Abstract: During the last decade some long lasting changes and
developments are shaping the global society. The world is entering a
new society which is already named as information or knowledge
society. In the paper, information/knowledge society is elaborated
first. Starting in the year 2000, European Union has initiated some
special projects such as eEurope and eEurope+ and activities such as
Bologna Process and Socrates/Erasmus Program . The paper will
review these activites in relation with information or knowledge
society . Before paper ends with a conclusion, some views relevant
to the topic are also presented.
Abstract: In this paper the authors present the framework of a
system for assisting users through counseling on personal health, the
Personal Health Assistance Service Expert System (PHASES).
Personal health assistance systems need Personal Health Records
(PHR), which support wellness activities, improve the understanding
of personal health issues, enable access to data from providers of
health services, strengthen health promotion, and in the end improve
the health of the population. This is especially important in societies
where the health costs increase at a higher rate than the overall
economy. The most important elements of a healthy lifestyle are
related to food (such as balanced nutrition and diets), activities for
body fitness (such as walking, sports, fitness programs), and other
medical treatments (such as massage, prescriptions of drugs). The
PHASES framework uses an ontology of food, which includes
nutritional facts, an expert system keeping track of personal health
data that are matched with medical treatments, and a comprehensive
data transfer between patients and the system.
Abstract: In this paper, our concern is the management of mobile transactions in the shared area among many servers, when the mobile user moves from one cell to another in online partiallyreplicated distributed mobile database environment. We defined the concept of transaction and classified the different types of transactions. Based on this analysis, we propose an algorithm that handles the disconnection due to moving among sites.
Abstract: The search for factors that influence user behavior has remained an important theme for both the academic and practitioner Information Systems Communities. In this paper we examine relevant user behaviors in the phase after adoption and investigate two factors that are expected to influence such behaviors, namely User Involvement (UI) and Personal Innovativeness in IT (PIIT). We conduct a field study to examine how these factors influence postadoption behavior and how they are interrelated. Building on theoretical premises and prior empirical findings, we propose and test two alternative models of the relationship between these factors. Our results reveal that the best explanation of post-adoption behavior is provided by the model where UI and PIIT independently influence post-adoption behavior. Our findings have important implications for research and practice. To that end, we offer directions for future research.
Abstract: A suitable e-learning system management needs to
carry out a web-information system in order to allow integrated
fruition of data and metadata concerning the activities typical of elearning
environment. The definition of a “web information system"
for e-learning takes advantage of the potentialities of Web
technologies both as for the access to metadata present on the several
platforms, and as for the implementation of courseware which make
up the relative didactic environment. What information systems have
in common is the technological environment on which they are
generally implemented and the use of metadata in order to structure
information at all cognitive and organization levels. In this work we
are going to define a methodology for the implementation of a
specific web information system for an e-learning environment.
Abstract: This paper considers the Zlin region in terms of the
demographic conditions of the region - in particular the residential
structure and the educational background of the inhabitants. The
paper also considers migration of the population within the Zlin
region. Migration is of importance in terms of conservation of the
working potential of the region.
Abstract: The given work is devoted to the description of
Information Technologies NAS of Azerbaijan created and
successfully maintained in Institute. On the basis of the decision of
board of the Supreme Certifying commission at the President of the
Azerbaijan Republic and Presidium of National Academy of
Sciences of the Azerbaijan Republic, the organization of training
courses on Computer Sciences for all post-graduate students and
dissertators of the republic, taking of examinations of candidate
minima, it was on-line entrusted to Institute of Information
Technologies of the National Academy of Sciences of Azerbaijan.
Therefore, teaching the computer sciences to post-graduate
students and dissertators a scientific - methodological manual on
effective application of new information technologies for research
works by post-graduate students and dissertators and taking of
candidate minima is carried out in the Educational Center.
Information and communication technologies offer new
opportunities and prospects of their application for teaching and
training. The new level of literacy demands creation of essentially
new technology of obtaining of scientific knowledge. Methods of
training and development, social and professional requirements,
globalization of the communicative economic and political projects
connected with construction of a new society, depends on a level of
application of information and communication technologies in the
educational process. Computer technologies develop ideas of
programmed training, open completely new, not investigated
technological ways of training connected to unique opportunities of
modern computers and telecommunications. Computer technologies
of training are processes of preparation and transfer of the
information to the trainee by means of computer. Scientific and
technical progress as well as global spread of the technologies
created in the most developed countries of the world is the main
proof of the leading role of education in XXI century. Information
society needs individuals having modern knowledge. In practice, all
technologies, using special technical information means (computer,
audio, video) are called information technologies of education.
Abstract: Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proofs were introduced. The common ground for all these three systems is that none of them works without real time cryptologic calculations that should be held on a server. As far as known, the agent-based approach has not been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not contain real time calculations on the server side, is proposed. Conventional cryptologic methods are used in the proposed schema and some of the requirements of an electronic voting system are constructed within the schema. The schema seems quite secure if the used cryptologic methods and agents are secure. In this paper, proposed schema will be explained and compared with already known electronic voting systems.
Abstract: Early Intervention Program (EIP) is required to
improve the overall development of children with Trisomy 21 (Down
syndrome). In order to help trainer and parent in the implementation
of EIP, a support system has been developed. The support system is
able to screen data automatically, store and analyze data, generate
individual EIP (curriculum) with optimal training duration and to
generate training automatically. The system consists of hardware and
software where the software has been implemented using Java
language and Linux Fedora. The software has been tested to ensure the
functionality and reliability. The prototype has been also tested in
Down syndrome centers. Test result shows that the system is reliable
to be used for generation of an individual curriculum which includes
the training program to improve the motor, cognitive, and combination
abilities of Down syndrome children under 6 years.
Abstract: Internet Access Technologies (IAT) provide a means
through which Internet can be accessed. The choice of a suitable
Internet technology is increasingly becoming an important issue to
ISP clients. Currently, the choice of IAT is based on discretion and
intuition of the concerned managers and the reliance on ISPs. In this
paper we propose a model and designs algorithms that are used in the
Internet access technology specification. In the proposed model, three
ranking approaches are introduced; concurrent ranking, stepwise
ranking and weighted ranking. The model ranks the IAT based on
distance measures computed in ascending order while the global
ranking system assigns weights to each IAT according to the position
held in each ranking technique, determines the total weight of a
particular IAT and ranks them in descending order. The final output
is an objective ranking of IAT in descending order.
Abstract: This paper describes a system, in which various methods of text summarizing can be adapted to Polish. A structure of the system is presented. A modular construction of the system and access to the system via the Internet are signaled.
Abstract: Self-efficacy, self-reliance, and motivation were
examined in a quasi-experimental study with 178 sophomore
university students. Participants used an interactive cardiovascular
anatomy and physiology CD-ROM, and completed a 15-item
questionnaire. Reliability of the questionnaire was established using
Cronbach-s alpha. Post-tests and course grades were examined using
a t-test, demonstrating no significance. Results of an item-to-item
analysis of the questionnaire showed overall satisfaction with the
teaching methodology and varied results for self-efficacy, selfreliance,
and motivation. Kendall-s Tau was calculated for all items
in the questionnaire.
Abstract: There is a general feeling that Internet crime is an
advanced type of crime that has not yet infiltrated developing
countries like Uganda. The carefree nature of the Internet in which
anybody publishes anything at anytime poses a serious security threat
for any nation. Unfortunately, there are no formal records about this
type of crime for Uganda. Could this mean that it does not exist
there? The author conducted an independent research to ascertain
whether cyber crimes have affected people in Uganda and if so, to
discover where they are reported. This paper highlights the findings.
Abstract: Distributed wireless sensor network consist on several
scattered nodes in a knowledge area. Those sensors have as its only
power supplies a pair of batteries that must let them live up to five
years without substitution. That-s why it is necessary to develop
some power aware algorithms that could save battery lifetime as
much as possible. In this is document, a review of power aware
design for sensor nodes is presented. As example of implementations,
some resources and task management, communication, topology
control and routing protocols are named.
Abstract: Assessment of IEP (Individual Education Plan) is an
important stage in the area of special education. This paper deals
with this problem by introducing computer software which process
the data gathered from application of IEP. The software is intended
to be used by special education institution in Turkey and allows
assessment of school and family trainings. The software has a user
friendly interface and its design includes graphical developer tools.
Abstract: In this presentation, we discuss the use of information technologies in the area of special education for teaching individuals with learning disabilities. Application software which was developed for this purpose is used to demonstrate the applicability of a database integrated information processing system to alleviate the burden of educators. The software allows the preparation of individualized education programs based on the predefined objectives, goals and behaviors.
Abstract: Research in quantum computation is looking for the consequences of having information encoding, processing and communication exploit the laws of quantum physics, i.e. the laws which govern the ultimate knowledge that we have, today, of the foreign world of elementary particles, as described by quantum mechanics. This paper starts with a short survey of the principles which underlie quantum computing, and of some of the major breakthroughs brought by the first ten to fifteen years of research in this domain; quantum algorithms and quantum teleportation are very biefly presented. The next sections are devoted to one among the many directions of current research in the quantum computation paradigm, namely quantum programming languages and their semantics. A few other hot topics and open problems in quantum information processing and communication are mentionned in few words in the concluding remarks, the most difficult of them being the physical implementation of a quantum computer. The interested reader will find a list of useful references at the end of the paper.