Search results for "computer.software_genre"
showing 10 items of 3858 documents
OLAP Personalization with User-Describing Profiles
2010
In this paper we have highlighted five existing approaches for introducing personalization in OLAP: preference constructors, dynamic personalization, visual OLAP, recommendations with user session analysis and recommendations with user profile analysis and have analyzed research papers within these directions. We have pointed out applicability of personalization to OLAP schema elements in these approaches. The comparative analysis has been made in order to highlight a certain personalization approach. A new method has been proposed, which provides exhaustive description of interaction between user and data warehouse, using the concept of Zachman Framework [1, 2], according to which a set of…
Extracting Features from Social Media Networks Using Semantics
2016
This paper focuses on the analysis of social media content generated by social networks (e.g. Twitter) in order to extract semantic features. By using text categorization to sort text feeds into categories of similar feeds, it has been proved to reduce the overhead that is required to retrieve these feeds and at the same time, it provides smaller pools in which further investigations can be made easier. The aim of this survey is to draw a user profile, by analysing his or her tweets. In this early stage of research, being a pre-processing phase, a dictionary based approach is considered. Moreover, the paper describes an algorithm used in analysing the text and its preliminary results. This …
A data-logging mechanism to support e-learning systems
2015
User profiling and e-learning have received great attention in the last years. In a learning environment, user profiling provides historical data of the students' performance on different learning subjects. e-Learning tools such as serious games can collect user's data and build a user profile by appropriate storing these information. Thus, by combining above techniques and analysing each user's data a teacher can provide personalized treatment to her/his students. In this paper we present our solution on storing and analysing user data on a centralized server. Our system stores data collected from users with dyslexia. We maintain one user profile per student from data taken from a) user re…
An approach for recommending personalized contents for homecare users in the context of health 2.0
2014
This paper proposes a content recommendation mechanism as part of a model for implementing ubiquitous learning for supporting people with chronic diseases who are treated at home, so that they can learn more about treatments for their disease. In the proposed approach, the learning takes place based on day-to-day activities and real situations. In this case, the model supports the development of tools that can learn about the user's context, based on data obtained via sensors installed on users or in their home, as well as data supplied directly by the user interface of their mobile devices, and data provided by the healthcare team, and, after that, recommend contents about their diseases.
Through the Eyes of an Entangled Teacher: When Classical Musical Instrument Performance Tuition in Higher Education is Subject to Quality Assurance
2020
What happens when a classical music instrument performance course at a Norwegian state university study programme is assessed for quality following a standardized procedure? The article explores frictions and negotiations between managerial quality assurance and classical music performance education in a contextual sense, focusing particularly on the teacher-student relation. I employ my own experience as an instrument performance teacher in a Western Classical Music performance study programme while drawing on state acts, regulations, managerial processes, educational politics, funding, and classical music performance education’s habitus and heritage. I begin by addressing the institution …
Dynamic Range Processing’s Influence on Perceived Timing in Electronic Dance Music
2020
In this article, we explore the extent to which dynamic range processing (such as compression and sidechain compression) influences our perception of a sound signal’s temporal placement in music. Because compression reshapes the sound signal’s envelope, scholars have previously noted that certain uses of sidechain compression can produce peculiar rhythmic effects. In this article, we have tried to interrogate and complicate this notion by linking a description of the workings and effects of dynamic range processing to empirical findings on the interaction between sound and perceived timing, and by analyzing multitracks and DAW project files, as well as released audio files, of selected EDM …
A survey on peer-to-peer SIP based communication systems
2010
Published version of an article from the journal: Peer-to-Peer Networking and Applications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s12083-009-0064-4 Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in …
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
A roadmap towards improving managed security services from a privacy perspective
2014
Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…
Managing Emerging Information Security Risks during Transitions to Integrated Operations
2010
Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…