Software Industry Evolution: The Impact of Software Costs and Limited Customer Base

2013

ContextSoftware systems are commonly used in a variety of industries as a means of automating organizational business processes. Initially, such software is often developed in-house by the vertical organizations possibly with the support of professional IT service providers; however, in many cases, internally developed software is eventually replaced with the software products provided by independent software vendors. These vendors often use license fees to recover their software development investments, as well as to gain some margin. However, if the vendor's customer base for a specific type of software is limited, then either the license fees are too high and hence the customers may pref…

ta113Social software engineeringComputer sciencebusiness.industrySoftware developmentComputer Science ApplicationsSoftware deploymentSoftware sizingSoftware constructionPersonal software processPackage development processBackportingbusinessSoftware engineeringSoftwareInformation SystemsInformation and Software Technology
researchProduct

Internet Adoption at the User Level: Empirical Evidence from The Gambia

2014

The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…

ta113VariablesPublic Administrationbusiness.industrymedia_common.quotation_subjectDevelopmentUnified theory of acceptance and use of technologyComputer Science ApplicationsPyramidCase study researchThe InternetMarketingPsychologyEmpirical evidencebusinessmedia_commonInformation Technology for Development
researchProduct

Career Transitions of eSports Athletes : A Proposal for a Research Framework

2017

eSports has boomed, the number of eSport athletes has grown rapidly, and many teenagers aspire to a have career in eSports. However, eSports athletes' careers involve many problems, such as career-entry difficulties, straining life habits, burnout, premature retirement, and post-career dilemmas. Despite a growing research interest in eSports, a void of knowledge exists regarding eSports athletes' career aspects. To address the gap in research, this paper aims to take an initial step by proposing a framework for eSports athletes' career transitions. The framework combines two approaches from sport psychology and sport literature. The framework can help eSports athletes, coaches, and other st…

ta113biologyLife habitAthleteselektroninen urheilu05 social sciencesApplied psychology050301 education030229 sport sciencesBurnoutbiology.organism_classificationSport psychologyurakehitysComputer Science Applications03 medical and health sciences0302 clinical medicineathletesConceptual frameworkeSportscareerPedagogyPsychology0503 educationtransitionsInternational Journal of Gaming and Computer-Mediated Simulations
researchProduct

Fall Detection Using Location Sensors and Accelerometers

2015

The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…

ta113education.field_of_studyContext modelUbiquitous computingaccelerometersaccuracyComputer sciencePopulationReal-time computingagingWearable computerContext (language use)ta3141accelerationAccelerometersensorsComputer Science ApplicationscontextComputational Theory and MathematicsFalling (sensation)educationLyingSoftwareSimulationsenior citizensIEEE Pervasive Computing
researchProduct

Research literature clustering using diffusion maps

2013

We apply the knowledge discovery process to the mapping of current topics in a particular field of science. We are interested in how articles form clusters and what are the contents of the found clusters. A framework involving web scraping, keyword extraction, dimensionality reduction and clustering using the diffusion map algorithm is presented. We use publicly available information about articles in high-impact journals. The method should be of use to practitioners or scientists who want to overview recent research in a field of science. As a case study, we map the topics in data mining literature in the year 2011. peerReviewed

ta113kirjallisuuskatsausklusterointiComputer scienceProcess (engineering)Dimensionality reductiondiffuusiokuvausta111Diffusion mapKeyword extractionliterature mappingdiffusion mapKnowledge discovery processLibrary and Information Sciencescomputer.software_genreData scienceField (geography)Computer Science ApplicationsKnowledge extractionTiedonhavaitsemisprosessitiedonlouhintaCluster analysiscomputerWeb scrapingclustering
researchProduct

Semantic Portal as a Tool for Structural Reform of the Ukrainian Educational System

2014

Education is recognized as a fundamental enabler of human development. The adoption of information and communications technologies (ICTs) by education (especially in developing countries) contributes to educational system reforms, in addition to the traditional advantages, such as social openness and accessibility. Yet the academic community has not studied sufficiently the challenging context in which ICTs are used as instruments for the reform of inefficient, and sometimes even corrupted, educational systems rather than just as means for smarter classrooms, remote access, or content management. The object of this study is Ukrainian higher education (HE) and its quality assurance (QA) syst…

ta113laadunvarmistusKnowledge managementPublic AdministrationHigher educationbusiness.industryquality assuranceDevelopmentHuman development (humanity)Computer Science ApplicationsDigital ecosystemhuman developmentInformation and Communications Technologyhigher educationEnablingOpenness to experiencesemantic portalUkrainebusinessQuality assuranceContent managementInformation Technology for Development
researchProduct