|
|
|
Osama Harfoushi
Pág. pp. 202 - 211
Beside the increasing trend of cloud computing and mobile applications, the use of cloud based mobile learning applications is also mounting. Almost every e-commerce service provider offers cloud based mobile learning applications so that they can target...
ver más
|
|
|
|
|
|
|
Irene Erlyn Wina Rachmawan, Nurul Fahmi, Edi Wahyu Widodo, Samsul Huda, M. Unggul Pamenang, M. Choirur Roziqin, Andri Permana W., Stritusta Sukaridhoto, Dadet Pramadihanto
Pág. 46 - 64
HPC (High Performance Computing) has become more popular in the last few years. With the benefits on high computational power, HPC has impact on industry, scientific research and educational activities. Implementing HPC as a curriculum in universities co...
ver más
|
|
|
|
|
|
|
Fernando Reinaldo Ribeiro, Arlindo Silva, Ana Paula Silva and José Metrôlho
With the universal use of mobile computing devices, there has been a notable increase in the number of mobile applications developed for educational purposes. Gamification strategies offer a new set of tools to educators and, combined with the location s...
ver más
|
|
|
|
|
|
|
Max M. North,Sarah M North
As the speed of technical and scientific innovation accelerates past the speed at which humans can learn, the need for innovative pedagogical environments and techniques, such as immersive visualization environments, becomes essential and apparent. The p...
ver más
|
|
|
|
|
|
|
E.E. Istratova,A.I. Gosteeva
Pág. 30 - 37
The article presents the results of the development and research of a software module for monitoring and managing the access of vehicles to the territory. Based on the analysis of literary sources, an algorithm for recognizing state license plates was de...
ver más
|
|
|
|
|
|
|
P. K. Paul,P. S. Aithal
Pág. 142 - 149
Information Assurance, in short, is also called as IA. The field is concerned with the security of information. However, additionally, it is also responsible for the different kind of contents in a different form. The field Information Assurance is very ...
ver más
|
|
|
|
|
|
|
Efthymios Alepis,M. Virvou,K. Kabassi
Pág. pp. 40 - 45
One important field where mobile technology can make significant contributions is education. However one criticism in mobile education is that students receive impersonal teaching. Affective computing may give a solution to this problem. In this paper we...
ver más
|
|
|
|
|
|
|
Pavlos Toukiloglou and Stelios Xinogalos
This paper reviews the research on adaptive serious games for programming regarding the implementation of their support systems. Serious games are designed to educate players in an entertaining and engaging manner. A key element in terms of meeting their...
ver más
|
|
|
|
|
|
|
Daniels Kotovs and Aleksejs Zacepins
This research work presents a developed geographic information system-based interactive map application to support beekeeping activities. The interactive map includes various features such as flowering calendar, weather information, and information about...
ver más
|
|
|
|
|
|
|
Riccardo Pecori
In recent years, virtual learning environments are gaining more and more momentum, considering both the technologies deployed in their support and the sheer number of terminals directly or indirectly interacting with them. This essentially means that eve...
ver más
|
|
|
|
|
|
|
Riccardo Pecori
In recent years, virtual learning environments are gaining more and more momentum, considering both the technologies deployed in their support and the sheer number of terminals directly or indirectly interacting with them. This essentially means that eve...
ver más
|
|
|
|
|
|
|
Shaibu Adekunle Shonola,Mike S Joy
Pág. pp. 64 - 70
Innovation in learning technologies and services is driven by demands from Higher Educational Institutions (HEIs) in order to meet their students? needs and make knowledge delivery easier. The technology could play a pivotal role in extending the possibi...
ver más
|
|
|
|
|
|
|
Kay Bryant,John Campbell
Control mechanisms established on the boundary of an information system are an important preliminary step to minimising losses from security breaches. The primary function of such controls is to restrict the use of information systems and resources to au...
ver más
|
|
|
|