internet applications
Recently Published Documents


TOTAL DOCUMENTS

1000
(FIVE YEARS 176)

H-INDEX

32
(FIVE YEARS 4)

2022 ◽  
Vol 17 (1) ◽  
pp. 138-164
Author(s):  
Hani Brdesee ◽  
Wafaa Alsaggaf

Universities worldwide strive to provide the best student services possible, particularly those that support student achievements and career goals. Therefore, academic advising continues to be a significant part of the student experience, one which universities need to fully understand in terms of its objectives, application processes, and required skill. As a result of significant technological improvements since the turn of the millennium, including expanding internet applications and digital transformations, universities have established computer information systems that support academic advising and course registration services. This study examined the effects of modifications to the electronic academic advising and course registration systems at King Abdulaziz University in 2018, and then again in 2020, following a university-wide system failure in 2018 resulting from a demand overload. In 2018, a preliminary statistical analysis and student feedback survey were conducted by the authors to measure student satisfaction with the online portal On-Demand University Services (ODUS Plus). In addition to recommendations suggested by the 2018 analysis such as balancing the load distribution of the university’s network, organizational (i.e., non-technical) solutions, rules, and regulations were adjusted such as progressive course registration that prioritized those expected to graduate first. The survey and analysis were repeated by the authors in 2020 to assess improvements in student satisfaction. As a result of the changes, the investigation revealed improved student satisfaction with the performance of ODUS Plus and network access. Overall, students were significantly more satisfied in 2020 than in 2018. This research shows that some technical challenges can be resolved using re-engineered processes and organizational solutions.


2022 ◽  
pp. 77-108
Author(s):  
Pınar Onay Durdu ◽  
Ömer Naci Soydemir

Currently, providing accessible websites for all users is an essential requirement. There are various qualitative and quantitative evaluation methods to assure accessibility. Among these, the quantitative methods show the level of accessibility of the website using web accessibility metrics (WAM), which provide a way to understand, control, and improve these websites. This study was aimed to identify current trends and analyze WAMs through a systematic literature review. Therefore, 30 WAM studies that were published since 2008 were determined and investigated according to attributes defined for the metrics such as guideline set used by the metric, coupling level with the guidelines, type of evaluation, site complexity, and validation with the user. Fourteen recently proposed WAMs were determined since 2008. Recently proposed WAMs have begun to consider more elaborate issues such as rich internet applications, website complexity, usability, or user experience issues and implement some machine learning approaches for the metrics.


2022 ◽  
Vol 19 (3) ◽  
pp. 2896-2912
Author(s):  
Jiang Zhao ◽  
◽  
Dan Wu ◽  
◽  

<abstract> <p>The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies the infrastructure mode that needs to be solved urgently in the industrial internet and provides a possible infrastructure mode and related security evaluation system. Secondly, it analyses the digital transformation process with the case of G.E.os industrial nternet development practice. It clarifies that G.E. is forming a new value closed-loop through digital and strategy mixed channels. Thirdly, industrial internet security research is described within multiple viewpoints based on industrial internet applications, the security service and security assurance defense systemos architecture, and the non-user entrance probability model. Finally, the paper illustrates the changes in knowledge workflow and social collaboration caused by the industrial internet under intelligent manufacture.</p> </abstract>


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 3027
Author(s):  
Mohammed Nsaif ◽  
Gergely Kovásznai ◽  
Anett Rácz ◽  
Ali Malik ◽  
Ruairí de Fréin

Data Center Networks (DCNs) form the backbone of many Internet applications and services that have become necessary in daily life. Energy consumption causes both economic and environmental issues. It is reported that 10% of global energy consumption is due to ICT and network usage. Computer networking equipment is designed to accommodate network traffic; however, the level of use of the equipment is not necessarily proportional to the power consumed by it. For example, DCNs do not always run at full capacity yet the fact that they are supporting a lighter load is not mirrored by a reduction in energy consumption. DCNs have been shown to unnecessarily over-consume energy when they are not fully loaded. In this paper, we propose a new framework that reduces power consumption in software-defined DCNs. The proposed approach is composed of a new Integer Programming model and a heuristic link utility-based algorithm that strikes a balance between energy consumption and performance. We evaluate the proposed framework using an experimental platform, which consists of an optimization tool called LinGo for solving convex and non-convex optimization problems, the POX controller and the Mininet network emulator. Compared with the state-of-the-art approach, the equal cost multi-path algorithm, the results show that the proposed method reduces the power consumption by up to 10% when the network is experiencing a high traffic load and 63.3% when the traffic load is low. Based on these results, we outline how machine learning approaches could be used to further improve our approach in future work.


Author(s):  
Manuel Mennig ◽  
Sophia Tennie ◽  
Antonia Barke

AbstractOnline pornography is a widespread Internet application. As with other Internet applications, in some cases its use can become problematic. First indications point to a link between problematic use of online pornography and psychological distress and general functional impairment. However, to date, there are no standardized criteria for assessing problematic use of online pornography. In this study, we used the Online Pornography Disorder Questionnaire (OPDQ)—an instrument which adapted the official criteria for Internet Gaming Disorder to online pornography—to measure problematic use and investigated to what extent consumers with a self-perceived problematic use of online pornography differed from casual users with regard to their psychological distress. An online sample of German adult visitors to a popular casual dating site completed the OPDQ, the Brief Symptom Inventory (BSI), and provided information on their online pornography use (n = 1539; 72.6% male; 31.43 ± 11.96 years). T-scores for the BSI were calculated and independent t-tests were conducted to compare casual users with consumers with a self-perceived problematic use of online pornography. Of the users, 5.9% fulfilled the criteria for problematic use. This group consumed online pornography for longer amounts of time and showed higher levels of psychological distress (Hedges’ g from 0.75 to 1.21). The T-scores of users with self-perceived problematic online pornography use reached clinically relevant levels on all subscales. Overall, the results of the study indicate that self-perceived problematic use of online pornography seems to be linked to severe psychological distress that may warrant clinical attention.


2021 ◽  
Vol 2082 (1) ◽  
pp. 012019
Author(s):  
Hongming Dai

Abstract Parsing natural language to corresponding programming language attracts much attention in recent years. Natural Language to SQL(NL2SQL) widely appears in numerous practical Internet applications. Previous solution was to convert the input as a heterogeneous graph which failed to learn good word representation in question utterance. In this paper, we propose a Relation-Aware framework named LinGAN, which has powerful semantic parsing abilities and can jointly encode the question utterance and syntax information of the object language. We also propose the pre-norm residual shrinkage unit to solve the problem of deep degradation of Linformer. Experiments show that LinGAN achieves excellent performance on multiple code generation tasks.


2021 ◽  
Vol 7 (2) ◽  
pp. 133-137
Author(s):  
K. I. Ozerov

The article deals with the specifics of committing fraudulent actions in the field of mobile Internet applications. The question of the security of official (App Store, Google Play) and unofficial platforms for downloading user programs for various purposes is raised. Examples of fraud are given and their negative consequences are demonstrated. The essence of fleeceware-applications is revealed and the pros and cons of the IOS and Android operating systems, which are the technical base in the mobile devices of the largest companies, are noted. There is an age category that is more exposed or may be exposed to illegal actions on the part of fraudsters in the field of IT technologies. In turn, the emphasis is placed on some gaps in those. systems and legislation in which the fraudster avoids criminal prosecution. The high latency of such crimes is confirmed due to the small damage to the victims of the assault, if we consider each victim separately, as well as due to the complexity of the crime itself. Measures are taken to prevent fraudulent actions related to online applications on mobile devices against yourself.


2021 ◽  
Vol 10 (3) ◽  
pp. 464
Author(s):  
Nur Wakhidah ◽  
Erman Erman ◽  
Astri Widyaningrum ◽  
Vera Nur Aini

This study aims to reflect online learning when Covid-19 spread include what happened, how obstacles, teacher readiness, solutions, and teacher innovations to improving learning. The mixed-method research was conducted on 30 SD/MI and SMP/MTs teachers in various fields. Data collection was carried out by survey using google form and interviews. Teacher readiness data is calculated quantitatively using percentages. Qualitative data (constraints, solutions, and innovations) were analyzed qualitatively. The results showed barriers to online learning came from teachers, schools, students, and material content; The percentage in new normal teacher readiness to do online learning is 73,49 (moderate category); Solutions in form of improving online learning infrastructure, providing quotas, teachers not only assigning tasks but activities, improving teacher skills in the field of IT. Teacher innovation is planning blended learning in the new normal and designing learning using internet applications, and empowering teacher working groups. The results of reflection show that online learning which is done suddenly produces many obstacles. Online learning planning needs to be done by improving teacher skills in the internet technology field, providing online learning facilities and infrastructure, understanding the characteristics of the material, and familiarizing students with technology following global demands. For this reason, it is necessary to initiate blended learning, namely a combination of online and face-to-face in facing global challenges.


2021 ◽  
Vol 12 (1) ◽  
pp. 112-124
Author(s):  
Flávia R. Beppu ◽  
Cristiano Maciel ◽  
José Viterbo

In this article, we analyze how the Brazilian Act for the Protection of Personal Data --- Lei Geral de Proteção de Dados Pessoais (LGPD) in Portuguese --- can contribute to handling some situations involving post-mortem digital legacy. For that purpose, we investigate some aspects of this act that can concur with the development of software and internet applications that cope with users’ digital assets. We analyzed the role of LGPD in the Brazilian legal system. The research was carried out based on a literature review and on the analysis of the relevant legislation and some bills proposed to regulate the matter. In line with the national constitutional order, the results point to the possibility of applying the principles and foundations of the data protection act as an axiological matrix for the treatment of the existing digital legacy.


Sign in / Sign up

Export Citation Format

Share Document