Search results for "Computing"
showing 10 items of 25279 documents
Smart Educational Process Based on Personal Learning Capabilities
2017
Personalized learning is increasingly gaining popularity, especially with the development of information technology and modern educational resources for learning. Each person is individual and has different knowledge background, different kind of memory, different learning speed. Teacher can adapt learning course, learning instructions or learning material according to the majority of learners in class, but that means that learning process is not adapted to the personality of each individual learner. That is why it is important to have smart educational process based on personal learning capabilities. This paper presents a literature survey on different learning systems which detects learni…
H.264 QoS and Application Performance with Different Streaming Protocols
2015
Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed
An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths
2015
In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…
Using Video Conferencing and Video Recordings for Upper Secondary Distance Teaching: Teachers' View Points
2016
In Finland the “Isoverstas” (formely ISOverkosto) network of schools coordinates the development of upper secondary distance learning services. The community actually is quite extensive with 65 member schools. In this paper we introduce the results related using synchronous and asynchronous online video resources for distance teaching. The topic is approached broadly at the level of schools and different support services as well as the pedagogical practices of individual teachers. The research data consists of wiki stories written by teachers, the interviews of selected teachers, and an online survey. Data-based content analysis was chosen as the main analysis method with the aim of highlig…
Consumers’ adoption of information services
2013
This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.
Flexible entity search on surfaces
2016
Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…
Online activity traces around a "Boston bomber"
2013
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.
Software Renting in the Era of Cloud Computing
2012
In the new era of computing, software can be sold and delivered as a cloud service, and software renting has become as a strategic tool to compete in the market. Software renting has several advantages from the customer's point of view. However, for software providers it is challenging to ensure a profitable revenue stream when a license fee is replaced by a periodic rental fee. In this study, software renting was found to help the case firms to differentiate themselves from competitors; it also increased their competitive advantage by making the software available for a larger customer group. However, the negotiating power of larger customers impacted on software pricing, rental agreements…
Selection of the Proper Revenue and Pricing Model for SaaS
2014
Recent research on software revenue and pricing models has revealed important ways in which firms can benefit from software renting. However, it is still unclear how SaaS providers select a proper revenue and pricing model to make their services attractive for customers. Based on 32 interviews with software professionals from four case firms, this study reveals how different factors impacted on the selection of a revenue and pricing model. It can be concluded that customers’ needs were the main driving force to the selection of the most appropriate pricing and revenue model in the market. peerReviewed
A Novel Model for Cybersecurity Economics and Analysis
2017
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…