SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:1867 8211 OR L773:1867 822X srt2:(2015-2019)"

Search: L773:1867 8211 OR L773:1867 822X > (2015-2019)

  • Result 1-8 of 8
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Brooks, Eva, et al. (author)
  • Evolving Playful and Creative Activities When School Children Develop Game-Based Designs
  • 2019
  • In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. - Heidelberg : Springer. - 1867-8211 .- 1867-822X. ; 265, s. 485-495, s. 485-495
  • Journal article (peer-reviewed)abstract
    • The presence of digital technologies in classroom settings is relentlessly getting stronger and has shown to have powerful playful qualities. In recent years, digital game-based learning (DGBL) have been introduced in schools. In this paper we investigate an innovative approach to game-based learning, namely to use game design activities as motivators for developing children’s creative and social skills as well as other kinds of learning scenarios, e.g. computational. It is based on two cases, where game design activities by means of a narrative approach were applied in both analogue and digital form. The unit of analysis is game design activities. Hence, game design activities with the participating children (3 rd graders, 9–10 years of age), creative materials and technologies, and children’s actions as well as interactions are analyzed. The research questions posed in this study are: (1) What activities develop when school children design games in two cases, as an analogue activity, and as an activity including technology?; and (2) How do the learning environment, including the artefacts, employed mediate these activities? The outcomes of the study indicate that the game design workshop session which included both creative material and technology unfolded more combinational activities, which indicate that the inclusion of technology facilitated a more critical design decision making. However, the game design workshop session including only creative material exhibited a more thorough knowledge about what the material could do and what the children themselves could do with the material, which seemed to result in more playful interactions between the children. © 2019, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
  •  
2.
  • Gulisano, Vincenzo Massimiliano, 1984, et al. (author)
  • METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures
  • 2015
  • In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. - Cham : Springer International Publishing. - 1867-8211 .- 1867-822X. ; 153, s. 51-68
  • Conference paper (peer-reviewed)abstract
    • In the shift from traditional to cyber-physical electric grids, motivated by the needs for improved energy efficiency, Advanced Metering Infrastructures have a key role. However, together with the enabled possibilities, they imply an increased threat surface on the systems. Challenging aspects such as scalable traffic analysis, timely detection of malicious activity and intuitive ways of specifying detection mechanisms for possible adversary goals are among the core problems in this domain. Aiming at addressing the above, we present METIS, a two-tier streaming-based intrusion detection framework. METIS relies on probabilistic models for detection and is designed to detect challenging attacks in which adversaries aim at being unnoticed. Thanks to its two-tier architecture, it eases the modeling of possible adversary goals and allows for a fully distributed and parallel traffic analysis through the data streaming processing paradigm. At the same time, it allows for complementary intrusion detection systems to be integrated in the framework. We demonstrate METIS’ use and functionality through an energy exfiltration use-case, in which an adversary aims at stealing energy information from AMI users. Based on a prototype implementation using the Storm Stream Processing Engine and a very large dataset from a real-world AMI, we show that METIS is not only able to detect such attacks, but that it can also handle large volumes of data even when run on commodity hardware.
  •  
3.
  • Sochor, Jana, 1973, et al. (author)
  • The Added Value of a New, Innovative Travel Service: Insights from the UbiGo Field Operational Test in Gothenburg, Sweden
  • 2015
  • In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. - Cham : Springer International Publishing. - 1867-8211 .- 1867-822X. ; 151, s. 169-175
  • Conference paper (peer-reviewed)abstract
    • The aim of this chapter is to introduce the UbiGo transport broker service developed in Gothenburg, Sweden, and to discuss insights from the six- month field operational test regarding incentives for users adopting new travel services as well as perceived added value. Results are presented from participant questionnaires, interviews, and travel diaries. Findings suggest that potential early users are initially incentivized by curiosity, but that this must be trans- formed into practical incentives such as convenience and economic advantage if the users are to continue using the service. Customers also found added value in the “transportation smorgasbord” concept, 24-hour customer support, new types of subscriptions and tickets, and having everything in their smartphone, but wished for more personalized decision support and feedback. Concern for the environment functioned more as a bonus than as an incentive, meaning that the environmentally friendly choice must also be the practical choice in order to promote sustainability.
  •  
4.
  • Sun, T., et al. (author)
  • Spatial reuse based resource allocation in device-to-device communications
  • 2016
  • In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. - Cham : Springer International Publishing. - 1867-8211 .- 1867-822X. - 9783319470627 ; 169, s. 131-143
  • Conference paper (peer-reviewed)abstract
    • Device-to-Device (D2D) communications have attracted more concern recently, since it provides a supplemental paradigm of short range communications for the current cellular networks. In D2D communications information bits are directly transmitted between devices without traversing base station (BS). As a result, D2D communications can potentially facilitate the improvement of the network capacity, extension of the network coverage, enhancement of the spectrum efficiency, and the energy efficiency as well. It also works well for couple of new applications, such as information exchange between devices in Internet of Things (IoT) and low delay video content sharing. From the perspective of resource allocation in D2D communications, multiple D2D users (DUs) may reuse the same resource of cellular users (CUs). Thus, we put our focus on the spatial reuse resource allocation in this paper. We formulate the spatial reuse problem which aims to maximize the system throughput while maintaining the desirable signal-noise-interference-ratio (SINR) at receivers. Accordingly, a greedy based user set selection algorithm is proposed to filter the candidate DU set to further reduce the computation complexity. Simulation results show that the cellular network can achieve a higher throughput by using our proposed scheme.
  •  
5.
  • Tossou, Aristide, 1989, et al. (author)
  • Optimal advertisement strategies for small and big companies
  • 2016
  • In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. - Cham : Springer International Publishing. - 1867-8211 .- 1867-822X. - 9783319436951 ; 171, s. 94-98
  • Conference paper (peer-reviewed)abstract
    • Many small and big companies in developing countries struggle to make their products or services known to the public. This is especially the case when there are new or have a new product. Most of them use publicity through radio, tv, social networks, billboard, SMS… Moreover, they also need to decide at what time to display their publicity for maximal effects. The companies which have more money typically used a simple strategy which consists in doing the publicity at many sources at different time or at a time such as to maximize the number of viewers. The smaller ones typically target the best popular programs. However, this strategy is not the best as many users listening to your publicity might not be interested in it. So, you are more likely to miss the interested readers. Moreover, there will be many other competing publicities. We propose a strategy by using the Multi-Armed bandit problem to optimally solve this problem under realistic assumptions. We further extend the model to deal with many competing companies by proposing the use of a time-division sharing algorithm.
  •  
6.
  • Kobusinge, Grace, et al. (author)
  • The (missing?) role of health information systems (HIS) in patient care coordination and continuity (PCCC): The case of Uganda
  • 2019
  • In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. - Cham : Springer International Publishing. - 1867-8211.
  • Conference paper (peer-reviewed)abstract
    • In Uganda, patients receive care from different health facilities. However, most facilities struggle to exchange patient information across boundaries because their health information systems (HIS) operate in silos. Yet to meet the needs of a patient who receives care from different health facilities the participating facilities ought to collaborate, share and exchange patient information in order to enhance patient care coordination and continuity (PCCC) across the continuum of care. Using qualitative interviews we examine five HIS to investigate the problematic issues that could be raised during HIS active involvement in PCCC across the continuum of care. Results highly indicate that the existing HIS in the country do not enhance PCCC, and below are some of the challenges realized: interoperability objective not given priority during system design, HIS operating in silos, lack of a national standard for the patient record, health facilities exercising ownership of the data and other non-technical challenges. The main implication of these findings is that focusing on the interoperability objective as a design requirement during HIS implementation would potentially repress all other challenges and revive the active role of HIS involvement in PCCC.
  •  
7.
  • Manzoor, Shahid (author)
  • A Sustainable Marriage of Telcos and Transp in the Era of Big Data: Are We Ready?
  • 2018
  • In: Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering. - Cham : Springer International Publishing. - 1867-8211. ; 245, s. 210-219
  • Conference paper (other academic/artistic)abstract
    • The emerging smart city paradigm e.g., intelligent transport, smart grid and participatory sensing etc. is to advance the quality, performance and experience of urban citizten services through greater connectivity. This paradigm needs to collect data from citizens, various devices and assets that could be monitored, processed and analysed for the city governers to make better decision and also more efficiently manage those assests and resources. While the telecommunication and Internet are progressively being over-burdened and congested by the growing data transmission demands. To keep expanding the telecommunications and Internet infrastructures to accomodate these intensive data demands is costly and also the associated energy consumptions and carbon emissions could at long last wind up genuinely hurting the environment. To face this issue in the coming era of big data, we envision it will be best to utilize the established urban transport and road infrastructure and existing daily massive vehicular trips, to complement traditional option for data transmission. After detailing the current state-of-the-art, we consider the main challenges that need to be faced. Moreover, we define the main pillars to integrate the telecommunications and transport infrastructures, and also a proposal for the future urban network architecture.
  •  
8.
  • Ongaya, Kizito, et al. (author)
  • Towards a spatial-temporal model of prevalence of nodding syndrome and epilepsy
  • 2019
  • In: AFRICOMM 2018: e-Infrastructure and e-Services for Developing Countries. - Cham : Springer International Publishing. - 1867-8211. - 9783030160418 ; 275, s. 67-77
  • Conference paper (peer-reviewed)abstract
    • Nodding syndrome is an emerging disease which have unknown transmission patterns and no properly established mechanisms for diagnosis leading to numerous hypothetical postulations. It has affected thousands of children in Uganda with debilitating effect and serious economic consequences. Spatial-temporal analysis may provide a quick mechanism to establish comparative understanding of the various hypotheses ascribed to nodding syndrome and any other emerging diseases with similar clinical manifestation. There is considerable suspicion that “nodding syndrome is a form of epilepsy”, a hypothesis that has hardly been investigated in literature. The aim of the study described in this paper is to establish spatial-temporal relationships between ailments diagnosed as nodding syndrome and ailments diagnosed as epilepsy. An exploratory cross section survey in three districts of Northern Uganda was done. Spatial data of health centers were recorded and ArcGIS was used for display. The findings show significant spatial-temporal correlation of diagnosis reporting of nodding syndrome to epilepsy. The regression statistics overall, epilepsy significantly (p < 0.05) ex-plains about 58% of Nodding syndrome variability. The F-statistic shows a very highly significant value (p = 8.20481E-13; p < 0.05), meaning that the output of the regression is not by chance.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-8 of 8

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view