864 research outputs found
The correlation between Using Technology and Cross-Cultural Understanding of Well-Being within Educational System
This Research aimed to analyse the correlation between using technology and cross-cultural understanding of well-being within the educational system. This analysis will be concerned with two fundamental issues: the first, how using technology in the educational system changed cultural of human habit, the second what is the relation between using technology and cross-cultural understanding of well-being within the educational system. The method in this research used mix method. The result of this research had inform and giving comprehensive to analysis about the correlation between using technology and cross-cultural understanding of well-being within the educational system. It had three established, such as: (1) learning in globalisation were faced two challenge, the first about study perception and the second about ICT and its development had influenced human study. (2) learn in school began to involve using instructional media interactive. (3) globalisation era and using technology had connected to the cross-cultural understanding of well-being within the educational system. Based on that result known that it had the correlation between using technology and cross-cultural understanding of well-being within the educational system
Recommended from our members
Evaluating the Provision of Botnet Defences using Translational Research Concepts.
Botnet research frequently draws on concepts from other fields. An example is the use of epidemiological models when studying botnet propagation, which facilitate an understanding of bot spread dynamics and the exploration of behavioural theory. Whilst the literature is rich with these models, it is lacking in work aimed at connecting the insights of theoretical research with day-to-day practice. To address this, we look at botnets through the lens of implementation science, a discipline from the field of translational research in health care, which is designed to evaluate the implementation process. In this paper, we explore key concepts of implementation science, and propose a framework-based approach to improve the provision of security measures to network entities. We demonstrate the approach using existing propagation models, and discuss the role of implementation science in malware defence
e-Procurement adoption by suppliers: Enablers, barriers and critical sucess factors
This paper presents a current research with the aim to identify the enablers, barriers and critical success
factors for e-procurement adoption by suppliers. Any successful e-procurement system needs suppliers
disposed to trade electronically. We present a review of the actual literature about e-Procurement, with
focus on the barriers, enabler´s and CSF´s already identified. A research methodology is proposed to study
the problem, and this work will contribute to better address the issues faced by suppliers on e-procurement
implementations.info:eu-repo/semantics/acceptedVersio
Business models and information systems for sustainable development
Businesses are expected to explore market opportunities in the area of sustainable development, thus contributing to finding solutions aiming at sustainable quality of life. This will require adaptation and innovation of business models and information systems, with challenges of particular interest to the business modeling and software design community. This paper briefly discusses two relevant topics in this respect, namely (i) goal and value modeling, and (ii) model-driven development. We mention existing work that can be taken as a starting point for addressing sustainability issues, and we make some observations that may be taken into account when extending existing work
Predicting blocking effects in the spatial domain using a learning approach
A new method for predicting blocking effect in the spatial domain is proposed. This method aims at estimating the appearance of blocking artefacts in the original image prior to compression for a given bit rate and a given compression technique. The basic idea is to use a training process in order to compute a visibility measure. A weighting function of the blocking effects is then derived from this training process performed on a database. The proposed method is objectively and subjectively evaluated on various actual images. The obtained results confirm the efficiency of the proposed method in predicting blocking effect
Coding Solutions for the Secure Biometric Storage Problem
The paper studies the problem of securely storing biometric passwords, such
as fingerprints and irises. With the help of coding theory Juels and Wattenberg
derived in 1999 a scheme where similar input strings will be accepted as the
same biometric. In the same time nothing could be learned from the stored data.
They called their scheme a "fuzzy commitment scheme". In this paper we will
revisit the solution of Juels and Wattenberg and we will provide answers to two
important questions: What type of error-correcting codes should be used and
what happens if biometric templates are not uniformly distributed, i.e. the
biometric data come with redundancy. Answering the first question will lead us
to the search for low-rate large-minimum distance error-correcting codes which
come with efficient decoding algorithms up to the designed distance. In order
to answer the second question we relate the rate required with a quantity
connected to the "entropy" of the string, trying to estimate a sort of
"capacity", if we want to see a flavor of the converse of Shannon's noisy
coding theorem. Finally we deal with side-problems arising in a practical
implementation and we propose a possible solution to the main one that seems to
have so far prevented real life applications of the fuzzy scheme, as far as we
know.Comment: the final version appeared in Proceedings Information Theory Workshop
(ITW) 2010, IEEE copyrigh
- …